Cyber Security Technician level 3

INTENT:

Learners will follow a curriculum which adapts to the individual learning needs of learners who are working towards level 3. Learners will have opportunities to develop their knowledge, skills, behavior and understanding of workplace expectations. Take part in a variety of workplace experiences which actively promote problem solving, employability skills and responsibility. The main aim of this Apprenticeship is to develop the skills learners need to engage to progress further in work or access higher level learning. Learners will increase their development in areas such as:

  • Vocational Skills and workplace understanding
  • Responsibility for own work and self-development
  • Independent learning and research
  • Motivation to succeed Employability Skills
  • Accessing CIAG internally and externally Development of these skills will help prepare them to be able to participate with confidence in future job opportunities.

QUALIFICATIONS:

Maths Functional Skill Level 2 & English Functional Skill Level 2 End Point Assessment to be completed upon learner reaching Gateway stage, this will consist of: Professional Discussion underpinned by portfolio & project report & questioning

CORE KNOWLEDGE & SKILLS:

  • Threat hazards, risk and intelligence
  • Security threats
  • Maintaining security and control of an organisation
  • Cyber security mechanisms and controls: patching software, installing software updates, implementing access control, configuring firewalls
  • Security incident and event management tools (SIEM) tools and protection tools
  • Information security policy and procedure
  • Develop the skills your business needs Get qualified and motivated staff Future proof your business Develop skills that will increase your career potential Support from industry experienced staff working with the British Computing Society Become an associate member of the BCS Become a registered IT Technician (RITTech) Become an accredited affiliate of the Chartered Institute for Information Security

BEHAVIOURS:

  • Manage own time to meet deadlines and manage stakeholder expectations
  • Work independently and take responsibility for own actions within the occupation
  • Use own initiative
  • A structured approach to the prioritisation of tasks
  • Treat colleagues and external stakeholders fairly and with respect without bias or discrimination
  • Act in accordance with occupation specific laws, regulations and professional standards and not accept instruction that is incompatible with any of these
  • Review own development needs in order to keep up to date with evolution in technologies, trends and innovation using a range of sources

ASSESSMENT:

Each month you will be expected to learn something new.

  • Learning will take place both on and off the job
  • You will work with a workplace mentor to learn on the job
  • Your Tutor will meet with you at regular intervals
  • Quarterly, you will officially review your progress
  • You will be invited to Master classes

COURSE CONTENT:

This apprenticeship standard is for those providing first line cyber security support. This requires individuals to monitor and detect potential security threats and escalate as necessary, and to support secure and uninterrupted business operations of an organisation through the implementation of cyber security mechanisms and the application of cyber security procedures and controls.

Cyber security policies and standards based on an Information Security Management System (ISMS).

Principles of cyber security compliance and compliance monitoring techniques Cryptography, certificates and use of certificate management tools.

Processes for detecting, reporting, assessing, responding to, dealing with and learning from information security events.

Threat sources and threat identification and network reconnaissance techniques and the impact that threats might have on an organisation.

Types of information security events – brute force attack, malware activity,suspicious user behaviour, suspicious device behaviour, unauthorized system changes.

Computer forensic principles – the importance of ensuring that evidence is not contaminated and maintaining the continuity of evidence without compromising it Standard information security event incident, exception and management reporting requirements and how to document incident and event information as part of a chain or evidence.

Cyber security audit requirements, procedures and plans, need to obtain and document evidence in an appropriate form for an internal or external auditor to review.

Different learning techniques and the breadth and sources of knowledge and sources of verified information and data Risk assessment, risk management and business impact analysis principles How their occupation fits into the wider digital landscape and any current or future regulatory requirements. How to use data ethically and the implications for wider society, with respect to the use of data.

Roles within a multidisciplinary team and the interfaces with other areas of an organisation.

WHAT IS THE PROGRESSION?

This standard aligns with the following professional recognition:

BCS - The Chartered Institute for IT for Associate BCS membership(AMBCS) and Professional Registration for IT Technicians (RITTech) for Chartered Institute for Information Security for / Accredited Affiliate Progress to Level 4 or a Degree Apprenticeship

ENTRY & DURATION:

Entry Requirements: The entry requirement for this apprenticeship will be decided by each employer but may typically be five GCSE’s at Grade C or higher.

Duration of Apprenticeship: Typically The apprenticeship will typically take 18 months to complete

WS Training is affiliated and associated with the following organisations: