Model Curriculum. Analyst Security Operations Centre SECTOR: IT-ITeS SUB-SECTOR: IT Services OCCUPATION: Information/Cyber Security SSC/Q0909 REF ID:

Size: px
Start display at page:

Download "Model Curriculum. Analyst Security Operations Centre SECTOR: IT-ITeS SUB-SECTOR: IT Services OCCUPATION: Information/Cyber Security SSC/Q0909 REF ID:"

Transcription

1 Model Curriculum Analyst Security Operations Centre SECTOR: SUB-SECTOR: IT-ITeS IT Services OCCUPATION: REF ID: NSQF LEVEL: Information/Cyber Security SSC/Q0909 7

2

3 TABLE OF CONTENTS 1. Curriculum Trainer Prerequisites Annexure: Assessment Criteria 08

4 Analyst Security Operations Centre CURRICULUM / SYLLABUS This program is aimed at training candidates for the job of a Analyst Security Operations Centre, in the IT-Services Sector/Industry and aims at building the following key competencies amongst the learner Program Name Qualification Pack Name & Reference ID. ID Analyst Security Operations Centre Analyst Security Operations Centre SSC/Q0909 Version No. 1.0 Version Update Date Pre-requisites to Training Diploma in Engineering or any graduate course Certification in Information systems or related fields, Basic soft skills training 0-2 years of work experience/internship in security Minimum Job Entry Age 21 years Training Outcomes After completing this programme, participants will be able to: 1. SSC/N0906 (Monitor and log events and alarms of possible security threats) 2. SSC/N0907 (Investigate and respond to events and alarms that could be security threats) 3. SSC/N9001 (Manage your work to meet requirements) 4. SSC/N9002 (Work effectively with colleagues) 5. SSC/N9003 (Maintain a healthy, safe and secure working environment) 6. SSC/N9004 (Provide data/information in standard formats) 7. SSC/N9005 (Develop your knowledge, skills and competence) Analyst Security Operations Centre 1

5 This course encompasses 3 out of 3 National Occupational Standards (NOS) of Analyst Security Operations Centre Qualification Pack issued by IT-ITeS SSC. Sr. No. 1 IT-ITES/BPM Industry An Introduction Module Key Learning Outcomes Equipment Required 02:00 01:00 The introduction is not based on any NOS, however is important in order to understand the context of the course and the role. 2 IT Services An Introduction 02:00 01:00 The introduction is not based on any NOS, however is important in order to understand the context of the course and the role. 3 Information/Cyber Security An Introduction Explain relevance of the IT-ITES industry State the various sub-sectors in the IT-ITES sector Explain the relevance of IT services sector A General Overview of the IT BPM Industry The organisations within IT BPM Industry The sub sectors within the IT BPM Industry State the various occupations and tracks in the IT-ITES sector General Overview of the IT Services Sub Sector Profile of the IT Services Sub Sector Key Trends in the IT Services Sub Sector Roles in the IT Services Sub Sector Explain the relevance of cyber security in the society Qualification Pack - Analyst Security Operations Centre List the range of skills and behavior, expected from Analyst Lab equipped with the following: PCs/Laptops Internet with WiFi (Min 2 Mbps Dedicated) Networking Equipment Routers & Switches Chart paper and sketch pens Lab equipped with the following: PCs/Laptops Internet with WiFi (Min 2 Mbps Dedicated) Lab equipped with the following: PCs/Laptops Internet with WiFi (Min 2 Mbps Dedicated) Analyst Security Operations Centre 2

6 Sr. No. Module Key Learning Outcomes Equipment Required 02:00 01:00 The introduction is not based on any NOS, however is important in order to understand the context of the course and the role. 4 Fundamental Concepts 35:00 30:00 SSC/N Monitoring and Data collection 30:00 Security Operations Centre List the responsibilities of an Analyst Security Operations Centre State the growth opportunities for an Analyst Security Operations Centre General Overview of Information/cyber security and its Roles Career Map for Information/cyber security Computer fundamentals including but not limited to hard drives, networking, and encryption Internet ports, protocols and services and their usefulness System architecture and design Basic cyber security concepts Common cyber security solutions Types of electronic evidence, devices containing electronic evidence and external connections to such devices Possible electronic evidence sources relevant networking concepts, devices and terminologies Intrusion Detection Systems Vs Intrusion Prevention Systems use specified monitoring and data collection methods and tools monitor traffic and logs originating using Security Information and Event Whiteboard and markers LCD projector and laptop for Lab equipped with the following: PCs/ laptops o Internet with Wi Fi (min 2 Mbps dedicated) LCD projector and laptop for Chart paper and sketch pens Whiteboard and markers LCD projector and laptop for presentation Lab with: o key devices, software and hardware in a large network o application of multiple networking topology; use of various network protocols; bandwidth management tools; application of host network access controls; hubs; switches; routers; bridges; servers; transmission media IDS/IPS; application of SSL, VPN, 2FA, encryption, etc. provision for software development work in the lab including software and tools Lab with access to organisations for company visits and provision for online research. Analyst Security Operations Centre 3

7 Sr. No. Module Key Learning Outcomes Equipment Required 20:00 SSC/N Basic Analysis 25:00 15:00 SSC/N Responding to Alerts and Events Management (SIEM) tool collect logs from all types of ICT systems devices and applications as required by organisation monitor multiple security technologies, such as monitor external data sources perform telemetry monitoring to identify security platform issues Determine security issues which may have an impact on the enterprise Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources Identify trends and patterns as per standard guidelines for the same coordinate with enterprise-wide computer network defense (CND) staff to validate network alerts Perform analysis of logs for identifying risks Categorise the priority of identified risks by determining potential impact as per organizational processes and policies Describe operational processes such as data analysis and correlation, etc. Explain event and Log analysis and packet analysis record and categorize the service request as per organizational processes and policies prioritize the service request according to organizational Samples of the tools/templates and checklists used for data collection. Lab with Standard Equipment plus access to SIEM tool and other software for log management, event and log analysis. Lab with access to internet for online research Application security Monitoring SOPs of a few organisations Access to spreadsheet software for all students. Provision for online research for all learners Lab with access to SIEM tool and other software s for log management, event and log analysis, packet analysis Lab with 1 event correlation tool Analyst Security Operations Centre 4

8 Sr. No. Module Key Learning Outcomes Equipment Required 25:00 20:00 SSC/N Introduction to Investigation procedures and policies raise incidents in ticketing tools if something is found suspicious during the analysis assign the ticket to the relevant persons as per the type of risk following organisational procedures and policies obtain help or advice from specialist if the problem is outside his/her area of competence or experience follow-up with the relevant personnel for actioning of the tickets within agreed timelines use escalation matrix for unresolved tickets within agreed turnaround times report the results of the monitoring, ticket raising and ticket closure activities using standard documentation following organisational procedures comply with relevant legislation, standards, policies and procedures describe operational processes such as report generation state typical response times and service times for problems maintain a knowledge-base of the known problems explain the importance of documenting, classifying, prioritizing service requests received over voice calls, , incident management tools and incident reports receive and analyse alarms and alerts from various sources within Sample with charts/diagrams on different organisation s different types of Escalation matrix. Lab with internet for online research. Cases for report writing w.r.t recording of requirement, gathering of information and examples of previous reporting documents. Analyst Security Operations Centre 5

9 Sr. No. Module Key Learning Outcomes Equipment Required 30:00 20:00 SSC/N Analysis Tools 35:00 25:00 the enterprise and determine possible causes of such alerts Interpret and incorporate data from multiple tool sources Verify the scope of detected incidents with relevant persons Distinguish these incidents and events from benign activities Perform computer network defense (CND) incident triage, to include determining scope, urgency, and potential impact; Correlate data by researching logs, analysing graphs and packet inspection Perform deep packet analysis to identify DDoS/DoS attack vectors and security threats and mitigation strategy Identify information assets and system components that may be impacted by detected incidents Analyse identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information Perform analysis of log files from a variety of sources to identify possible threats to network Perform health check of the security solution validate Intrusion Prevention System (IPS) alerts against network traffic using packet analysis tools correlate and analyse events using Security Information and Event Management (SIEM) tool to detect IT security incidents. track and document incidents Lab with access to at least one popular open source and one popular paid vulnerability assessment tool along with their tutorials or user manuals in the lab. Such that the learners can download, install and practice on the same. Provide to database and samples of the tools/templates and checklists used for application vulnerability assessment and penetration testing. Lab with 1 event correlation tool Application of firewall, IDPS tool, web security gateways, security and content management on the Analyst Security Operations Centre 6

10 Sr. No. Module Key Learning Outcomes Equipment Required SSC/N Incident Management 25:00 20:00 from initial detection through final resolution using SIEM tool integrate the assets with the SIEM solution for log analysis configure application securely across the environments for minimum exposure and weaknesses Configuration Management Secure configuration of applications network. Access to SIEM tool and other software for log management, event and log analysis, packet Lab with Application of firewall, IDPS tool, web security gateways, security and content management on the network. SSC/N Data Backup 25:00 20:00 Carry out backups of security devices and applications in line with information security policies, procedures and guidelines, where required Explain different types of backups for security devices and applications and how to carry out backups Provide to database and samples of the tools/templates and checklists used for application back up process. SSC/N Manage your work to meet requirements 50:00 Understanding scope of work and working within limits of authority Work and work environment Maintaining Confidentiality Training organization s confidentiality policy 00:00 Analyst Security Operations Centre 7

11 Sr. No. Module Key Learning Outcomes Equipment Required SSC/N Work effectively with colleagues Effective Communication Working Effectively 40:00 Provision to write s and send in the lab Lab with provision for 10:00 internet, , word processor and presentation software SSC/N9002 Chart paper, markers, picture magazines and old newspapers 33 Maintain a healthy, safe and secure working environment Need for Health and Safety at Work Analyst s Role Emergency Situations The training organization s 18:00 Skills for Maintaining Health and Safety at Work current health, safety and security policies and procedures 07:00 Provision for online research in the Lab A sample health and safety policy document SSC/N9003 Emergency broadcast system and mock emergency signage in the appropriate areas of the training institute 34 Provide data/information in standard formats 38:00 Information and Knowledge Management How to manage data/ information effectively Skills required to manage data and information effectively LCD Projector and Laptop for Provision for online research in the lab 12:00 Analyst Security Operations Centre 8

12 Sr. No. Module Key Learning Outcomes Equipment Required SSC/N Develop knowledge, skills and competence 21:00 04:00 Importance of self-development Knowledge and Skills required for the job Avenues for Self-Development Planning for Self-Development Soft copy of QP NOS Provision for online access to all students in the lab Questionnaire and key for Honey and Mumford learning styles SSC/N9005 Grand Total Course Duration: 600 Hours, 0 Minutes (This syllabus/ curriculum has been approved by IT- ITeS Sector Skills Council) Analyst Security Operations Centre 9

13 Trainer Prerequisites for Job role: Analyst Security Operations Centre mapped to Qualification Pack: SSC/Q0909 v1.0 Sr. Area No. 1 Description 2 Personal Attributes 3 Minimum Educational Qualifications 4a Domain Certification 4b Platform Certification 5 Experience Details Analyst Security Operations Centre 10

14 Annexure: Assessment Criteria Assessment Criteria Job Role Analyst Security Operations Centre Qualification Pack SSC/Q909, v1.0 Sector Skill Council IT-ITeS Guidelines for Assessment: 1. Criteria for assessment for each Qualification Pack (QP) will be created by the Sector Skill Council (SSC). Each performance criteria (PC) will be assigned Theory and Skill/Practical marks proportional to its importance in NOS. 2. The assessment will be conducted online through assessment providers authorised by SSC. 3. Format of questions will include a variety of styles suitable to the PC being tested such as multiple choice questions, fill in the blanks, situational judgment test, simulation and programming test. 4. To pass a QP, a trainee should pass each individual NOS. Standard passing criteria for each NOS is 70%. 5. For latest details on the assessment criteria, please visit 6. In case of successfully passing only certain number of NOS's, the trainee is eligible to take subsequent assessment on the balance NOS's to pass the Qualification Pack. Mark Allocation Assessment Outcomes Assessment Criteria for Outcomes Total Marks Out of Theory Skills Practical 1. SSC/N0906 (Monitor and log events and alarms of possible security threats) PC1. verify the scope of information assets and system components to be monitored with authorised persons PC2. use specified monitoring and data collection methods and tools following organisational procedures and policies PC3. monitor organization s traffic and logs originating from ICT systems using various security technologies to detect security threats and health of the ICT systems PC4. monitor external data sources (e.g., computer network defense [CND] vendor sites, Computer Emergency Response Teams, SANS, Security Focus) PC5. determine security issues which may have an impact on the enterprise PC6. perform telemetry monitoring to identify security platform issues PC7. identify and gather information to enable the security of identified devices to be assessed PC8. collect logs from all types of ICT systems devices and applications as required by organisation Analyst Security Operations Centre 11

15 PC9. collect data w.r.t to various types of security alerts /alarms through SIEM PC10. characterize and analyze network traffic to identify anomalous activity and potential threats to network resources PC11. identify trends and patterns using SIEM tool PC12. coordinate with enterprise wide computer network defense (CND) staff to validate network alerts PC13. perform event correlation using information gathered to gain situational awareness and determine the threat potential PC14. perform analysis of logs for identifying risks PC15. categorise the priority of identified risks by determining potential impact as per organizational processes and policies PC16. record and categorize the service request accurately as per organizational processes and policies PC17. raise incidents in ticketing tools if something is found suspicious during the analysis PC18. assign the ticket to the relevant persons as per the type of risk following organisational procedures and policies PC19. prioritize the service request according to organizational procedures and policies PC20. obtain help or advice from specialist if the problem is outside his/her area of competence or experience PC21. report the results of the monitoring, ticket raising and ticket closure activities using standard documentation following organisational procedures PC22. participate in 24/7 security operations center shift schedule PC23. receive shift handover alongwith relevant information, authorities and instructions PC24. comply with relevant legislation, standards, policies and procedures PC25. maintain a knowledge base of the known problems Analyst Security Operations Centre 12

16 2. SSC/N0907 (Investigate and respond to events and alarms that could be security threats) PC26. use escalation matrix for unresolved tickets within agreed turn around times PC1. receive and analyse alarms and alerts from various sources within the enterprise and determine possible causes of such alerts PC2. interpret and incorporate data from multiple tool sources PC3. validate Intrusion Detection System (IDS)/ IPS alerts against network traffic using packet analysis tools PC4. perform deep packet analysis to identify DDoS/DoS attack vectors and security threats and mitigation strategy PC5. verify the scope of detected incidents with relevant persons PC6. distinguish these incidents and events from benign activities PC7. identify the information assets and system components that may be impacted by detected incidents PC8. analyse identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information PC9. perform analysis of log files from a variety of sources to identify possible threats to network security PC10. perform computer network defense (CND) incident triage, to include determining scope, urgency, and potential impact; PC11. correlate data by researching logs, analysing graphs and packet inspection to provide detailed reports PC12. correlate and analyse events using Security Information and Event Management (SIEM) tool to detect IT security incidents PC13. obtain and preserve evidence relating to detected incidents PC14. examine how access to the affected information assets and system components was obtained Total Analyst Security Operations Centre 13

17 4. SSC/N9001 (Manage your work to meet requirements) 5. SSC/N9002 (Work effectively with colleagues) PC15. identify and categorize types of vulnerabilities and associated attacks PC16. determine appropriate course of action in response to identified and analysed anomalous activity PC17. make recommendations for specific actions to be taken to respond to incidents PC18. perform health check of the security solution PC19. use external information sources for incident investigation PC20. report any incidents which cannot be resolved or mitigated to the relevant persons following organisational procedures PC21. follow organisational procedures for the closure of incidents PC22. report on incident management activities using standard documentation following organisational procedures PC23. track and document incidents from initial detection through final resolution using SIEM tool PC24. integrate the assets with the SIEM solution for log analysis PC1. establish and agree your work requirements with appropriate people PC2. tidy keep your immediate work area clean and Total PC3. utilize your time effectively PC4. use resources correctly and efficiently PC5. treat confidential information correctly PC6. work in line with your organization s policies and procedures PC7. work within the limits of your job role PC8. obtain guidance from appropriate people, where necessary PC9. ensure your work meets the agreed requirements PC1. communicate with colleagues clearly, concisely and accurately PC2. work with colleagues to integrate your work effectively with theirs Total Analyst Security Operations Centre 14

18 6. SSC/N9003 (Maintain a healthy, safe and secure working environment) 7. SSC/N9004 (Provide data/information in standard formats) PC3. pass on essential information to colleagues in line with organizational requirements PC4. work in ways that show respect for colleagues PC5. carry out commitments you have made to colleagues PC6. let colleagues know in good time if you cannot carry out your commitments, explaining the reasons PC7. identify any problems you have working with colleagues and take the initiative to solve these problems PC8. follow the organization s policies and procedures for working with colleagues PC1. comply with your organization s current health, safety and security policies and procedures PC2. report any identified breaches in health, safety, and security policies and procedures to the designated person PC3. identify and correct any hazards that you can deal with safely, competently and within the limits of your authority PC4. report any hazards that you are not competent to deal with to the relevant person in line with organizational procedures and warn other people who may be affected PC5. follow your organization s emergency procedures promptly, calmly, and efficiently PC6. identify and recommend opportunities for improving health, safety, and security to the designated person PC7. complete any health and safety records legibly and accurately PC1. establish and agree with appropriate people the data/information you need to provide, the formats in which you need to provide it, and when you need to provide it PC2. obtain the data/information from reliable sources PC3. check that the data/information is accurate, complete and up to date Total Total Analyst Security Operations Centre 15

19 8. SSC/N9005 (Develop your knowledge, skills and competence) PC4. obtain advice or guidance from appropriate people where there are problems with the data/information PC5. carry out rule based analysis of the data/information, if required PC6. insert the data/information into the agreed formats PC7. check the accuracy of your work, involving colleagues where required PC8. report any unresolved anomalies in the data/information to appropriate people PC9. provide complete, accurate and up to date data/information to the appropriate people in the required formats on time PC1. obtain advice and guidance from appropriate people to develop your knowledge, skills and competence PC2. identify accurately the knowledge and skills you need for your job role PC3. identify accurately your current level of knowledge, skills and competence and any learning and development needs PC4. agree with appropriate people a plan of learning and development activities to address your learning needs PC5. undertake learning and development activities in line with your plan PC6. apply your new knowledge and skills in the workplace, under supervision PC7. obtain feedback from appropriate people on your knowledge and skills and how effectively you apply them PC8. review your knowledge, skills and competence regularly and take appropriate action Total Total Analyst Security Operations Centre 16

20 Analyst Security Operations Centre 17

Model Curriculum. Analyst Application Security SECTOR: IT-ITeS SUB-SECTOR: IT Services OCCUPATION: Information/Cyber Security SSC/Q0903 REF ID:

Model Curriculum. Analyst Application Security SECTOR: IT-ITeS SUB-SECTOR: IT Services OCCUPATION: Information/Cyber Security SSC/Q0903 REF ID: Model Curriculum Analyst Application Security SECTOR: SUB-SECTOR: IT-ITeS IT Services OCCUPATION: REF ID: NSQF LEVEL: Information/Cyber Security SSC/Q0903 7 TABLE OF CONTENTS 1. Curriculum... 01 2. Trainer

More information

Model Curriculum. Consultant Network Security SECTOR: IT-ITeS SUB-SECTOR: IT Services OCCUPATION: Information/Cyber Security SSC/Q0917 REF ID:

Model Curriculum. Consultant Network Security SECTOR: IT-ITeS SUB-SECTOR: IT Services OCCUPATION: Information/Cyber Security SSC/Q0917 REF ID: Model Curriculum Consultant Network Security SECTOR: SUB-SECTOR: IT-ITeS IT Services OCCUPATION: REF ID: NSQF LEVEL: Information/Cyber Security SSC/Q0917 8 TABLE OF CONTENTS 1. Curriculum... 01 2. Trainer

More information

Model Curriculum Aerospace Software Testing Engineer

Model Curriculum Aerospace Software Testing Engineer Model Curriculum Aerospace Software Testing Engineer SECTOR: AEROSPACE AND AVIATION SUB-SECTOR: DESIGN AND DEVELOPMENT OCCUPATION: AEROSPACE TESTING, VERIFICATION AND VALIDATION REF ID: AAS/Q3207, V1.0

More information

Model Curriculum. Field Technician (Computing and Peripherals) SECTOR: SUB-SECTOR: OCCUPATION: REF. ID: NSQF LEVEL:

Model Curriculum. Field Technician (Computing and Peripherals) SECTOR: SUB-SECTOR: OCCUPATION: REF. ID: NSQF LEVEL: Model Curriculum Field Technician (Computing and Peripherals) SECTOR: SUB-SECTOR: OCCUPATION: REF. ID: NSQF LEVEL: ELECTRONICS IT HARDWARE AFTER SALES SERVICE ELE/4601 VERSION 1.0 4 TABLE OF CONTENTS

More information

Model Curriculum. Handset Repair Engineer (Level II) TELECOM HANDSET CUSTOMER SERVICE TEL/Q2201, V1.0 4

Model Curriculum. Handset Repair Engineer (Level II) TELECOM HANDSET CUSTOMER SERVICE TEL/Q2201, V1.0 4 Model Curriculum Handset Repair Engineer (Level II) SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: TELECOM HANDSET CUSTOMER SERVICE TEL/Q2201, V1.0 4 2 TABLE OF CONTENTS 1. Curriculum 01 2. Trainer

More information

Model Curriculum. Telecom Terminal Equipment Application Developer (Android)

Model Curriculum. Telecom Terminal Equipment Application Developer (Android) Model Curriculum Telecom Terminal Equipment Application Developer (Android) SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: TELECOM HANDSET TERMINAL EQUIPMENT APPLICATION DEVELOPER TEL/Q2300, V2.0

More information

Model Curriculum GRTP SECTOR: TELECOM SUB-SECTOR: NETWORK MANAGED SERVICES OCCUPATION: OPERATION & MAINTENANCE REF ID: TEL/Q6207 NSQF LEVEL: 4

Model Curriculum GRTP SECTOR: TELECOM SUB-SECTOR: NETWORK MANAGED SERVICES OCCUPATION: OPERATION & MAINTENANCE REF ID: TEL/Q6207 NSQF LEVEL: 4 Model Curriculum GRTP SECTOR: TELECOM SUB-SECTOR: NETWORK MANAGED SERVICES OCCUPATION: OPERATION & MAINTENANCE REF ID: TEL/Q6207 NSQF LEVEL: 4 Grass Root Telecom provider 1 2 TABLE OF CONTENTS 1. Curriculum

More information

Model Curriculum. Telecom Embedded Hardware Developer SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL:

Model Curriculum. Telecom Embedded Hardware Developer SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: Model Curriculum SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: TELECOM HANDSET DEVELOPMENT TESTING AND SUPPORT TEL/Q2303 4 2 TABLE OF CONTENTS 1. Curriculum 01 2. Trainer Prerequisites 05 3. Annexure:

More information

Model Curriculum. Community Service Provider SECTOR: SUB-SECTOR: OCCUPATION:

Model Curriculum. Community Service Provider SECTOR: SUB-SECTOR: OCCUPATION: Model Curriculum SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: AGRICULTURE & ALLIED AGRICULTURE INDUSTRIES AGRI-ENTREPRENEURSHIP AND RURAL ENTERPRISES AGR/Q7802, V1.0 4 TABLE OF CONTENTS 1. Curriculum

More information

Model Curriculum. Telecom -In-Store Promoter TELECOM HANDSET SALES TEL/Q2101, V1.0 4 SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL:

Model Curriculum. Telecom -In-Store Promoter TELECOM HANDSET SALES TEL/Q2101, V1.0 4 SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: Model Curriculum Telecom -In-Store Promoter SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: TELECOM HANDSET SALES TEL/Q2101, V1.0 4 Telecom -In-Store Promoter 1 Telecom -In-Store Promoter 2 TABLE OF

More information

Model Curriculum. Broadband Technician SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL:

Model Curriculum. Broadband Technician SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: Model Curriculum Broadband Technician SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: TELECOM PASSIVE INFRASTRUCTURE CUSTOMER SERVICES TEL/Q0102 4 TABLE OF CONTENTS 1. Curriculum 2. Trainer Prerequisites

More information

Model Curriculum. Equity Dealer. Equity Dealer SECTOR: SUB-SECTOR: OCCUPATION: REFERENCE ID: NSQF LEVEL:

Model Curriculum. Equity Dealer. Equity Dealer SECTOR: SUB-SECTOR: OCCUPATION: REFERENCE ID: NSQF LEVEL: Model Curriculum SECTOR: SUB-SECTOR: OCCUPATION: REFERENCE ID: NSQF LEVEL: BFSI Financial Services Broking/Trading BSC/Q0201, Version No. 1.0 4 Format: ModCur_2015_1_0 Table of Content: Curriculum... 3

More information

Model Curriculum. Installation Technician-Computing and. Peripherals SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL:

Model Curriculum. Installation Technician-Computing and. Peripherals SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: Model Curriculum Installation Technician-Computing and SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: Peripherals ELECTRONICS IT Hardware AFTER SALES SUPPORT ELE/Q4609 version 1.0 3 Installation Technician

More information

Model Curriculum. Telecom Terminal Equipment Application Developer (Native) SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL:

Model Curriculum. Telecom Terminal Equipment Application Developer (Native) SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: Model Curriculum Telecom Terminal Equipment Application Developer (Native) SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: TELECOM HANDSET (TERMINAL APPLICATIONS) TERMINAL EQUIPMENT APPLICATION DEVELOPER

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation

More information

Model Curriculum. 1. Animator SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL:

Model Curriculum. 1. Animator SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: Model Curriculum SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: 1. Media and Entertainment Animation and Gaming Animation MES/Q0701, V.10 4 Certificate CURRICULUM COMPLIANCE TO QUALIFICATION PACK

More information

QUALIFICATIONS PACK - OCCUPATIONAL STANDARDS FOR TELECOM INDUSTRY. SUB-SECTOR: Handset (Terminal Applications)

QUALIFICATIONS PACK - OCCUPATIONAL STANDARDS FOR TELECOM INDUSTRY. SUB-SECTOR: Handset (Terminal Applications) QUALIFICATIONS PACK - OCCUPATIONAL STANDARDS FOR TELECOM INDUSTRY Contents 1. Introduction and Contacts....1 2. Qualifications Pack....2 3. OS Units......3 4. Glossary of Key Terms..4 OS describe what

More information

The Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as:

The Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as: Unit Title: OCR unit number 38 Level: 3 Credit value: 12 Guided learning hours: 100 Unit reference number: Security of ICT Systems D/500/7220 Candidates undertaking this unit must complete real work activities

More information

Furniture and Fittings Skill Council (FFSC) Summative Assessment Framework

Furniture and Fittings Skill Council (FFSC) Summative Assessment Framework Furniture and Fittings Skill Council (FFSC) Summative Assessment Framework The assessment will happen based on the following chart: Level L1- L2 20% Written + 20% Viva+ 60% Practical Knowledge and Skill

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification

IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification Regulation No: 600/5528/5 Page 1 of 15 Contents Page Industry Qualifications...

More information

Pearson BTEC Level 4 Diploma in Information Security Professional Competence

Pearson BTEC Level 4 Diploma in Information Security Professional Competence Pearson BTEC Level 4 Diploma in Information Security Professional Competence Specification Competence-based qualification First registration August 2014 Issue 2 Edexcel, BTEC and LCCI qualifications Edexcel,

More information

Model Curriculum. Field Technician Computing and Peripherals

Model Curriculum. Field Technician Computing and Peripherals Model Curriculum Field Technician Computing and Peripherals SECTOR: ELECTRONICS SUB-SECTOR: IT HARDWARE OCCUPATION: AFTER SALES SERVICE REF ID: ELE/Q4601 VERSION 1.0 NSQF LEVEL: 4 Page 1 of 16 Page 2 of

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

BIIAB Level 2 Certificate in Libraries, Archives and Information Services (QCF)

BIIAB Level 2 Certificate in Libraries, Archives and Information Services (QCF) Qualification Handbook BIIAB Level 2 Certificate in Libraries, 601/5317/9 Version 2 BIIAB July 2015 BIIAB Level 2 Certificate in Libraries, Table of Contents 1. About the BIIAB Level 2 Certificate in Libraries,

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

Qualification Specification

Qualification Specification BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 2.0 March 2018 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 3 - revised September 2016 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

New Zealand Certificate in Contact Centres (Level 3)

New Zealand Certificate in Contact Centres (Level 3) New Zealand Certificate in Contact Centres (Level 3) This programme teaches learners the core skills needed to work effectively in a contact centre. They ll learn techniques for listening, customer focus,

More information

Security Incident Management in Microsoft Dynamics 365

Security Incident Management in Microsoft Dynamics 365 Security Incident Management in Microsoft Dynamics 365 Published: April 26, 2017 This document describes how Microsoft handles security incidents in Microsoft Dynamics 365 2017 Microsoft Corporation. All

More information

Work-ready skills in Business, Administration and IT

Work-ready skills in Business, Administration and IT Work-ready skills in Business, Administration and IT We believe in learning At the core of everything we do is the desire to make a measurable impact on improving people s lives through learning. Pearson

More information

i. ClearQuest ii. JIRA Query Language

i. ClearQuest ii. JIRA Query Language QP CODE: SSC/Q0101 QP TITLE: Engineer Technical Support-Level I OVERVIEW Test Duration Natural Language Options 150 minutes English Distribution of Marks Pass Criteria As mentioned in the Qualification

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Instrumentation, Control and Automation

Instrumentation, Control and Automation Instrumentation, Control and Automation Unit - ICA08 Install, Use and Maintain SCADA Systems This training specification has been developed from the utilities engineering technician standard. The specification

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose

More information

BUILDING AND MAINTAINING SOC

BUILDING AND MAINTAINING SOC BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:

More information

Threat and Vulnerability Assessment Tool

Threat and Vulnerability Assessment Tool TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business Qualification Specification Level 2 Award in Cyber Security Awareness For Business ProQual 2015 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates 4 Assessment

More information

Qualification Specification. IT User Skills (ITQ) Entry 3 Level 1 Level 2

Qualification Specification. IT User Skills (ITQ) Entry 3 Level 1 Level 2 Qualification Specification IT User Skills (ITQ) Entry 3 Level 1 Level 2 Version 6.0 (January 2018) Version 1.0 Page 1 of 51 This qualification specification covers the following qualifications: Qualification

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

BIIAB ICT Systems and Principles for IT Practitioners and Professionals Qualifications Handbook

BIIAB ICT Systems and Principles for IT Practitioners and Professionals Qualifications Handbook Qualification Handbook BIIAB ICT Systems and Principles for IT Practitioners and Professionals Qualifications Handbook BIIAB Level 2 Award In ICT Systems and Principles for Practitioners (QCF) 601/6468/2

More information

BCS Specialist Certificate in Change Management Syllabus

BCS Specialist Certificate in Change Management Syllabus BCS Specialist Certificate in Change Management Syllabus Version 2.0 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales, CCEA or

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business Qualification Specification Level 2 Award in Cyber Security Awareness For Business ProQual 2016 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates 4 Assessment

More information

Qualification Manual. Level 3 Diploma in NGINEERING. Fabrication and Welding. Engineering Technology. Qualification Code: 501/1131/0. Issue 2.

Qualification Manual. Level 3 Diploma in NGINEERING. Fabrication and Welding. Engineering Technology. Qualification Code: 501/1131/0. Issue 2. Qualification Manual Level 3 Diploma in Fabrication and Welding NGINEERING Engineering Technology Qualification Code: 501/1131/0 Issue 2.0 0 Engineering and Technology Contents 1.0 About EAL 2.0 Introduction

More information

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST TERMS OF REFERENCE February 2017 1 TERMS OF REFERENCE FOR

More information

PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR)

PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR) PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR) 1. INTRODUCTION 1.1 Purpose of the Guidelines These guidelines have been developed by TVETA to guide TVET Providers on how to: (i) Prepare, plan, and implement

More information

Model Curriculum. CCTV Installation Technician

Model Curriculum. CCTV Installation Technician Model Curriculum CCTV Installation Technician SECTOR: ELECTRONICS SUB-SECTOR: IT HARDWARE OCCUPATION: AFTER SALES SERVICE REF ID: ELE/Q4605 VERSION 1.0 NSQF LEVEL: 4 CCTV Installation Technician Page 1

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Position Title: IT Security Specialist

Position Title: IT Security Specialist Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such

More information

Vocational Qualifications (QCF, NVQ, NQF) ICT Professional Competence. OCR Report to Centres

Vocational Qualifications (QCF, NVQ, NQF) ICT Professional Competence. OCR Report to Centres Vocational Qualifications (QCF, NVQ, NQF) ICT Professional Competence Level 2 Diploma in ICT Professional Competence (PROCOM) 08737 Level 3 Diploma in ICT Professional Competence (PROCOM) 10262 Level 2

More information

Progression from this unit could be to J0HB 34 Penetration Testing to test the effectiveness of the firewall and its configuration.

Progression from this unit could be to J0HB 34 Penetration Testing to test the effectiveness of the firewall and its configuration. Higher National Unit Specification General information Unit code: J0SA 34 Superclass: CB Publication date: June 2018 Source: Scottish Qualifications Authority Version: 01 Unit purpose The purpose of this

More information

ICT30310 Certificate III in Telecommunications Cabling Qualification Notes

ICT30310 Certificate III in Telecommunications Cabling Qualification Notes ICT30310 Qualification Notes Certificate III in Telecommunications Cabling Descriptor This qualification reflects the role of an operator in the telecommunications industry who can apply a broad range

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

Advanced Manufacturing. and Engineering. Machining (Development Knowledge) Level 3 Diploma in. Qualification Specification

Advanced Manufacturing. and Engineering. Machining (Development Knowledge) Level 3 Diploma in. Qualification Specification Level 3 Diploma in Advanced Manufacturing Machining (Development Knowledge) and Engineering Qualification Specification Overview This qualification has been developed to provide learners with an advanced

More information

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks

More information

VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk

VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18 ocr.org.uk Contents Introduction 1 Key to forms of assessment 1 Version control 2 1 Skills for Business 3 1.1 Administration (Business Professional) 3 1.2

More information

ITC Level 3 Award in Teaching and Assessing First Aid Qualifications G50.T. Qualification Specification Guidance for Centres

ITC Level 3 Award in Teaching and Assessing First Aid Qualifications G50.T. Qualification Specification Guidance for Centres G50.T ITC L3 Award in Teaching and Assessing First Aid Qualifications Guidance for Centres [1] ITC Level 3 Award in Teaching and Assessing First Aid Qualifications Qualification Number: 603/0886/2 G50.T

More information

External Assessment Specifications Document Curriculum. NQF Qualification Title Code

External Assessment Specifications Document Curriculum. NQF Qualification Title Code External Assessment Specifications Document Curriculum NQF Qualification Title Code Level 671101000 Occupational Certificate: Electrician 4 Name E-mail Phone Logo National Assessment Artisan Quality Moderation

More information

ICT30110 Certificate III in Broadband and Wireless Networks Technology

ICT30110 Certificate III in Broadband and Wireless Networks Technology ICT30110 Qualification Notes Certificate III in Broadband and Wireless Networks Technology Descriptor This qualification reflects the role of a tradesperson with a range of telecommunications skills who

More information

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established PERSON SPECIFICATION Area: Crime and Intelligence Directorate Job Title: Cyber PROTECT Officer Weekly Hours: Section: CAID Scale: Grade 6 Version: 1.2 Post No: GI080 Status: Established Version Date: 37

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

Work-ready skills in Business, Administration and IT

Work-ready skills in Business, Administration and IT Work-ready skills in Business, Administration and IT A guide for centres We believe in learning At the core of everything we do is the desire to make a measurable impact on improving people s lives through

More information

Frequently Asked Questions (FAQs) for Trainer

Frequently Asked Questions (FAQs) for Trainer Frequently Asked Questions (FAQs) for Trainer 1 What is a Training of Trainers program (ToT)? Training of Trainers (ToT) is a program for the development of training delivery skills of those who wish to

More information

Cambridge TECHNICALS LEVEL 3

Cambridge TECHNICALS LEVEL 3 Cambridge TECHNICALS LEVEL 3 IT GUIDE Version ocr.org.uk/it CONTENTS Introduction 3 Communication and employability skills for IT 4 2 Information systems 5 3 Computer systems 6 4 Managing networks 7 5

More information

ICT30610 Certificate III in Broadband and Wireless Networks Qualification Notes

ICT30610 Certificate III in Broadband and Wireless Networks Qualification Notes ICT30610 Qualification Notes Certificate III in Broadband and Wireless Networks Descriptor This qualification reflects the role of a tradesperson with a range of telecommunications skills who can: install

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Datasheet SIEM in a nutshell The variety of cyber-attacks is extraordinarily large. Phishing, DDoS attacks in combination with ransomware demanding bitcoins

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

To use centralised systems for remote control of computers and deployment of software, system images and security updates.

To use centralised systems for remote control of computers and deployment of software, system images and security updates. JOB DESCRIPTION POST: First Line Support Desk Analyst GRADE: Support Staff Grade 2/3 RESPONSIBLE TO: KEY PURPOSE: IT Manager To work as part of the ilrc team to provide on-going proactive technical and

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT NOTICE Clients are responsible for ensuring their own compliance with various laws and regulations, including the

More information

Qualification Manual. EAL Level 2 Certificate in Metals Industries Processes QUALIFICATION CODE: 500/7998/0 ISSUE: 2. Page 1 of 14

Qualification Manual. EAL Level 2 Certificate in Metals Industries Processes QUALIFICATION CODE: 500/7998/0 ISSUE: 2. Page 1 of 14 Qualification Manual EAL Level 2 Certificate in Metals Industries Processes QUALIFICATION CODE: 500/7998/0 ISSUE: 2 Page 1 of 14 Contents 1.0 About EAL... 3 2.0 Introduction to the Qualification... 4 3.0

More information

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and

More information

Model Curriculum. Assistant Technician: Street Light Installation & Maintenance SECTOR: SUB-SECTOR: OCCUPATION: POWER DISTRIBUTION

Model Curriculum. Assistant Technician: Street Light Installation & Maintenance SECTOR: SUB-SECTOR: OCCUPATION: POWER DISTRIBUTION Model Curriculum Assistant Technician: Street Light Installation & Maintenance SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: POWER DISTRIBUTION Assistant Technician: Street Light Installation & Maintenance

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

Systems and Principles Unit Syllabus

Systems and Principles Unit Syllabus Systems and Principles Unit Syllabus Level 2 7540-011 www.cityandguilds.com January 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading provider of vocational qualifications, offering

More information