0800 0567 253
Apply for this course here:
Managing and dealing with cyber threats, hazards and risks to protect organisations, systems and people from harm
The primary role of a Cyber Security Technologist is to apply an understanding of cyber threats, hazards, risks, controls, measures and mitigations to protect organisations systems and people.
Those focused on the technical side work on areas such as security design & architecture, security testing, investigations & response. Those focussed on the risk analysis side focus on areas such as operations, risk, governance & compliance.
Whether focussed on the technical or risk analysis side, all people in this occupation work to achieve required security outcomes in a legal and regulatory context in all parts of the economy. They develop and apply practical knowledge of information security to deliver solutions that fulfil an organisation’s requirements.
Typical job roles
Cyber Operations Manager, Security Architect, Penetration Tester, Security Analyst, Risk Analyst, Intelligence Researcher, Security Sales Engineer, Cyber Security Specialist, Information Security Analyst, Governance & Compliance Analyst, Information Security Assurance & Threat Analyst, Forensics & Incident Response Analyst, Security Engineer, Information Security Auditor, Security Administrator, Information Security Officer.
The duration of this apprenticeship is typically 24 months.
Individual employers will set the selection criteria, but this is likely to include A’ Levels, a relevant Level 3 apprenticeship, or other relevant qualifications, relevant experience and/or an aptitude test with a focus on functional maths.
English and Maths
Level 2 English and Maths will need to be achieved, if not already, prior to taking the end point assessment.
Resources will be available through Smart Assessor, the e-portfolio platform used by the college for apprentices.
This apprenticeship is recognised for entry to both IISP and BCS Associate Membership and for entry onto the Register of IT Technicians confirming SFIA level 3 professional competence. Those completing the apprenticeship are eligible to apply for registration.
Technical Competencies and Technical Knowledge and
CORE - All apprentices will cover the following:
- Technical Competencies
- Threats, hazards, risks and intelligence
- Discover (through a mix of research and practical exploration) vulnerabilities in a system
- Analyse and evaluate security threats and hazards to a system or service or processes. Be aware of and demonstrate use of relevant external sources of threat intelligence or advice (e.g. CERT UK). Combine different sources to create an enriched view.
- Research and investigate some common attack techniques and recommend how to defend against them. Be aware of and demonstrate use of relevant external sources of vulnerabilities (e.g. OWASP)
- Undertake a security risk assessment for a simple system without direct
supervision and propose basic remediation advice in the context of the
Developing and using a security case
- Source and analyse a security case (e.g. a Common Criteria Protection Profile for a security component) and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
- Develop a simple security case without supervision. (A security case
should describe the security objectives, threats, and for every identified
attack technique identify mitigation or security controls that could include
technical, implementation, policy or process).
- Identify and follow organisational policies and standards for information and cyber security.
- Operate according to service level agreements or employer defined performance targets. Future Trends
- Investigate different views of the future (using more than one external source) and trends in a relevant technology area and describe what this might mean for your business, with supporting reasoning.
Technical Knowledge and Understanding
Understands the basics of cyber security including:
- Why cyber security matters – the importance to business and society
- -Basic theory – concepts such as security, identity, confidentiality, integrity, availability, threat, vulnerability, risk and hazard. Also how these relate to each other and lead to risk and harm
- Security assurance – concepts (can explain what assurance is for in security, and ‘trustworthy’ versus ‘trusted’) and how assurance may be achieved in practice (can explain what penetration testing is and how it contributes to assurance; and extrinsic assurance methods)
- How to build a security case – deriving security objectives with reasoned justification in a representative business scenario
- Cyber security concepts applied to ICT infrastructure – can describe the fundamental building blocks and typical architectures and identify some common vulnerabilities in networks and systems.
- Attack techniques and sources of threat – can describe the main types of common attack techniques; also the role of human behaviour. Explain how attack techniques combine with motive and opportunity to become a threat.
- Cyber defence – describe ways to defend against attack techniques
- Relevant laws and ethics – describe security standards, regulations and their consequences across at least two sectors; the role of criminal and other law; key relevant features of UK and international law
- The existing threat landscape – can describe and know how to apply relevant techniques for horizon scanning including use of recognised sources of threat intelligence
- Threat trends – can describe the significance of identified trends in cyber security and understand the value and risk of this analysis.
In addition to the core, all apprentices will do ONE of the following specialisms:
Option 1: Technologist Option 2: Risk Analyst
Underpinning Skills, Attitudes & Behaviours
- Logical and creative thinking skills
- Analytical and problem solving skills
- Ability to work independently and to take responsibility
- Can use own initiative
- A thorough and organised approach
- Ability to work with a range of internal and external people
- Ability to communicate effectively in a variety of situations
- Maintain productive, professional and secure working environment
The assessment process will add value to both the apprentice and the employer, by complementing and building on normal performance management and development tools.
It should enable and encourage progression and continuous professional development, by being linked to professional qualifications and recognition.
On Programme Assessment
Technical Knowledge and Understanding is formally assessed on programme through Ofqual-regulated Knowledge Modules. These must be passed before the end point assessment can take place.
End Point Assessment
The end point assessment include
Course information last updated: Friday 26th February 2021 @ 8.30am (1 day ago)