Managing and dealing with cyber threats, hazards and risks to protect organisations, systems and people from harm.
The primary role of a Cyber Security Technologist is to apply an understanding of cyber threats, hazards, risks, controls, measures and mitigations to protect organisations systems and people.
Those focused on the technical side work on areas such as security design & architecture, security testing, investigations & response. Those focussed on the risk analysis side focus on areas such as operations, risk, governance & compliance.
Whether focused on the technical or risk analysis side, all people in this occupation work to achieve required security outcomes in a legal and regulatory context in all parts of the economy. They develop and apply practical knowledge of information security to deliver solutions that fulfil an organisation’s requirements.
This course would consist of 80% on the job learning and 20% off the job learning. During off the job learning, you will be required to physically attend monthly seminars or workshops and 1-2-1 sessions with one of our accredited trainers. These sessions will be delivered at your place of work or at our training centre.
This Cyber Security Technologist course follows a list of standards that a manager is expected to achieve before undertaking a final endpoint assessment (EPA).
The standards follow different criteria consisting of
The learner is only put forward to the endpoint assessment once they can properly demonstrate all of the course standards. A full breakdown of these standards can be viewed below.
ALL apprentices will cover the core Technical Competencies and Technical Knowledge and Understanding. In addition to the core, all apprentices will do ONE of the following specialisms, Option 1: Technologist or Option 2: Risk Analyst.
24 months (this does not include EPA period)
Individual employers will set the selection criteria, but this is likely to include A’ Levels, a relevant Level 3 apprenticeship, or other relevant qualifications, relevant experience and/or an aptitude test with a focus on functional maths.
Cyber Security Technologist Certification at Level 4
This course can be taught anywhere in England & Wales
Threats, hazards, risks and intelligence
Developing and using a security case
Understands the basics of cyber security including:
Design build & test a network (“Build a network”)
Analysing a security case (“Make the security case”)
Structured and reasoned implementation of security in a network (“Build a secure network”)
Technical Knowledge and Understanding
Cyber security risk assessment
Audit and assurance
Incident response and business continuity
Cyber security culture in an organisation
Technical Knowledge and Understanding
Understands relevant types of risk assessment methodologies and approaches to risk treatment; can identify the vulnerabilities in organisations and security management systems; understand the threat intelligence lifecycle; describe different approaches to risk treatment. Understand the role of the risk owner and contrast that role with other stakeholders.
Understands, at a deeper level than from Knowledge Module 1, the legal, standards, regulations and ethical standards relevant to cyber security: governance, organisational structure, roles, policies, standard, guidelines and how these all work together to deliver identified security outcomes. Also awareness of the legal framework, key concepts applying to ISO27001 (a specification for information security management), and awareness of legal and regulatory obligations for breach notification
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.