Close
  • Online Apprenticeships
  • Apprenticeships
  • Contact Empentis
  • News
  • Find an apprenticeship
  • How do Apprenticeships Work?
  • Recruit an Apprentice
  • The Apprenticeship Levy
  • Resources & Policy Pages
Are you interested in help with Digital Marketing?
Contact
News
Login
Empentis Training Solutions Online Apprenticeships Digital Marketer
  • Online Apprenticeships
    • Column 1
      • All Online Apprenticeship Courses
      • Cyber Intrusion Analyst Apprenticeship Online
      • Cyber Security Technologist Online
      • Digital Marketer Online
      • Highways Maintenance Online
      • Content Creator Online
      • Operations / Departmental Manager Online
      • Sales Executive Online
      • Team Leader / Supervisor Online
    • Column 2
      • Find an apprenticeship
      • How do Apprenticeships Work?
      • Recruit an Apprentice
      • The Apprenticeship Levy
      • Apprenticeship News
      • Apply for a Course
  • Apprenticeships
    • Column 1
      • All Apprenticeships Courses
      • Advertising and media executive
      • Cyber Intrusion Analyst
      • Cyber Security Technologist
      • Digital Marketer Apprenticeship
      • Groundworker
      • Highways Maintenance Skilled Operative
      • Content Creator
      • Operations/Departmental Manager
      • Sales Executive
      • Team Leader/ Supervisor
    • Column 2
      • Find an apprenticeship
      • How do Apprenticeships Work?
      • Recruit an Apprentice
      • The Apprenticeship Levy
      • Apprenticeship News
      • Apply for a Course
  • Resources
    • Online Videos
      • British Values Video
      • Online Safety Videos
      • Safeguarding Video
    • Policy Documents
      • Cookie Policy
      • Complaints Procedure
      • Equality & Diversity Policy
      • Prevent Policy
      • Privacy Policy
      • Safeguarding Policy
    • Other Pages
      • Site Map
      • Terms of Use
  • About Us
Empentis Training Solutions Online Apprenticeships Digital Marketer
  • Online Apprenticeships
    • Column 1
      • All Online Apprenticeship Courses
      • Cyber Intrusion Analyst Apprenticeship Online
      • Cyber Security Technologist Online
      • Digital Marketer Online
      • Highways Maintenance Online
      • Content Creator Online
      • Operations / Departmental Manager Online
      • Sales Executive Online
      • Team Leader / Supervisor Online
    • Column 2
      • Find an apprenticeship
      • How do Apprenticeships Work?
      • Recruit an Apprentice
      • The Apprenticeship Levy
      • Apprenticeship News
      • Apply for a Course
  • Apprenticeships
    • Column 1
      • All Apprenticeships Courses
      • Advertising and media executive
      • Cyber Intrusion Analyst
      • Cyber Security Technologist
      • Digital Marketer Apprenticeship
      • Groundworker
      • Highways Maintenance Skilled Operative
      • Content Creator
      • Operations/Departmental Manager
      • Sales Executive
      • Team Leader/ Supervisor
    • Column 2
      • Find an apprenticeship
      • How do Apprenticeships Work?
      • Recruit an Apprentice
      • The Apprenticeship Levy
      • Apprenticeship News
      • Apply for a Course
  • Resources
    • Online Videos
      • British Values Video
      • Online Safety Videos
      • Safeguarding Video
    • Policy Documents
      • Cookie Policy
      • Complaints Procedure
      • Equality & Diversity Policy
      • Prevent Policy
      • Privacy Policy
      • Safeguarding Policy
    • Other Pages
      • Site Map
      • Terms of Use
  • About Us

REMOTE LEARNING - ONLINE APPRENTICESHIP

Digital

Cyber Security Technologist

Cyber Security Technologist Certification at Level 4

The primary role of a Cyber Security Technologist is to apply an understanding of cyber threats, hazards, risks, controls, measures and mitigations to protect organisations systems and people.

Those focused on the technical side work on areas such as security design & architecture, security testing, investigations & response. Those focussed on the risk analysis side focus on areas such as operations, risk, governance & compliance.

Whether focused on the technical or risk analysis side, all people in this occupation work to achieve required security outcomes in a legal and regulatory context in all parts of the economy. They develop and apply practical knowledge of information security to deliver solutions that fulfil an organisation’s requirements.

Online Course Delivery

Online apprenticeships will be delivered with 121 video calls with the support of group online virtual classrooms. Regular updates and support from our accredited tutors, and round the clock access to the tutors for any questions you need answering.

This Course Follows a List of Standards

The Operations Departmental Manager course follows a list of standards that a manager is expected to achieve before undertaking a final endpoint assessment (EPA).

The standards follow different criteria consisting of

  • Technical Competencies
  • Technical Knowledge 
  • Understanding

The learner is only put forward to the endpoint assessment once they can properly demonstrate all of the course standards. A full breakdown of these standards can be viewed below.

ALL apprentices will cover the core Technical Competencies and Technical Knowledge and Understanding. In addition to the core, all apprentices will do ONE of the following specialisms, Option 1: Technologist or Option 2: Risk Analyst.

Delivered Online

The Cyber Security Technologist Apprenticeship is delivered online using video calls, online classrooms, and regular virtual contact with your personal tutors.

Level

4

Duration

24 months (this does not include EPA period)

Requirements

Individual employers will set the selection criteria, but this is likely to include A’ Levels, a relevant Level 3 apprenticeship, or other relevant qualifications, relevant experience and/or an aptitude test with a focus on functional maths.

Qualification

Upon completion, learners will be awarded their Cyber Security Technologist Certification at Level 4.

Traditional Version
Back to online apprenticeships
CYBER SECURITY TECHNOLOGIST

Course Breakdown

If you’d like a more detailed breakdown of the skills, knowledge and Professional Behaviours you’ll gain over the course of the apprenticeship, just use the tabs below.
Core Technical Competencies
  • Threats, hazards, risks and intelligence

    • Discover (through a mix of research and practical exploration) vulnerabilities in a system
    • Analyse and evaluate security threats and hazards to a system or service or processes. Be aware of and demonstrate use of relevant external sources of threat intelligence or advice (e.g. CERT UK). Combine different sources to create an enriched view.
    • Research and investigate some common attack techniques and recommend how to defend against them. Be aware of and demonstrate use of  relevant external sources of vulnerabilities (e.g. OWASP)
    • Undertake a security risk assessment for a simple system without direct supervision and propose basic remediation advice in the context of the employer.

    Developing and using a security case

    • Source and analyse a security case (e.g. a Common Criteria Protection Profile for a security component) and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
    • Develop a simple security case without supervision. (A security case should describe the security objectives, threats, and for every identified attack technique identify mitigation or security controls that could include technical, implementation, policy or process).

    Organisational context

    • Identify and follow organisational policies and standards for information and cyber security.
    • Operate according to service level agreements or employer defined performance targets. Future Trends
    • Investigate different views of the future (using more than one external source) and trends in a relevant technology area and describe what this might mean for your business, with supporting reasoning.
Core Technical Knowledge and Understanding
  • Understands the basics of cyber security including:

    • Why cyber security matters – the importance to business and society
    • -Basic theory – concepts such as security, identity, confidentiality, integrity, availability, threat, vulnerability, risk and hazard. Also how these relate to each other and lead to risk and harm
    • Security assurance – concepts (can explain what assurance is for in security, and ‘trustworthy’ versus ‘trusted’) and how assurance may be achieved in practice (can explain what penetration testing is and how it contributes to assurance; and extrinsic assurance methods)
    • How to build a security case – deriving security objectives with reasoned justification in a representative business scenario
    • Cyber security concepts applied to ICT infrastructure – can describe the fundamental building blocks and typical architectures and identify some common vulnerabilities in networks and systems.
    • Attack techniques and sources of threat – can describe the main types of common attack techniques; also the role of human behaviour. Explain how attack techniques combine with motive and opportunity to become a threat.
    • Cyber defence – describe ways to defend against attack techniques
    • Relevant laws and ethics – describe security standards, regulations and their consequences across at least two sectors; the role of criminal and other law; key relevant features of UK and international law
    • The existing threat landscape – can describe and know how to apply relevant techniques for horizon scanning including use of recognised sources of threat intelligence
    • Threat trends – can describe the significance of identified trends  in cyber security and understand the value and risk of this analysis
Specialisms Option 1: Technologist
  • Technical Competencies

    Design build & test a network (“Build a network”)

    • Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, that includes servers, hubs, switches, routers and user devices to a given design requirement without supervision. Provide evidence that the system meets the design requirement.

    Analysing a security case (“Make the security case”)

    • Analyse security requirements (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.), given for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.

    Structured and reasoned implementation of security in a network (“Build a secure network”)

    • Design and build a simple system in accordance with a simple security case. Provide evidence that the system has properly implemented the security controls required by the security case.The system could be either at the enterprise, network or application layer.
    • Select and configure relevant types of common security hardware and software components to implement a given security policy.
    • Design a system employing a crypto to meet defined security objectives. Develop and implement a key management plan for the given scenario/system.

    Technical Knowledge and Understanding

    • Understands the basics of networks: data, protocols and how they relate to each other; the main routing protocols; the main factors affecting network performance including typical failure modes in protocols and approaches to error control.
    • Understands, at a deeper level than from Knowledge Module 1, how to build a security case: describe what good practice in design is; describe common security architectures; be aware of reputable security architectures that incorporates hardware and software components, and sources of architecture patterns and guidance. Understand how to build a security case including context, threats, justifying the selected mitigations and security controls with reasoning and recognising the dynamic and adaptable nature of threats.
    • Understands how cyber security technology components are typically deployed in networks and systems to provide security functionality including: hardware and software
    • Understands the basics of cryptography – can describe the main techniques, the significance of key management, appreciate the legal issues
Specialisms Option 2: Risk Analyst

Technical Competencies

  • Cyber security risk assessment

    • Conduct a cyber-risk assessment against an externally (market) recognised cyber security standard using a recognised risk assessment methodology.
    • Identify threats relevant to a specific organisation and/or sector. Information security policy and process
    • Develop an information security policy or process to address an identified risk.
    • Develop an information security policy within a defined scope to take account of a minimum of 1 law or regulation relevant to cyber security.

    Audit and assurance

    • Take an active part in a security audit against a recognised cyber security standard, undertake a gap analysis and make recommendations for remediation.

    Incident response and business continuity

    • Develop an incident response plan for approval (within an organisations governance arrangements for incident response).
    • Develop a business continuity plan for approval (within an organisations governance arrangements for business continuity).

    Cyber security culture in an organisation

    • Assess security culture using a recognised approach.
    • Design and implement a simple ‘security awareness’ campaign to address a specific aspect of a security culture.

Technical Knowledge and Understanding

Understands relevant types of risk assessment methodologies and approaches to risk treatment; can identify the vulnerabilities in organisations and security management systems; understand the threat intelligence lifecycle; describe different approaches to risk treatment. Understand the role of the risk owner and contrast that role with other stakeholders.

Understands, at a deeper level than from Knowledge Module 1, the legal, standards, regulations and ethical standards relevant to cyber security: governance, organisational structure, roles, policies, standard, guidelines and how these all work together to deliver identified security outcomes. Also awareness of the legal framework, key concepts applying to ISO27001 (a specification for information security management), and awareness of legal and regulatory obligations for breach notification

Underpinning Skills, Attitudes & Behaviours Toggle Title
  • Logical and creative thinking skills
  • Analytical and problem solving skills
  • Ability to work independently and to take responsibility
  • Can use own initiative
  • A thorough and organised approach
  • Ability to work with a range of internal and external people
  • Ability to communicate effectively in a variety of situations
  • Maintain productive, professional and secure working environment
Register Interest
Online Apprenticeships

Remote Learning

  • Digital Marketer

    Implement Digital Campaigns and Drive Sales

  • Content Producer

    Create Graphics, Video, Animation, Broadcast and Print

  • Sales Executive

    Engage Customers and Close Sales

  • Cyber Security Technologist

    Manage Cyber Threats and Hazards

  • Highways Maintenance Skilled Operative

    Repair Damaged Surfaces in Rural and Urban Environments

  • Team Leader

    Manage Teams and Projects

  • Cyber intrusion Analyst

    Detect Breaches in Network Security

  • Operations Departmental Manager

    Take on Responsibility, Manage Teams and Projects

Online Apprenticeships

Apprenticeship Content Creator

Apprenticeship Cyber Intrusion Analyst

Apprenticeship Digital Marketer

Apprenticeship Sales Executive

Apprenticeship Cyber Securities Technologist

Apprenticeship Team Leader

Apprenticeship Highways Maintenance Skilled Operative

Apprenticeship Operations Departmental Manager


Stay in the know

Sign up for our newsletter

Empentis Training Solutions Online Apprenticeships Digital Marketer

Online Apprenticeships

  • Content Producer
  • Cyber Intrusion Analyst
  • Cyber Securities Technologist
  • Digital Marketer
  • Highways Maintenance Operative
  • Operations/Departmental Manager
  • Sales Executive
  • Team Leader/Supervisor
Menu
  • Content Producer
  • Cyber Intrusion Analyst
  • Cyber Securities Technologist
  • Digital Marketer
  • Highways Maintenance Operative
  • Operations/Departmental Manager
  • Sales Executive
  • Team Leader/Supervisor

Page Links

  • Online Apprenticeships
  • Apprenticeships
  • Recruit an Apprentice
  • The Apprenticeship Levy
  • How do Apprenticeships Work?
  • Find an apprenticeship
  • About Empentis
  • Resources & Policy Pages
  • Contact Empentis
  • Empentis News
Menu
  • Online Apprenticeships
  • Apprenticeships
  • Recruit an Apprentice
  • The Apprenticeship Levy
  • How do Apprenticeships Work?
  • Find an apprenticeship
  • About Empentis
  • Resources & Policy Pages
  • Contact Empentis
  • Empentis News

Resources & Policies

  • British Values Video
  • Cookie Policy
  • Complaints Procedure
  • Equality & Diversity Policy
  • Online Safety Videos
  • Prevent Policy
  • Privacy Policy
  • Safeguarding Policy
  • Safeguarding Video
  • Site Map
  • Terms of Use
Menu
  • British Values Video
  • Cookie Policy
  • Complaints Procedure
  • Equality & Diversity Policy
  • Online Safety Videos
  • Prevent Policy
  • Privacy Policy
  • Safeguarding Policy
  • Safeguarding Video
  • Site Map
  • Terms of Use

Get Connected

Are we friends on social media, yet? Use the buttons below to connect to us. We are always happy to engage with people on social media.
Facebook
Twitter
Linkedin
Instagram
info@empentis.co.uk
2021 © Copyright Empentis Training Solutions. All rights reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT