Occupational Certificate – Cyber Security Analyst (252901001)
About Course
Entry Requirements
- NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
- The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
- QCTO/ MICT SETA requirements
Human Resource Requirements:
- Lecturer/learner ratio of 1:20 (Maximum)
- Qualification of lecturer (SME):
- NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
- CYBERSECURITY vendor certification
- Assessors and moderators: accredited by the MICT SETA
Legal Requirements
- Legal (product) licences to use the software for learning and training
- OHS compliance certificate
- Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of fundamentals of various computer and network security threats such as identity theft, credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks, and social engineering
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
- KM-01-KT01: Introduction to computer and mobile device security
- KM-01-KT02: Various computer and network security threats
- KM-01-KT03: Identity theft
- KM-01-KT04: Adopting good cybersecurity practices
- KM-01-KT05: Safeguard mobile, media and social networking profiles as user
- KM-01-KT06: Protecting computers, accounts and data as user
- KM-01-KT07: Understand security incidents and reporting
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
Course Content
KM-01-KT01- Introduction to computer and mobile device security
-
KT0101 – Governance and legislation
-
KT0102 – Security policy
-
KT0103 Physical security
-
KT0104 Web content filters
-
KT0105 Need for protection of privacy and data
KM-01-KT02 -Various computer and network security threats
-
KT0201 Malware
-
KT0203 Spyware
-
KT0204 Adware
-
KT0205 Trojan horses
-
KT0206 Worms
-
KT0207 Phishing
-
KT0208 Spear phishing
-
KT0209 Insider security threats
KM-01-KT03: Identity theft
-
KT0301 Phishing scams
-
KT0302 Malware
-
KT0303 Social engineering
-
KT0304 Financial frauds
KM-01-KT04: Adopting good cybersecurity practices
-
KT0401 Use of registered software
-
KT0402 Update software when they become old to newer versions which tend to have more security upgrades
-
KT0403 Encrypt data
-
KT0404 Use strong authentication (passwords and credentials) for all accounts
-
KT0405 Change passwords often and make sure they are strong and not easy to guess
-
KT0406 Data backup
KM-01-KT05
-
KT0501 Security on social networking sites
-
KT0502 Securing mobile devices
KM-01-KT06: Protecting computers, accounts and data as user
-
KT0601 Securing operating systems
-
KT0602 Internet security
-
KT0603 Securing email communications
-
KT0604 Securing the cloud
-
KT0605 Securing network connections
-
KT0606 Firewalls
-
KT0607 Antivirus programs
-
KT0608 Antispyware
KM-01-KT07: Understand security incidents and reporting
-
KT0701 Data backup
-
KT0702 Disaster recovery
KM-02 – Fundamentals of network security and defence
Module Code 252901001-KM-02
NQF Level 5
Credits 12
Curriculum Code 252901001
Qualification Title Occupational Certificate: Cybersecurity Analyst
SAQA QUAL ID 118986
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of the principles and techniques applied in the editing and proofreading processes Network Security and Defence
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-02-KT01: Introduction to network security
KM-02-KT02: Network risk and vulnerability management
KM-02-KT03: Network defense fundamentals
KM-02-KT04: Monitoring for breaches and attacks
KM-02-KT05: Network incident response and management
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
References
https://codered.eccouncil.org › course › network-defens..
https://www.checkpoint.com › Secure The Network
https://www.sciencedirect.com › topics › computer-science
https://www.forcepoint.com › cyber-edu › defense-depth
https://www.cisco.com › Products & Services › Security
https://www.techtarget.com › searchsecurity › definition
https://www.itgovernance.co.uk › what-is-cybersecurity
https://www.gartner.com › topics › cybersecurity
https://www.ibm.com › za-en › topics › mobile-security
https://www.archonsecure.com › mobile-device-guide
-
KM-02-KT0101 Governance and legislation
-
KM-02-KT0102 Security policy
-
KM-02-KT0103 Physical security
-
KM-02-KT0104 Web content filters
-
KM-02-KT0105 Need for protection of privacy and data
KM-02-KT02: Network risk and vulnerability management
-
KM-02-KT0201 Network security threats, vulnerabilities, and attacks
-
KM-02-KT0202 Knowledge on how to protect, detect, and respond to network attacks
KM-02-KT03: Network defense fundamentals
Topic elements to be covered include:
KT0301Network security controls, protocols, and devices
KT0302Physical security
KT0303Host security
KT0304Secure firewall configuration and management
KT0305Secure IDS configuration and management
KT0306Secure VPN configuration and management
KT0307Wireless network defense
KT0308Data backup and recovery
-
KM-02-KT0301 Network security controls, protocols, and devices
-
KM-02-KT0302 Physical security
-
KM-02-KT0303 Host security
-
KM-02-KT0304 Secure firewall configuration and management
-
KM-02-KT0305 Secure IDS configuration and management
-
KM-02-KT0306 Secure VPN configuration and management
-
KM-02-KT0307 Wireless network defense
-
KM-02-KT0308 Data backup and recovery
KM-02-KT04: Monitoring for breaches and attacks
KT0401Network traffic monitoring and analysis
KT0402Intricacies of network traffic signature, analysis, and vulnerability scanning
-
KM-02-KT0401 Network traffic monitoring and analysis
-
KM-02-KT0402 Intricacies of network traffic signature, analysis, and vulnerability scanning
KM-02-KT05: Network incident response and management
Topic elements to be covered include:
KT0501Incident response plan
KT0502Incident response process
KT0503Reporting and documentation
KT0504Lessons learnt
-
KM-02-KT0501 Incident response plan
-
KM-02-KT0502 Incident response process
-
KM-02-KT0503 Reporting and documentation
-
KM-02-KT0504 Lessons learnt
Cybersecurity and cyber threats and attacks 252901001-KM-03
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of principles of cybersecurity and Ethical Hacking and the types of threats and attacks and the respective risk
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-03-KT01: Information security Governance and compliance
KM-03-KT02: Information security
KM-03-KT03: Foot printing and Reconnaissance
KM-03-KT04: Scanning Networks
KM-03-KT05: Enumeration
KM-03-KT06: Vulnerability Analysis
KM-03-KT07: System Hacking
KM-03-KT08: Malware Threats
KM-03-KT09: Sniffing
KM-03-KT10: Social Engineering
KM-03-KT11: Denial-of-Service
KM-03-KT12: Session Hijacking
KM-03-KT13: Evading IDS, Firewalls, and Honeypots
KM-03-KT14: Hacking Web Servers
KM-03-KT15:SQL Injection
KM-03-KT16: Hacking Wireless Networks
KM-03-KT17: Hacking Mobile Platforms
KM-03-KT18: IoT Hacking
KM-03-KT19: Cloud Computing
KM-03-KT20: Cryptography
KM-03-KT21: Cyber incident response and management
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
-
KM-03-KT0101 Governance and legislation
-
KM-03-KT0102 Need for data protection
-
KM-03-KT0103 Computer network and defense fundamentals
-
KM-03-KT0104 Network security policy design and implementation
-
KM-03-KT0105 Information security laws and standards
KM-03-KT02: Information security
Topic elements to be covered include:
KT0201Information security overview
KT0202Information security threats and attack vectors
KT0203Penetration testing concepts
KT0204Hacking concepts
KT0205Ethical hacking concepts
KT0206Information security controls
-
KM-03-KT0201Information security overview
-
KM-03-KT0202 Information security threats and attack vectors
-
KM-03-KT0203 Penetration testing concepts
-
KM-03-KT0204 Hacking concepts
-
KM-03-KT0205 Ethical hacking concepts
-
KM-03-KT0206 Information security controls
KM-03-KT03: Footprinting and Reconnaissance
Topic elements to be covered include:
KT0301Footprinting concepts and objectives
KT0302Footprinting uses
KT0303Types of foot printing
KT0304Passive and active foot printing
KT0305Footprinting methodologies
KT0306Tools, tricks and techniques for information gathering
KT0307Footprinting steps
KT0308Countermeasures and prevention
KT0309Footprinting Pen Testing
-
KM-03-KT0301 Foot printing concepts and objectives
-
KM-03-KT0302 Footprinting uses
-
KM-03-KT0303 Types of foot printing
-
KM-03-KT0304 Passive and active foot printing
-
KM-03-KT0305 Foot printing methodologies
-
KM-03-KT0306 Tools, tricks and techniques for information gathering
-
KM-03-KT0307 Footprinting steps
-
KM-03-KT0308 Countermeasures and prevention
-
KM-03-KT0309 Footprinting Pen Testing
KM-03-KT04: Scanning Networks
Topic elements to be covered include:
KT0401 Network scanning concepts and objectives
KT0402 Types of scanning
KT0403 Scanning methodologies, tools and techniques
KT0404 Draw network diagrams
KT0405 Scanning pen testing
KT0406 Vulnerability scanning
KT0407 Countermeasures against scanning
-
KM-03-KT0401 Network scanning concepts and objectives
-
KM-03-KT0402 Types of scanning
-
KM-03-KT0403 Scanning methodologies, tools and techniques
-
KM-03-KT0404 Draw network diagrams
-
KM-03-KT0405 Scanning pen testing
-
KM-03-KT0406 Vulnerability scanning
-
KM-03-KT0407 Countermeasures against scanning
KM-03-KT05: Enumeration
Topic elements to be covered include:
KT0501Enumeration concepts and objectives
KT0502Types of enumeration
KT0503Enumeration countermeasures
KT0504Enumeration methodologies, techniques and tools
KT0505Enumeration pen testing
-
KT0501 Enumeration concepts and objectives
-
KT0502 Types of enumeration
-
KT0503 Enumeration countermeasures
-
KT0504 Enumeration methodologies, techniques and tools
-
KT0505 Enumeration pen testing
KM-03-KT06: Vulnerability Analysis
Topic elements to be covered include:
KT0601Vulnerability analysis concepts and objectives
KT0602Vulnerability assessment solutions
KT0603Vulnerability scoring systems
KT0604Vulnerability assessment tools
KT0605Vulnerability assessment reports
-
KT0601 Vulnerability analysis concepts and objectives
-
KT0602 Vulnerability assessment solutions
-
KT0603 Vulnerability scoring systems
-
KT0604 Vulnerability assessment tools
-
KT0605 Vulnerability assessment reports
KM-03-KT07: System Hacking
Topic elements to be covered include:
KT0701System hacking concepts
KT0702Passwords, privileges, applications
KT0703Covering tracks
KT0704Penetration testing
KT0705Human precautions against hacking
-
KT0701 System hacking concepts
-
KT0702 Passwords, privileges, applications
-
KT0703 Covering tracks
-
KT0704 Penetration testing
KM-03-KT08: Malware Threats
Topic elements to be covered include:
KT0801Malware concepts and objectives
KT0802Malware types
KT0803Malware analysis
KT0804Countermeasures and anti-malware software
KT0805Malware penetration testing
-
KT0801 Malware concepts and objectives
-
KT0802 Malware types
-
KT0803 Malware analysis
-
KT0804 Countermeasures and anti-malware software
-
KT0805 Malware penetration testing
KM-03-KT09: Sniffing
Topic elements to be covered include:
KT0901 Sniffing concepts and objectives
KT0902 Sniffing attacks
KT0903 Sniffing techniques
KT0904 Sniffing tools
KT0905 Countermeasures
KT0906 Detection techniques
KT0907 Sniffing pen testing
-
KT0901 Sniffing concepts and objectives
-
KT0902 Sniffing attacks
-
KT0903 Sniffing techniques
-
KT0904 Sniffing tools
-
KT0905 Countermeasures
-
KT0906 Detection techniques
-
KT0907 Sniffing pen testing
KM-03-KT10: Social Engineering
Topic elements to be covered include:
KT1001Social engineering concepts and objectives
KT1002Social engineering techniques
KT1003Types of social engineering attacks
KT1004Countermeasures
KT1005Social engineering penetration testing
-
KT1001 Social engineering concepts and objectives
-
KT1002 Social engineering techniques
-
KT1003 Types of social engineering attacks
-
KT1004 Countermeasures
-
KT1005 Social engineering penetration testing
KM-03-KT11: Denial-of-Service
Topic elements to be covered include:
KT1101DoS/DDoS concepts and objectives
KT1102DoS/DDoS attack techniques and tools
KT1103Countermeasures and protection tools
KT1104DoS/DDoS attack penetration testing
-
KT1101 DoS/DDoS concepts and objectives
-
KT1102 DoS/DDoS attack techniques and tools
-
KT1103 Countermeasures and protection tools
-
KT1104 DoS/DDoS attack penetration testing
KM-03-KT12: Session Hijacking
Topic elements to be covered include:
KT1201Session hijacking concepts
KT1202Types of level session hijacking
KT1203Session hijacking tools
KT1204Countermeasures
KT1205Penetration testing
-
KT1201 Session hijacking concepts
-
KT1202 Types of level session hijacking
-
KT1203 Session hijacking tools
-
KT1204 Countermeasures
-
KT1205 Penetration testing
KM-03-KT13: Evading IDS, Firewalls, and Honeypots
Topic elements to be covered include:
KT1301IDS, Firewall, and Honeypot Concepts
KT1302IDS, Firewall, and Honeypot Solutions
KT1303Evading IDS and Firewalls
KT1304IDS/Firewall Evading Tools
KT1305Detecting Honeypots
KT1306IDS/Firewall Evasion Countermeasures
KT1307Penetration Testing
-
KT1301 IDS, Firewall, and Honeypot Concepts
-
KT1302 IDS, Firewall, and Honeypot Solutions
-
KT1303 Evading IDS and Firewalls
-
KT1304 IDS/Firewall Evading Tools
-
KT1305 Detecting Honeypots
-
KT1306 IDS/Firewall Evasion Countermeasures
-
KT1307 Penetration Testing
KM-03-KT14: Hacking Web Servers
Topic elements to be covered include:
KT1401Web server concepts
KT1402Web server attacks
KT1403Attack tools
KT1404Countermeasures
KT1405Defense attack mechanisms
KT1406Security tools
KT1407Penetration testing and pen testing tools
-
KT1401 Web server concepts
-
KT1402 Web server attacks
-
KT1403 Attack tools
-
KT1404 Countermeasures
-
KT1405 Defense attack mechanisms
-
KT1406 Security tools
-
KT1407 Penetration testing and pen testing tools
KM-03-KT15:SQL Injection
Topic elements to be covered include:
KT1501SQL injection concepts
KT1502Types of SQL injection
KT1503SQL injection methodology and tools
KT1504Evasion techniques
KT1505Countermeasures
-
KT1501 SQL injection concepts
-
KT1502 Types of SQL injection
-
KT1503 SQL injection methodology and tools
-
KT1504 Evasion techniques
-
KT1505 Countermeasures
KM-03-KT16: Hacking Wireless Networks
Topic elements to be covered include:
KT1601Wireless concepts
KT1602Wireless encryption
KT1603Wireless threats
KT1604Wireless hacking methodology and tools
KT1605Bluetooth hacking
Topic elements to be covered include:
KT1601Wireless concepts
KT1602Wireless encryption
KT1603Wireless threats
KT1604Wireless hacking methodology and tools
KT1605Bluetooth hacking
KT1606Countermeasures and security tools
KT1607Wi-Fi Pen Testing
-
KT1601 Wireless concepts
-
KT1602 Wireless encryption
-
KT1603 Wireless threats
-
KT1604 Wireless hacking methodology and tools
-
KT1605 Bluetooth hacking
-
KT1606 Countermeasures and security tools
-
KT1607 Wi-Fi Pen Testing
KM-03-KT17: Hacking Mobile Platforms
-
KT1701 Mobile platform attack vectors
-
KT1702 Hacking android OS
-
KT1704 Mobile spyware
-
KT1705 Mobile device management
-
KT1706 Mobile security guidelines and tools
-
KT1707 Mobile pen testing
KM-03-KT18: IoT Hacking
Topic elements to be covered include:
KT1801 IoT concepts
KT1802 IoT attacks
KT1803 IoT hacking methodology and tools
KT1804 Countermeasures
KT1805 IoT pen testing
-
KT1801 IoT concepts
-
KT1802 IoT attacks
-
KT1803 IoT hacking methodology and tools
-
KT1804 Countermeasures
-
KT1805 IoT pen testing
KM-03-KT19: Cloud Computing
Topic elements to be covered include:
KT1901Cloud computing concepts
KT1902Cloud computing threats and attacks
KT1903Cloud security
KT1904Cloud security tools
KT1905Cloud penetration testing
-
KT1901 Cloud computing concepts
-
KT1902 Cloud computing threats and attacks
-
KT1903 Cloud security
-
KT1905 Cloud penetration testing
KM-03-KT20: Cryptography
Topic elements to be covered include:
KT2001Cryptography concepts and objectives
KT2002Types of cryptography
KT2003Encryption algorithms
KT2004Cryptography tools
KT2005Types of encryption
KT2006Cryptanalysis
KT2007Countermeasures
-
KT2001 Cryptography concepts and objectives
-
KT2002 Types of cryptography
-
KT2003 Encryption algorithms
-
KT2004 Cryptography tools
-
KT2005 Types of encryption
-
KT2006 Cryptanalysis
-
KT2007 Countermeasures
KM-03-KT21: Cyber incident response and management
KT2101Incident response plan
KT2102Incident response process
KT2103Incidence response phases
Preparation
Detection and analysis
Containment and quarantine
Eradication
Recovery (return to production, data)
KT2104Post-incident activity (Lessons Learned)
Identify changes to security
Employee training
Weaknesses in the security system
Updates
-
KT2101 Incident response plan
-
KT2103 Incidence response phases
-
KT2104 Post-incident activity (Lessons Learned)
252901001-KM-04 -Introduction to cybersecurity governance, legislation and ethics
Module Code 252901001-KM-04
NQF Level 4
Credits 4
Curriculum Code 252901001
Qualification Title Occupational Certificate: Cybersecurity Analyst
SAQA QUAL ID 118986
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to acquire general knowledge and understanding of the various legislations governing the workplace and their implication for the employer and employees. The learning of this module will also enable the learner to acquire an understanding of the principles of areas of performance management, business planning concepts, costing of products and concepts of general ethical behaviour and its impact in the workplace
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-04-KT01: Governance
KM-04-KT02: Legislation governing workplaces
KM-04-KT03: Introduction to ethics and security
KM-04-KT04: Ethics at work
KM-04-KT05: Security
KM-04-KT06: Performance management
KM-04-KT07: Business planning
KM-04-KT08: Costing of products
KM-04-KT09: Resources
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
REFERENCE
https://www.saflii.org › legis › consol_act ›
https://codered.eccouncil.org › course › network-defens..
https://www.checkpoint.com › Secure The Network
https://www.sciencedirect.com › topics › computer-science
https://www.forcepoint.com › cyber-edu › defense-depth
https://www.cisco.com › Products & Services › Security
https://www.techtarget.com › searchsecurity › definition
https://www.itgovernance.co.uk › what-is-cybersecurity
https://www.gartner.com › topics › cybersecurity
https://www.ibm.com › za-en › topics › mobile-security
https://www.archonsecure.com › mobile-device-guide
https://preyproject.com › blog › what-are-cyber-threats-h..
https://emeritus.org › learn › different-types-of-cyber-s
https://www.simplilearn.com › cyber-security-tutorial
-
KM-04-KT01: Governance
-
KT0102 Rules, norms and actions that are structured, sustained, regulated and held accountable
-
KT0103 Structures and processes and industry codes of practice
-
KT0104 Transparent, participatory, inclusive and responsive
-
KT0105 Domains of IT governance
-
KT0106 Compliance vs non-compliance
KM-04-KT02: Legislation governing workplaces
Learning Outcome
KT0201 LRA
KT0202 POPI
KT0203 B-BBEE
KT0204 BCEA
KT0205 SDA
KT0206 Current trends
-
KT0201 LRA
-
KT0202 POPI
-
KT0203 B-BBEE
-
KT0204 BCEA
-
KT0205 SDA
-
KT0206 Current trends
KM-04-KT03: Introduction to ethics and security
Learning Outcome
KT0301 Principles and practices
KT0302 Concepts, definitions and terminology
-
KT0301 Principles and practices
-
KT0302 Concepts, definitions and terminology
