Occupational Certificate – Cyber Security Analyst (252901001)

Categories: Unisa Enterprise
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Entry Requirements

  • NQF 4

Provider Accreditation Requirements for the Knowledge Module

Physical Requirements

  • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
  • QCTO/ MICT SETA requirements

Human Resource Requirements:

  • Lecturer/learner ratio of 1:20 (Maximum)
  • Qualification of lecturer (SME):
    • NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
    • CYBERSECURITY vendor certification
  • Assessors and moderators: accredited by the MICT SETA

Legal Requirements

  • Legal (product) licences to use the software for learning and training
  • OHS compliance certificate
  • Ethical clearance (where necessary)

Module Purpose

The main focus of the learning in this knowledge module is to build an understanding of fundamentals of various computer and network security threats such as identity theft, credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks, and social engineering

Topic elements to be covered include

The learning will enable learners to demonstrate an understanding of:

  • KM-01-KT01: Introduction to computer and mobile device security
  • KM-01-KT02: Various computer and network security threats
  • KM-01-KT03: Identity theft
  • KM-01-KT04: Adopting good cybersecurity practices
  • KM-01-KT05: Safeguard mobile, media and social networking profiles as user
  • KM-01-KT06: Protecting computers, accounts and data as user
  • KM-01-KT07: Understand security incidents and reporting

Venue, Date and Time:

Consult your facilitator should there be any changes to the venue, date and/or time.

Refer to your timetable

Assessments

The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.

This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.

Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.

 

Show More

Course Content

KM-01-KT01- Introduction to computer and mobile device security

  • KT0101 – Governance and legislation
  • KT0102 – Security policy
  • KT0103 Physical security
  • KT0104 Web content filters
  • KT0105 Need for protection of privacy and data

KM-01-KT02 -Various computer and network security threats

KM-01-KT03: Identity theft

KM-01-KT04: Adopting good cybersecurity practices

KM-01-KT05

KM-01-KT06: Protecting computers, accounts and data as user

KM-01-KT07: Understand security incidents and reporting

KM-02 – Fundamentals of network security and defence
Module Code 252901001-KM-02 NQF Level 5 Credits 12 Curriculum Code 252901001 Qualification Title Occupational Certificate: Cybersecurity Analyst SAQA QUAL ID 118986 Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME): NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to build an understanding of the principles and techniques applied in the editing and proofreading processes Network Security and Defence Topic elements to be covered include The learning will enable learners to demonstrate an understanding of: KM-02-KT01: Introduction to network security KM-02-KT02: Network risk and vulnerability management KM-02-KT03: Network defense fundamentals KM-02-KT04: Monitoring for breaches and attacks KM-02-KT05: Network incident response and management Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you. References https://codered.eccouncil.org › course › network-defens.. https://www.checkpoint.com › Secure The Network https://www.sciencedirect.com › topics › computer-science https://www.forcepoint.com › cyber-edu › defense-depth https://www.cisco.com › Products & Services › Security https://www.techtarget.com › searchsecurity › definition https://www.itgovernance.co.uk › what-is-cybersecurity https://www.gartner.com › topics › cybersecurity https://www.ibm.com › za-en › topics › mobile-security https://www.archonsecure.com › mobile-device-guide

KM-02-KT02: Network risk and vulnerability management

KM-02-KT03: Network defense fundamentals
Topic elements to be covered include: KT0301Network security controls, protocols, and devices KT0302Physical security KT0303Host security KT0304Secure firewall configuration and management KT0305Secure IDS configuration and management KT0306Secure VPN configuration and management KT0307Wireless network defense KT0308Data backup and recovery

KM-02-KT04: Monitoring for breaches and attacks
KT0401Network traffic monitoring and analysis KT0402Intricacies of network traffic signature, analysis, and vulnerability scanning

KM-02-KT05: Network incident response and management
Topic elements to be covered include: KT0501Incident response plan KT0502Incident response process KT0503Reporting and documentation KT0504Lessons learnt

Cybersecurity and cyber threats and attacks 252901001-KM-03
Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME):  NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry  CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to build an understanding of principles of cybersecurity and Ethical Hacking and the types of threats and attacks and the respective risk Topic elements to be covered include The learning will enable learners to demonstrate an understanding of:  KM-03-KT01: Information security Governance and compliance  KM-03-KT02: Information security  KM-03-KT03: Foot printing and Reconnaissance  KM-03-KT04: Scanning Networks  KM-03-KT05: Enumeration  KM-03-KT06: Vulnerability Analysis  KM-03-KT07: System Hacking  KM-03-KT08: Malware Threats  KM-03-KT09: Sniffing  KM-03-KT10: Social Engineering  KM-03-KT11: Denial-of-Service  KM-03-KT12: Session Hijacking  KM-03-KT13: Evading IDS, Firewalls, and Honeypots  KM-03-KT14: Hacking Web Servers  KM-03-KT15:SQL Injection  KM-03-KT16: Hacking Wireless Networks  KM-03-KT17: Hacking Mobile Platforms  KM-03-KT18: IoT Hacking  KM-03-KT19: Cloud Computing  KM-03-KT20: Cryptography  KM-03-KT21: Cyber incident response and management Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.

KM-03-KT02: Information security
Topic elements to be covered include: KT0201Information security overview KT0202Information security threats and attack vectors KT0203Penetration testing concepts KT0204Hacking concepts KT0205Ethical hacking concepts KT0206Information security controls

KM-03-KT03: Footprinting and Reconnaissance
Topic elements to be covered include: KT0301Footprinting concepts and objectives KT0302Footprinting uses KT0303Types of foot printing KT0304Passive and active foot printing KT0305Footprinting methodologies KT0306Tools, tricks and techniques for information gathering KT0307Footprinting steps KT0308Countermeasures and prevention KT0309Footprinting Pen Testing

KM-03-KT04: Scanning Networks
Topic elements to be covered include: KT0401 Network scanning concepts and objectives KT0402 Types of scanning KT0403 Scanning methodologies, tools and techniques KT0404 Draw network diagrams KT0405 Scanning pen testing KT0406 Vulnerability scanning KT0407 Countermeasures against scanning

KM-03-KT05: Enumeration
Topic elements to be covered include: KT0501Enumeration concepts and objectives KT0502Types of enumeration KT0503Enumeration countermeasures KT0504Enumeration methodologies, techniques and tools KT0505Enumeration pen testing

KM-03-KT06: Vulnerability Analysis
Topic elements to be covered include: KT0601Vulnerability analysis concepts and objectives KT0602Vulnerability assessment solutions KT0603Vulnerability scoring systems KT0604Vulnerability assessment tools KT0605Vulnerability assessment reports

KM-03-KT07: System Hacking
Topic elements to be covered include: KT0701System hacking concepts KT0702Passwords, privileges, applications KT0703Covering tracks KT0704Penetration testing KT0705Human precautions against hacking

KM-03-KT08: Malware Threats
Topic elements to be covered include: KT0801Malware concepts and objectives KT0802Malware types KT0803Malware analysis KT0804Countermeasures and anti-malware software KT0805Malware penetration testing

KM-03-KT09: Sniffing
Topic elements to be covered include: KT0901 Sniffing concepts and objectives KT0902 Sniffing attacks KT0903 Sniffing techniques KT0904 Sniffing tools KT0905 Countermeasures KT0906 Detection techniques KT0907 Sniffing pen testing

KM-03-KT10: Social Engineering
Topic elements to be covered include: KT1001Social engineering concepts and objectives KT1002Social engineering techniques KT1003Types of social engineering attacks KT1004Countermeasures KT1005Social engineering penetration testing

KM-03-KT11: Denial-of-Service
Topic elements to be covered include: KT1101DoS/DDoS concepts and objectives KT1102DoS/DDoS attack techniques and tools KT1103Countermeasures and protection tools KT1104DoS/DDoS attack penetration testing

KM-03-KT12: Session Hijacking
Topic elements to be covered include: KT1201Session hijacking concepts KT1202Types of level session hijacking KT1203Session hijacking tools KT1204Countermeasures KT1205Penetration testing

KM-03-KT13: Evading IDS, Firewalls, and Honeypots
Topic elements to be covered include: KT1301IDS, Firewall, and Honeypot Concepts KT1302IDS, Firewall, and Honeypot Solutions KT1303Evading IDS and Firewalls KT1304IDS/Firewall Evading Tools KT1305Detecting Honeypots KT1306IDS/Firewall Evasion Countermeasures KT1307Penetration Testing

KM-03-KT14: Hacking Web Servers
Topic elements to be covered include: KT1401Web server concepts KT1402Web server attacks KT1403Attack tools KT1404Countermeasures KT1405Defense attack mechanisms KT1406Security tools KT1407Penetration testing and pen testing tools

KM-03-KT15:SQL Injection
Topic elements to be covered include: KT1501SQL injection concepts KT1502Types of SQL injection KT1503SQL injection methodology and tools KT1504Evasion techniques KT1505Countermeasures

KM-03-KT16: Hacking Wireless Networks
Topic elements to be covered include: KT1601Wireless concepts KT1602Wireless encryption KT1603Wireless threats KT1604Wireless hacking methodology and tools KT1605Bluetooth hacking Topic elements to be covered include: KT1601Wireless concepts KT1602Wireless encryption KT1603Wireless threats KT1604Wireless hacking methodology and tools KT1605Bluetooth hacking KT1606Countermeasures and security tools KT1607Wi-Fi Pen Testing

KM-03-KT17: Hacking Mobile Platforms

KM-03-KT18: IoT Hacking
Topic elements to be covered include: KT1801 IoT concepts KT1802 IoT attacks KT1803 IoT hacking methodology and tools KT1804 Countermeasures KT1805 IoT pen testing

KM-03-KT19: Cloud Computing
Topic elements to be covered include: KT1901Cloud computing concepts KT1902Cloud computing threats and attacks KT1903Cloud security KT1904Cloud security tools KT1905Cloud penetration testing

KM-03-KT20: Cryptography
Topic elements to be covered include: KT2001Cryptography concepts and objectives KT2002Types of cryptography KT2003Encryption algorithms KT2004Cryptography tools KT2005Types of encryption KT2006Cryptanalysis KT2007Countermeasures

KM-03-KT21: Cyber incident response and management
KT2101Incident response plan KT2102Incident response process KT2103Incidence response phases Preparation Detection and analysis Containment and quarantine Eradication Recovery (return to production, data) KT2104Post-incident activity (Lessons Learned) Identify changes to security Employee training Weaknesses in the security system Updates

252901001-KM-04 -Introduction to cybersecurity governance, legislation and ethics
Module Code 252901001-KM-04 NQF Level 4 Credits 4 Curriculum Code 252901001 Qualification Title Occupational Certificate: Cybersecurity Analyst SAQA QUAL ID 118986 Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME):  NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry  CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to acquire general knowledge and understanding of the various legislations governing the workplace and their implication for the employer and employees. The learning of this module will also enable the learner to acquire an understanding of the principles of areas of performance management, business planning concepts, costing of products and concepts of general ethical behaviour and its impact in the workplace Topic elements to be covered include The learning will enable learners to demonstrate an understanding of:  KM-04-KT01: Governance  KM-04-KT02: Legislation governing workplaces  KM-04-KT03: Introduction to ethics and security  KM-04-KT04: Ethics at work  KM-04-KT05: Security  KM-04-KT06: Performance management  KM-04-KT07: Business planning  KM-04-KT08: Costing of products  KM-04-KT09: Resources Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you. REFERENCE https://www.saflii.org › legis › consol_act › https://codered.eccouncil.org › course › network-defens.. https://www.checkpoint.com › Secure The Network https://www.sciencedirect.com › topics › computer-science https://www.forcepoint.com › cyber-edu › defense-depth https://www.cisco.com › Products & Services › Security https://www.techtarget.com › searchsecurity › definition https://www.itgovernance.co.uk › what-is-cybersecurity https://www.gartner.com › topics › cybersecurity https://www.ibm.com › za-en › topics › mobile-security https://www.archonsecure.com › mobile-device-guide https://preyproject.com › blog › what-are-cyber-threats-h.. https://emeritus.org › learn › different-types-of-cyber-s https://www.simplilearn.com › cyber-security-tutorial

KM-04-KT02: Legislation governing workplaces
Learning Outcome KT0201 LRA KT0202 POPI KT0203 B-BBEE KT0204 BCEA KT0205 SDA KT0206 Current trends

KM-04-KT03: Introduction to ethics and security
Learning Outcome KT0301 Principles and practices KT0302 Concepts, definitions and terminology

Student Ratings & Reviews

No Review Yet
No Review Yet