Curriculum
Cyber Intrusion Analyst curriculum
Firebrand’s apprenticeship programme covers all mandatory knowledge and skills outlined in the apprenticeship standard. Every Firebrand apprentice attends a suite of market-leading training programmes, to cover knowledge required from the apprenticeship standard. This training is then fleshed out through a package of selected online learning, which also allows apprentices to explore any topics of particular interest/importance to them in greater depth.
How are apprentices taught?
Apprentices receive a range of market-leading training as part of their qualification – typically between three and five courses per apprenticeship - giving them fundamental skills at speed.
We'll deliver all the knowledge apprentices need to learn for each knowledge module in the Standard through our Lecture | Lab | Review delivery. Apprentices then attend a Syllabus Review Session to cover the knowledge content covered in the apprenticeship standard.
Knowledge Module 1: Networks
Upon completion of this Knowledge Module, Cyber Intrusion Analyst apprentices will:
- Understand IT network features and
functions, including virtual networking,
principles and common practice in
network security and the OSI and TCP/IP
models, and the function and features of
the main network appliances in use
Read through the full curriculum for Firebrand's classroom-based training and supporting online learning modules below.
Networking Concepts
- Explain the purposes and uses of ports and protocols.
- Explain devices, applications, protocols and services at their appropriate OSI layers
- Explain the concepts and characteristics of routing and switching.
- Given a scenario, configure the appropriate IP addressing components.
- Compare and contrast the characteristics of network topologies, types and technologies.
- Given a scenario, implement the appropriate wireless technologies and configurations.
- Summarize cloud concepts and their purposes
- Explain the functions of network services.
Infrastructure
- Given a scenario, deploy the appropriate cabling solution.
- Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.
- Explain the purposes and use cases for advanced networking devices.
- Explain the purposes of virtualization and network storage technologies.
- Compare and contrast WAN technologies.
Network Operations
- Given a scenario, use appropriate documentation and diagrams to manage the network.
- Compare and contrast business continuity and disaster recovery concepts.
- Explain common scanning, monitoring and patching processes and summarize their expected outputs.
- Given a scenario, use remote access methods.
- Identify policies and best practices.
Network Security
- Summarize the purposes of physical security devices.
- Explain authentication and access controls.
- Given a scenario, secure a basic wireless network.
- Summarize common networking attacks.
- Given a scenario, implement network device hardening
- Explain common mitigation techniques and their purposes.
Network Troubleshooting and Tools
- Explain the network troubleshooting methodology.
- Given a scenario, use the appropriate tool.
- Given a scenario, troubleshoot common wired connectivity and performance issues.
- Given a scenario, troubleshoot common wireless connectivity and performance issues.
- Given a scenario, troubleshoot common network service issues.
- Networking Fundamentals Part 1 (4h 18 minutes)*
- Networking Fundamentals Part 2 (3h 47 minutes)*
- Network Architecture (7h 25 minutes)*
- Networking Operations (4h 33minutes)*
- Networking Security (5h 6 minutes)*
- Troubleshooting (4h 5 minutes)*
- Industrial Standards, Practices and Network Theory (4h 9 minutes)*
Total time: 26hours 14minutes
Knowledge Modules 2 & 3: Operating Systems & Information and Cyber Security Foundations
Upon completion of Knowledge Module 2, Cyber Intrusion Analyst apprentices will:
- Understand and utilise at least three
Operating System (OS) security functions
and associated features
Upon completion of Knowledge Module 3, Cyber Intrusion Analyst apprentices will:
- Understand and apply the foundations
of information and cyber security
including: explaining the importance of
cyber security and basic concepts including
harm, identity, confidentiality, integrity,
availability, threat, risk and hazard, trust
and assurance and the ‘insider threat’ as
well as explaining how the concepts relate
to each other and the significance of risk
to a business
- Understand and propose appropriate
responses to current and new attack
techniques, hazards and vulnerabilities
relevant to the network and business
environment
- Understand and propose how to deal
with emerging attack techniques, hazards
and vulnerabilities relevant to the network
and business environment
Read through the full curriculum for Firebrand's classroom-based training and supporting online learning modules below.
1.0 Threats, Attacks and Vulnerabilities
- 1.1 Given a scenario, analyse indicators of compromise and determine the type of malware.
- 1.2 Compare and contrast types of attacks.
- 1.3 Explain threat actor types and attributes.
- 1.4 Explain penetration testing concepts.
- 1.5 Explain vulnerability scanning concepts.
- 1.6 Explain the impact associated with types of vulnerabilities.
2.0 Technologies and Tools
- 2.1 Install and configure network components, both hardwareand software-based, to support organisational security.
- 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organisation.
- 2.3 Given a scenario, troubleshoot common security issues.
- 2.4 Given a scenario, analyse and interpret output from security technologies.
- 2.5 Given a scenario, deploy mobile devices securely.
- 2.6 Given a scenario, implement secure protocols.
3.0 Architecture and Design
- 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
- 3.2 Given a scenario, implement secure network architecture concepts.
- 3.3 Given a scenario, implement secure systems design.
- 3.4 Explain the importance of secure staging deployment concepts.
- 3.5 Explain the security implications of embedded systems.
- 3.6 Summarise secure application development and deployment concepts.
- 3.7 Summarise cloud and virtualisation concepts.
- 3.8 Explain how resiliency and automation strategies reduce risk.
- 3.9 Explain the importance of physical security controls.
4.0 Identity and Access Management
- 4.1 Compare and contrast identity and access management concepts.
- 4.2 Given a scenario, install and configure identity and access services.
- 4.3 Given a scenario, implement identity and access management controls.
- 4.4 Given a scenario, differentiate common account management practices.
5.0 Risk Management
- 5.1 Explain the importance of policies, plans and procedures related to organisational security.
- 5.2 Summarise business impact analysis concepts.
- 5.3 Explain risk management processes and concepts.
- 5.4 Given a scenario, follow incident response procedures.
- 5.5 Summarise basic concepts of forensics.
- 5.6 Explain disaster recovery and continuity of operation concepts.
- 5.7 Compare and contrast various types of controls.
- 5.8 Given a scenario, carry out data security and privacy practices.
6.0 Cryptography and PKI
- 6.1 Compare and contrast basic concepts of cryptography.
- 6.2 Explain cryptography algorithms and their basic characteristics.
- 6.3 Given a scenario, install and configure wireless security settings.
- 6.4 Given a scenario, implement public key infrastructure.
- Compliance and Operational Security (5h 48 minutes)*
- Threats and Vulnerabilities (3h 44 minutes)*
- Application, Data and Host Security (2h 16 minutes)*
- Identity and Access Management (1h 37 minutes)*
- Cryptography (1h 32 minutes)*
- Understanding Ethical Hacking (7h)*
- Penetration Testing (1h 38 minutes)*
- Malware Analysis fundamentals (3h 20minutes)*
Total time: 30hours 43minutes
Knowledge Modules 4 & 5: Business Processes & Law, Regulation and Ethics
Upon completion of Knowledge Module 4, Cyber Intrusion Analyst apprentices will:
- Understand the lifecycle and service
management practices to Information
Technology Infrastructure Library (ITIL)
foundation level
- Understand and advise others on cyber
incident response processes, incident
management processes and evidence
collection/preservation requirements to
support incident investigation
Upon completion of Knowledge Module 5, Cyber Intrusion Analyst apprentices will:
- Understand the main features and
applicability of law, regulations and
standards (including Data Protection
Act/Directive, Computer Misuse Act, ISO
27001) relevant to cyber network defence
and follows these appropriately.
- Understand, adhere to and advises on
the ethical responsibilities of a cyber
security professional.
Read through the full curriculum for Firebrand's classroom-based training and supporting online learning modules below.
1. Information Security Management Principles
- Concepts and Definitions
- The Need for, and the Benefits of Information Security
2. Information Risk
- Threats to, and Vulnerabilities of Information Systems
- Risk Management
3. Information Security Framework
- Organisation and Responsibilities
- The Organisation’s Management of Security
- Organisational Policy, Standards and Procedures
- Information Security Governance
- Information Security Implementation
- Security Information Management
- Legal Framework
- Security Standards and Procedures
4. Procedural / People Security Controls
- People
- User Access Controls
- Communication, Training and Awareness
5. Technical Security Controls
- Protection from Malicious Software
- Networks and Communications
- External Services
- Cloud Computing
- IT Infrastructure
6. Software Development and Lifecycle
- Testing, Audit and Review
- Systems Development and Support
7. Physical and Environmental Security Controls
8. Disaster Recovery and Business Continuity Management
9. Other Technical Aspects
- Investigations and Forensics
- Role of Cryptography
- Core Concepts (1h 18 minutes)*
- Lifecycle Phases and Processes (3h 42 minutes)*
- Enterprise Security: Policies, Practices and Procedures (2h 38minutes)*
- The Issues of Identity and Access Management (2h 55minutes)*
- Secure Software Development (3h 15minutes)*
- Performing and Analysing Network Reconnaissance (7h 24minutes)*
- Implementing and Performing Vulnerability Management (3h 19minutes)*
- Performance Incident Response and Handling (5h 19minutes)*
Total time: 29 hours 50 minutes
- The Information Security Big Picture (2h 17minutes)*
- Cyber Security Awareness: Digital Data Protection (49minutes)*
- Laws and standards (13 minutes)*
- ISO Standards (2h 20 minutes)*
- Security and Risk Management (4h 3minutes)*
- CAPS*
Total time: 9hours 42minutes