Cyber Security Technologist (Risk Analyst)

Overview

Cyber Security Technologist (Risk Analyst) Overview

Cyber Security Technologist (Risk Analyst) apprentices develop and apply practical knowledge of information security to deliver solutions that fulfil an organisation's requirements. They'll understand the risk side in areas such as operations, governance and compliance. They'll also have an understanding of cyber threats, hazards, controls, measures and mitigations to protect organization's systems and people.

To achieve their Cyber Security Technologist (Risk Analyst) apprenticeship, apprentices must:

  • Demonstrate competence against seven knowledge modules: Cyber Security Introduction, Network and Digital Communications Theory, Security Case Development, Security Technology Building Blocks, Employment of Cryptography, Risk Assessment and Governance, Organisation, Law, Regulation and Standards. These are assessed by examinations set by the British Computer Society and regulated by Ofqual. Apprentices must pass all seven modules
  • Submit a portfolio of evidence showing how they have applied the knowledge from these modules to projects and activities in their workplace.
  • Complete their formal End Point Assessment, which comprises: a synoptic project to showcase knowledge and skills from across the apprenticeship; a review of their portfolio of evidence; and a final interview with an independent EPA assessor.

Successful Cyber Security Technologist apprentices go on into roles such as a Cyber Operations Manager, Penetration Tester, Security Analyst, Cyber Security Specialist, Information Security Analyst, Security Administrator and Information Security Officer.

Core Technical Competencies

Upon completion of their Cyber Security Technologist (Risk Analyst) apprenticeship, individuals will be able to:

  • discover (through a mix of research and practical exploration) vulnerabilities in a system
  • analyse and evaluate security threats and hazards to a system or service or processes
  • demonstrate use of relevant external sources of threat intelligence or advice (e.g. CERT UK)
  • research and investigate some common attack techniques and recommend how to defend against them
  • demonstrate use of relevant external sources of vulnerabilities (e.g. OWASP)
  • undertake a security risk assessment for a simple system without direct supervision and propose basic remediation advice in the context of the employer
  • source and analyse a security case (e.g. a Common Criteria Protection Profile for a security component) and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern
  • develop a simple security case without supervision
  • identify and follow organisational policies and standards for information and cyber security
  • operate according to service level agreements or employer defined performance targets
  • investigate different views of the future (using more than one external source) and trends in a relevant technology area and describe what this might mean for your business

Core Technical Knowledge and Understanding

Upon completion of their Cyber Security Technologist (Risk Analyst) apprenticeship, individuals will:

  • understand why cyber security matters and the importance to business and society
  • understand concepts such as security, identity, confidentiality, integrity, availability, threat, vulnerability, risk and hazard
  • understand security assurance (can explain what assurance is for in security, and 'trustworthy' versus 'trusted') and how assurance may be achieved in practice (can explain what penetration testing is and how it contributes to assurance; and extrinsic assurance methods)
  • understand how to build a security case
  • describe the fundamental building blocks and typical architectures and identify some common vulnerabilities in networks and systems
  • describe the main types of common attack techniques; also the role of human behaviour
  • explain how attack techniques combine with motive and opportunity to become a threat
  • describe ways to defend against attack techniques
  • describe security standards, regulations and their consequences across at least two sectors; the role of criminal and other law; key relevant features of UK and international law
  • describe and know how to apply relevant techniques for horizon scanning including use of recognised sources of threat intelligence
  • describe the significance of identified trends in cyber security and understand the value and risk of this analysis

Additional Technical Competencies

Upon completion of their Cyber Security Technologist (Risk Analyst) apprenticeship, individuals focusing on the technical side will also be able to:

  • conduct a cyber-risk assessment against an externally (market) recognised cyber security standard using a recognised risk assessment methodology
  • identify threats relevant to a specific organisation and/or sector
  • develop an information security policy or process to address an identified risk
  • develop an information security policy within a defined scope to take account of a minimum of 1 law or regulation relevant to cyber security
  • take an active part in a security audit against a recognised cyber security standard, undertake a gap analysis and make recommendations for remediation
  • develop an incident response plan for approval (within an organisations governance arrangements for incident response)
  • develop a business continuity plan for approval (within an organisations governance arrangements for business continuity)
  • assess security culture using a recognised approach
  • design and implement a simple 'security awareness' campaign to address a specific aspect of a security culture

Additional Technical Knowledge and Understanding

Upon completion of their Cyber Security Technologist (Risk Analyst) apprenticeship, individuals focusing on the technical side will also be able to understand:

  • relevant types of risk assessment methodologies and approaches to risk treatment
  • and identify the vulnerabilities in organisations and security management systems
  • the threat intelligence lifecycle; describe different approaches to risk treatment
  • the role of the risk owner and contrast that role with other stakeholders
  • the legal, standards, regulations and ethical standards relevant to cyber security: governance, organisational structure, roles, policies, standard, guidelines and how these all work together to deliver identified security outcomes

Underpinning Skills, Attitudes and Behaviours

  • logical and creative thinking skills
  • analytical and problem solving skills
  • ability to work independently and to take responsibility
  • can use own initiative
  • a thorough and organised approach
  • ability to work with a range of internal and external people
  • ability to communicate effectively in a variety of situations
  • maintain productive, professional and secure working environment

Qualifications

Apprentices will achieve seven BCS qualifications.

Funding

£18,000

Level

This is a level 4 apprenticeship

Professional Recognition

This apprenticeship is recognised for entry onto the register of IT technicians confirming SFIA level 3 professional competence and those completing the apprenticeship are eligible to apply for registration.

Duration

The duration of this Firebrand apprenticeship is 16 months. Because this period involves both training and the final End Point Assessment (some of which must be carried out in the workplace), employers need to ensure the apprentice’s contract covers the full programme duration.

Registration to the Register of IT Technicians (RITTech)

Once apprentices have completed their apprenticeship they are officially recognised by the British Computer Society (BCS) for entry onto the Register of IT Technicians, confirming SFIA level 3 professional competence.

Curriculum

Cyber Security Technologist (Risk Analyst) curriculum

Firebrand’s apprenticeship programme covers all mandatory knowledge and skills outlined in the apprenticeship standard. Every Firebrand apprentice attends a suite of market-leading training programmes, to cover knowledge required from the apprenticeship standard. This training is then fleshed out through a package of selected online learning, which also allows apprentices to explore any topics of particular interest/importance to them in greater depth.

How are apprentices taught?

Apprentices receive a range of market-leading training as part of their qualification – typically between three and five courses per apprenticeship - giving them fundamental skills at speed.

We'll deliver all the knowledge apprentices need to learn for each knowledge module in the Standard through our Lecture | Lab | Review delivery. Apprentices then attend a Syllabus Review Session to cover the knowledge content covered in the apprenticeship standard.


Knowledge Module 1 & 6: Cyber Security Introduction and Risk Assessment

Upon completion of Knowledge Module 1, Cyber Security Technologist (Risk Analyst) apprentices will:

  • Understand different cyber security processes and how their are applied in various cyber roles

Read through the full curriculum for Firebrand's classroom-based training and supporting online learning modules below.

Upon completion of this Knowledge Module, Cyber Security apprentices will:

  • Understand cyber risk assessment

Read through the full curriculum for Firebrand's classroom-based training and supporting online learning modules below.

1.0 Threats, Attacks and Vulnerabilities

  • 1.1 Given a scenario, analyse indicators of compromise and determine the type of malware.
  • 1.2 Compare and contrast types of attacks.
  • 1.3 Explain threat actor types and attributes.
  • 1.4 Explain penetration testing concepts.
  • 1.5 Explain vulnerability scanning concepts.
  • 1.6 Explain the impact associated with types of vulnerabilities.

2.0 Technologies and Tools

  • 2.1 Install and configure network components, both hardwareand software-based, to support organisational security.
  • 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organisation.
  • 2.3 Given a scenario, troubleshoot common security issues.
  • 2.4 Given a scenario, analyse and interpret output from security technologies.
  • 2.5 Given a scenario, deploy mobile devices securely.
  • 2.6 Given a scenario, implement secure protocols.

3.0 Architecture and Design

  • 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  • 3.2 Given a scenario, implement secure network architecture concepts.
  • 3.3 Given a scenario, implement secure systems design.
  • 3.4 Explain the importance of secure staging deployment concepts.
  • 3.5 Explain the security implications of embedded systems.
  • 3.6 Summarise secure application development and deployment concepts.
  • 3.7 Summarise cloud and virtualisation concepts.
  • 3.8 Explain how resiliency and automation strategies reduce risk.
  • 3.9 Explain the importance of physical security controls.

4.0 Identity and Access Management

  • 4.1 Compare and contrast identity and access management concepts.
  • 4.2 Given a scenario, install and configure identity and access services.
  • 4.3 Given a scenario, implement identity and access management controls.
  • 4.4 Given a scenario, differentiate common account management practices.

5.0 Risk Management

  • 5.1 Explain the importance of policies, plans and procedures related to organisational security.
  • 5.2 Summarise business impact analysis concepts.
  • 5.3 Explain risk management processes and concepts.
  • 5.4 Given a scenario, follow incident response procedures.
  • 5.5 Summarise basic concepts of forensics.
  • 5.6 Explain disaster recovery and continuity of operation concepts.
  • 5.7 Compare and contrast various types of controls.
  • 5.8 Given a scenario, carry out data security and privacy practices.

6.0 Cryptography and PKI

  • 6.1 Compare and contrast basic concepts of cryptography.
  • 6.2 Explain cryptography algorithms and their basic characteristics.
  • 6.3 Given a scenario, install and configure wireless security settings.
  • 6.4 Given a scenario, implement public key infrastructure.
  • Cyber Security Overview (29minutes)
  • Building your Cyber Security Vocabulary (57 minutes)
  • Network Security (3h 48 minutes) *
  • Compliance and Operational Security (5h 48 minutes) *
  • Threats and Vulnerabilities (3h 44 minutes)
  • Application, Data and Host Security (2h 16 minutes)
  • Identity and Access Management (1h 37 minutes)
  • Cryptography (1h 32 minutes)
  • Risk Management (3h 21 minutes)*
  • Understanding Ethical Hacking (7 hours)
  • Architecture and Design (4h 13minutes)
  • Enterprise Security: Policies, Practices and Procedures (2h 38minutes)
  • Ethical Hacking; Malware Threats (4h)*
  • Security Standards; Common Criteria
  • PCI DSS; The big picture (1h 23 minutes)
  • FIPS 140-2
  • CAPS
  • COBIT (Course on FB site)
  • Computer Misuse Act
  • Data Protection Act
  • Human Rights Act
  • Digital Millennium Copyright Act
  • General Data Protection Regulation
  • Network and Information Security Directive

Total time: 42 hours 46 minutes

  • Networking Security (5h 6 minutes)
  • Network Security (3h 48 minutes)

Total time: 8 hours 54 minutes


Knowledge Module 7: Governance, Organisation, Law, Regulation & Standards

Upon completion of this Knowledge Module, Cyber Security apprentices will:

  • Build on the “Legal, standards, regulations and ethical standards relevant to cyber security” in KM1, focusing on information security management, data protection and privacy. They will also cover governance and organisational issues that relate to cyber security and that are affected by cyber risk

Read through the full curriculum for Firebrand's classroom-based training and supporting online learning modules below.

1. Information Security Management Principles

  • Concepts and Definitions
  • The Need for, and the Benefits of Information Security

2. Information Risk

  • Threats to, and Vulnerabilities of Information Systems
  • Risk Management

3. Information Security Framework

  • Organisation and Responsibilities
  • The Organisation’s Management of Security
  • Organisational Policy, Standards and Procedures
  • Information Security Governance
  • Information Security Implementation
  • Security Information Management
  • Legal Framework
  • Security Standards and Procedures

4. Procedural / People Security Controls

  • People
  • User Access Controls
  • Communication, Training and Awareness

5. Technical Security Controls

  • Protection from Malicious Software
  • Networks and Communications
  • External Services
  • Cloud Computing
  • IT Infrastructure

6. Software Development and Lifecycle

  • Testing, Audit and Review
  • Systems Development and Support

7. Physical and Environmental Security Controls

8. Disaster Recovery and Business Continuity Management

9. Other Technical Aspects

  • Investigations and Forensics
  • Role of Cryptography
  • The Information Security Big Picture (2h 17minutes)
  • Information Security Manager: Information Security Governance (4h 30minutes)
  • Governance and Management (5h 7 minutes)
  • Risk Management and Incident Response (1 h 49 minutes)
  • Computing, Communication and Business Integration (1h 58 minutes)
  • PCI DSS; The big picture (1h 23 minutes)
  • CAPS
  • ISO Standards (2h 20 minutes)

Total time: 19 hours 24 minutes


Additional Courses

Choose from one of Firebrand's accelerated courses listed below to add to this apprenticeship programme. These courses are delivered when apprentices have submitted evidence to their End Point Assessment gateway.

These additional courses support apprentices in achieving a Distinction grade at End Point Assessment.

Prerequisites

Who can enroll on a Cyber Security Technologist (Risk Analyst) apprenticeship?

End Point Assessment

How are Cyber Security Technologist (Risk Analyst) apprentices assessed?

Progression Plan

How do Cyber Security Technologist (Risk Analyst) apprentices progress?

Exams

Exams

While apprentices benefit from new digital skills they can use in their job, almost all digital apprenticeships that Firebrand offer provide the chance to gain industry recognised qualifications.

Apprentices gain qualifications through either BCS or Vendor specific exams where applicable. These qualifications add to a professional career and can be used to help move seamlessly between roles in the IT industry.

All relevant exams that will be achieved during this apprenticeship are listed below:

  1. BCS Level 4 Certificate in Cyber Security Introduction
  2. BCS Level 4 Award in Risk Assessment
  3. BCS Level 4 Certificate in Governance, Organisation, Law, Regulation and Standards

Latest Reviews from our students