Occupational Certificate – Cyber Security Analyst (252901001)

Categories: Unisa Enterprise
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Entry Requirements

  • NQF 4

Provider Accreditation Requirements for the Knowledge Module

Physical Requirements

  • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
  • QCTO/ MICT SETA requirements

Human Resource Requirements:

  • Lecturer/learner ratio of 1:20 (Maximum)
  • Qualification of lecturer (SME):
    • NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
    • CYBERSECURITY vendor certification
  • Assessors and moderators: accredited by the MICT SETA

Legal Requirements

  • Legal (product) licences to use the software for learning and training
  • OHS compliance certificate
  • Ethical clearance (where necessary)

Module Purpose

The main focus of the learning in this knowledge module is to build an understanding of fundamentals of various computer and network security threats such as identity theft, credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks, and social engineering

Topic elements to be covered include

The learning will enable learners to demonstrate an understanding of:

  • KM-01-KT01: Introduction to computer and mobile device security
  • KM-01-KT02: Various computer and network security threats
  • KM-01-KT03: Identity theft
  • KM-01-KT04: Adopting good cybersecurity practices
  • KM-01-KT05: Safeguard mobile, media and social networking profiles as user
  • KM-01-KT06: Protecting computers, accounts and data as user
  • KM-01-KT07: Understand security incidents and reporting

Venue, Date and Time:

Consult your facilitator should there be any changes to the venue, date and/or time.

Refer to your timetable

Assessments

The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.

This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.

Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.

 

Show More

What Will You Learn?

  • Topic elements to be covered include
  • The learning will enable learners to demonstrate an understanding of:
  • KM-01-KT01: Introduction to computer and mobile device security
  • KM-01-KT02: Various computer and network security threats
  • KM-01-KT03: Identity theft
  • KM-01-KT04: Adopting good cybersecurity practices
  • KM-01-KT05: Safeguard mobile, media and social networking profiles as user
  • KM-01-KT06: Protecting computers, accounts and data as user
  • KM-01-KT07: Understand security incidents and reporting
  • References
  • https://www.cisco.com › Products & Services › Security
  • https://www.techtarget.com › searchsecurity › definition
  • https://www.itgovernance.co.uk › what-is-cybersecurity
  • https://www.gartner.com › topics › cybersecurity
  • https://www.ibm.com › za-en › topics › mobile-security
  • https://www.archonsecure.com › mobile-device-guide

Course Content

KM-01-KT01- Introduction to computer and mobile device security

  • KT0101 – Governance and legislation
  • KT0102 – Security policy
  • KT0103 Physical security
  • KT0104 Web content filters
  • KT0105 Need for protection of privacy and data

KM-01-KT02 -Various computer and network security threats

KM-01-KT03: Identity theft

KM-01-KT04: Adopting good cybersecurity practices

KM-01-KT05

KM-01-KT06: Protecting computers, accounts and data as user

KM-01-KT07: Understand security incidents and reporting

KM-02 – Fundamentals of network security and defence
Module Code 252901001-KM-02 NQF Level 5 Credits 12 Curriculum Code 252901001 Qualification Title Occupational Certificate: Cybersecurity Analyst SAQA QUAL ID 118986 Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME): NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to build an understanding of the principles and techniques applied in the editing and proofreading processes Network Security and Defence Topic elements to be covered include The learning will enable learners to demonstrate an understanding of: KM-02-KT01: Introduction to network security KM-02-KT02: Network risk and vulnerability management KM-02-KT03: Network defense fundamentals KM-02-KT04: Monitoring for breaches and attacks KM-02-KT05: Network incident response and management Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you. References https://codered.eccouncil.org › course › network-defens.. https://www.checkpoint.com › Secure The Network https://www.sciencedirect.com › topics › computer-science https://www.forcepoint.com › cyber-edu › defense-depth https://www.cisco.com › Products & Services › Security https://www.techtarget.com › searchsecurity › definition https://www.itgovernance.co.uk › what-is-cybersecurity https://www.gartner.com › topics › cybersecurity https://www.ibm.com › za-en › topics › mobile-security https://www.archonsecure.com › mobile-device-guide

KM-02-KT02: Network risk and vulnerability management

KM-02-KT03: Network defense fundamentals
Topic elements to be covered include: KT0301Network security controls, protocols, and devices KT0302Physical security KT0303Host security KT0304Secure firewall configuration and management KT0305Secure IDS configuration and management KT0306Secure VPN configuration and management KT0307Wireless network defense KT0308Data backup and recovery

KM-02-KT04: Monitoring for breaches and attacks
KT0401Network traffic monitoring and analysis KT0402Intricacies of network traffic signature, analysis, and vulnerability scanning

KM-02-KT05: Network incident response and management
Topic elements to be covered include: KT0501Incident response plan KT0502Incident response process KT0503Reporting and documentation KT0504Lessons learnt

Cybersecurity and cyber threats and attacks 252901001-KM-03
Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME):  NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry  CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to build an understanding of principles of cybersecurity and Ethical Hacking and the types of threats and attacks and the respective risk Topic elements to be covered include The learning will enable learners to demonstrate an understanding of:  KM-03-KT01: Information security Governance and compliance  KM-03-KT02: Information security  KM-03-KT03: Foot printing and Reconnaissance  KM-03-KT04: Scanning Networks  KM-03-KT05: Enumeration  KM-03-KT06: Vulnerability Analysis  KM-03-KT07: System Hacking  KM-03-KT08: Malware Threats  KM-03-KT09: Sniffing  KM-03-KT10: Social Engineering  KM-03-KT11: Denial-of-Service  KM-03-KT12: Session Hijacking  KM-03-KT13: Evading IDS, Firewalls, and Honeypots  KM-03-KT14: Hacking Web Servers  KM-03-KT15:SQL Injection  KM-03-KT16: Hacking Wireless Networks  KM-03-KT17: Hacking Mobile Platforms  KM-03-KT18: IoT Hacking  KM-03-KT19: Cloud Computing  KM-03-KT20: Cryptography  KM-03-KT21: Cyber incident response and management Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.

KM-03-KT02: Information security
Topic elements to be covered include: KT0201Information security overview KT0202Information security threats and attack vectors KT0203Penetration testing concepts KT0204Hacking concepts KT0205Ethical hacking concepts KT0206Information security controls

KM-03-KT03: Footprinting and Reconnaissance
Topic elements to be covered include: KT0301Footprinting concepts and objectives KT0302Footprinting uses KT0303Types of foot printing KT0304Passive and active foot printing KT0305Footprinting methodologies KT0306Tools, tricks and techniques for information gathering KT0307Footprinting steps KT0308Countermeasures and prevention KT0309Footprinting Pen Testing

KM-03-KT04: Scanning Networks
Topic elements to be covered include: KT0401Network scanning concepts and objectives KT0402Types of scanning KT0403Scanning methodologies, tools and techniques KT0404Draw network diagrams KT0405Scanning pen testing KT0406Vulnerability scanning KT0407Countermeasures against scanning

KM-03-KT05: Enumeration
Topic elements to be covered include: KT0501Enumeration concepts and objectives KT0502Types of enumeration KT0503Enumeration countermeasures KT0504Enumeration methodologies, techniques and tools KT0505Enumeration pen testing

KM-03-KT06: Vulnerability Analysis
Topic elements to be covered include: KT0601Vulnerability analysis concepts and objectives KT0602Vulnerability assessment solutions KT0603Vulnerability scoring systems KT0604Vulnerability assessment tools KT0605Vulnerability assessment reports

KM-03-KT07: System Hacking
Topic elements to be covered include: KT0701System hacking concepts KT0702Passwords, privileges, applications KT0703Covering tracks KT0704Penetration testing KT0705Human precautions against hacking

KM-03-KT08: Malware Threats
Topic elements to be covered include: KT0801Malware concepts and objectives KT0802Malware types KT0803Malware analysis KT0804Countermeasures and anti-malware software KT0805Malware penetration testing

KM-03-KT09: Sniffing
Topic elements to be covered include: KT0901Sniffing concepts and objectives KT0902Sniffing attacks KT0903Sniffing techniques KT0904Sniffing tools KT0905Countermeasures KT0906Detection techniques KT0907Sniffing pen testing

KM-03-KT10: Social Engineering
Topic elements to be covered include: KT1001Social engineering concepts and objectives KT1002Social engineering techniques KT1003Types of social engineering attacks KT1004Countermeasures KT1005Social engineering penetration testing

KM-03-KT11: Denial-of-Service
Topic elements to be covered include: KT1101DoS/DDoS concepts and objectives KT1102DoS/DDoS attack techniques and tools KT1103Countermeasures and protection tools KT1104DoS/DDoS attack penetration testing

KM-03-KT12: Session Hijacking
Topic elements to be covered include: KT1201Session hijacking concepts KT1202Types of level session hijacking KT1203Session hijacking tools KT1204Countermeasures KT1205Penetration testing

KM-03-KT13: Evading IDS, Firewalls, and Honeypots
Topic elements to be covered include: KT1301IDS, Firewall, and Honeypot Concepts KT1302IDS, Firewall, and Honeypot Solutions KT1303Evading IDS and Firewalls KT1304IDS/Firewall Evading Tools KT1305Detecting Honeypots KT1306IDS/Firewall Evasion Countermeasures KT1307Penetration Testing

KM-03-KT14: Hacking Web Servers
Topic elements to be covered include: KT1401Web server concepts KT1402Web server attacks KT1403Attack tools KT1404Countermeasures KT1405Defense attack mechanisms KT1406Security tools KT1407Penetration testing and pen testing tools

KM-03-KT15:SQL Injection
Topic elements to be covered include: KT1501SQL injection concepts KT1502Types of SQL injection KT1503SQL injection methodology and tools KT1504Evasion techniques KT1505Countermeasures

KM-03-KT16: Hacking Wireless Networks
Topic elements to be covered include: KT1601Wireless concepts KT1602Wireless encryption KT1603Wireless threats KT1604Wireless hacking methodology and tools KT1605Bluetooth hacking Topic elements to be covered include: KT1601Wireless concepts KT1602Wireless encryption KT1603Wireless threats KT1604Wireless hacking methodology and tools KT1605Bluetooth hacking KT1606Countermeasures and security tools KT1607Wi-Fi Pen Testing

KM-03-KT17: Hacking Mobile Platforms

KM-03-KT18: IoT Hacking
Topic elements to be covered include: KT1801IoT concepts KT1802IoT attacks KT1803IoT hacking methodology and tools KT1804Countermeasures KT1805IoT pen testing

KM-03-KT19: Cloud Computing
Topic elements to be covered include: KT1901Cloud computing concepts KT1902Cloud computing threats and attacks KT1903Cloud security KT1904Cloud security tools KT1905Cloud penetration testing

KM-03-KT20: Cryptography
Topic elements to be covered include: KT2001Cryptography concepts and objectives KT2002Types of cryptography KT2003Encryption algorithms KT2004Cryptography tools KT2005Types of encryption KT2006Cryptanalysis KT2007Countermeasures

KM-03-KT21: Cyber incident response and management
KT2101Incident response plan KT2102Incident response process KT2103Incidence response phases Preparation Detection and analysis Containment and quarantine Eradication Recovery (return to production, data) KT2104Post-incident activity (Lessons Learned) Identify changes to security Employee training Weaknesses in the security system Updates

252901001-KM-04 -Introduction to cybersecurity governance, legislation and ethics
Module Code 252901001-KM-04 NQF Level 4 Credits 4 Curriculum Code 252901001 Qualification Title Occupational Certificate: Cybersecurity Analyst SAQA QUAL ID 118986 Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME):  NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry  CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to acquire general knowledge and understanding of the various legislations governing the workplace and their implication for the employer and employees. The learning of this module will also enable the learner to acquire an understanding of the principles of areas of performance management, business planning concepts, costing of products and concepts of general ethical behaviour and its impact in the workplace Topic elements to be covered include The learning will enable learners to demonstrate an understanding of:  KM-04-KT01: Governance  KM-04-KT02: Legislation governing workplaces  KM-04-KT03: Introduction to ethics and security  KM-04-KT04: Ethics at work  KM-04-KT05: Security  KM-04-KT06: Performance management  KM-04-KT07: Business planning  KM-04-KT08: Costing of products  KM-04-KT09: Resources Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you. REFERENCE https://www.saflii.org › legis › consol_act › https://codered.eccouncil.org › course › network-defens.. https://www.checkpoint.com › Secure The Network https://www.sciencedirect.com › topics › computer-science https://www.forcepoint.com › cyber-edu › defense-depth https://www.cisco.com › Products & Services › Security https://www.techtarget.com › searchsecurity › definition https://www.itgovernance.co.uk › what-is-cybersecurity https://www.gartner.com › topics › cybersecurity https://www.ibm.com › za-en › topics › mobile-security https://www.archonsecure.com › mobile-device-guide https://preyproject.com › blog › what-are-cyber-threats-h.. https://emeritus.org › learn › different-types-of-cyber-s https://www.simplilearn.com › cyber-security-tutorial

KM-04-KT02: Legislation governing workplaces
Learning Outcome KT0201 LRA KT0202 POPI KT0203 B-BBEE KT0204 BCEA KT0205 SDA KT0206 Current trends

KM-04-KT03: Introduction to ethics and security
Learning Outcome KT0301 Principles and practices KT0302 Concepts, definitions and terminology

KM-04-KT04: Ethics at work
Learning Outcome KT0401 Code of conduct and moral compass KT0402 Components of ethical behaviour, including integrity, honesty, fair dealing, respecting diversity KT0403 Unwritten but expected behaviours, including reliability, accountability, time keeping, respect for others KT0404 Lapses in ethical behaviour, including sexual harassment, racism, bullying, theft, abuse of company property, rules, time and sick leave KT0405 Conflicts of interest, including primary and secondary interests, the impact on individuals and organisations and the link to corruption KT0406 The need for ethical behaviour and the impact or consequences of lapses in ethical behaviour KT0407 Copyright and plagiarism KT0408 Intellectual property KT0409 Spamming KT0410 Contract management KT0411 Software licensing KT0412 Pricing

KM-04-KT05: Security
Learning Outcome KT0501 Risks, threats and vulnerabilities KT0502 Mitigation tools and strategies KT0503 Digital forensics KT0504 Cloud KT0505 Commercial law KT0506 Cyber security KT0507 New trends

KM-04-KT06: Performance management
Learning Outcome KT0601 Planning, organising and control KT0602 Work flow KT0603 Cost, waste KT0604 Productivity, efficiency KT0605 Housekeeping KT0606 Risk, health, safety, environment and related systems KT0607 Quality and quality systems KT0608 Continual improvement

KM-04-KT07: Business planning
Learning Outcome KT0701 Business sustainability KT0702 Concept of supply and demand KT0703 Concept of profit, loss and breakeven KT0704 Accountability and responsibility KT0705 Competition KT0706 Customers KT0707 Contracts KT0708 Budgets

KM-04-KT08: Costing of products
Learning Outcome KT0801 Input cost KT0802 Overhead costs KT0803 Direct labour cost KT0804 Pricing a product (Under- or over-pricing)

KM-04-KT09: Resources
Learning Outcome KT0901 Human resources KT0902 Financial resources KT0903 Physical resources (infrastructure, machinery, equipment) KT0904 Communication and information technology

252901001-KM-05 – Fundamentals of design thinking and innovation
Module Code 252901001-KM-05 NQF Level 4 Credits 1 Curriculum Code 252901001 Qualification Title Occupational Certificate: Cybersecurity Analyst SAQA QUAL ID 118986 Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME):  NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry  CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to build an understanding of the design thinking principles and application in the workplace Topic elements to be covered include The learning will enable learners to demonstrate an understanding of:  KM-05-KT01: Introduction to design thinking  KM-05-KT02: The human element  KM-05-KT03: Creativity  KM-05-KT04: Innovation  KM-05-KT05: Design  KM-05-KT06: Design thinking methodology  KM-05-KT07: Application of design thinking Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.

KM-05-KT02: The human element
Learning Outcome KT0201 Human centeredness KT0202 Human participation

KM-05-KT03: Creativity
Learning Outcome KT0301 Creativity: is unleashing the potential of the mind to conceive new ideas KT0302 Perceiving the world in new ways KT0303 Find hidden patterns KT0304 Make connections between seemingly unrelated phenomena KT0305 Generate solutions KT0306 Application in the workplace

KM-05-KT04: Innovation
• Learning Outcome • KT0401 Innovation: is the action of putting things into practical reality, despite challenges and resistance • KT0402 Different innovations: • Incremental • Disruptive • Architectural and • Radical • KT0403 Main types of innovation: • Process innovation • Product innovation • Organisational innovation • Market innovation • KT0404 What innovation means to business

KT-05-KT05: Design
Learning Outcome KT0501 Think outside the box KT0502 Push beyond the obvious solutions KT0503 Communication through shape and form

KM-05-KT06: Design thinking methodology
Learning Outcome KT0601 Design thinking phases KT0602 Design thinking tools and techniques

KM-05-KT07: Application of design thinking
Learning Outcome KT0701 Application in software development KT0702 Application in cyber security KT0703 Business innovation KT0704 Innovative problem solving

252901001-KM-06 – Refresher Logical Thinking And Basic Calculations
Module Code 252901001-KM-06 NQF Level 4 Credits 3 Curriculum Code 252901001 Qualification Title Occupational Certificate: Cybersecurity Analyst SAQA QUAL ID 118986 Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME):  NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry  CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to acquire mathematical thinking theory for solving problems and acquire basic maths knowledge for using software toolkits or platforms Topic elements to be covered include The learning will enable learners to demonstrate an understanding of: • KM-06-KT01: Mathematical thinking skills for problem solving. • KM-06-KT02: Basic math • KM-06-KT03: Conversion between decimal and binary systems • KM-06-KT04: Express size and magnitude • KM-06-KT05: Error in calculations • KM-06-KT06: Cartesian coordinate system • KM-06-KT07: Pythagorean theorem for finding the distance between two points • KM-06-KT08: Operator precedence • KM-06-KT09: Integer division • KM-06-KT10: Modulus • KM-06-KT11: Increments Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.

KM-06-KT02 : Conversion between decimal and binary systems
Learning Outcome KT0201 Introduction to binary numbers KT0202 Performing addition and subtraction of positive whole numbers in binary KT0203 Binary arithmetic KT0204 Use of BODMAS

KM-06-KT03 : Expressing size and magnitude
Learning Outcome KT0301 Use scientific notation for small and large numbers KT0302 Prefixes: From Giga to Pica (109 to 10 -12) KT0303 Conversions: SI to Imperial: degrees F to degrees C

KM-06-KT04: Error in calculations
Learning Outcome KT0401 Rational and irrational numbers KT0402 Explore repeating decimals and convert them to fraction form KT0403 Symbols for irrational numbers KT0404 Rounding prematurely in calculations KT0405 Accuracy KT0406 Final value of a calculation expressed in terms of the required unit

KM-06-KT05 :Cartesian coordinate system
Learning Outcome KT0501 Definition KT0502 Terminology KT0503 The coordinate plane KT0504 Intersecting x- and y-axes KT0505 Four quadrants KT0506 Naming using Roman numerals KT0507 Use and application – creating graphs and maps

KM-06-KT06 : Pythagorean theorem for finding the distance between two points
Learning Outcome KT0601 Definition KT0602 Terminology KT0603 Purpose KT0604 Determine the distance between two points on the Cartesian grid

KM-06-KT07 : Operator precedence
Learning Outcome KT0701 Definition and terminology KT0702 Purpose and use KT0703 Order of operations (left to right) KT0704 Apply precedence: Parentheses Multiply and divide Add and subtract KT0705 Use of PEDMAS in programming

KM-06-KT08 : Integer division
Learning Outcome KT0801 Definition and terminology KT0802 Purpose and use KT0803 Rules on how to divide integers KT0804 Names and symbols for integer division KT0805 Software for integer division

KM-06-KT09 : Modulus
Learning Outcome KT0901 Definition and terminology KT0902 Purpose and use KT0903 Modulus abbreviated as “mod” KT0904 % application KT0905 (==) application KT0906 Modulus in programming

KM-06-KT10 : Increments
Learning Outcome KT1001 Definition and terminology KT1002 Purpose and use KT1003 Increment a variable KT1004 compound assignment operator KT1005 Increments in programming

KM-06-KT11 : Mixing types
Learning Outcome KT1101 Definition and terminology KT1102 Purpose and use KT1103 Apply an operator KT1104 Combination with the order of operations KT1105 The order in which an expression is written KT1106 How a computer would evaluate some expressions that combine types REFERENCE ://press.rebus.community › chapter › integer-division.. https://blog.mattclemente.com › 2019/07/12 › modulus.. https://en.wikipedia.org › wiki › Modulo_operation https://codered.eccouncil.org › course › network-defens.. https://www.checkpoint.com › Secure The Network https://www.sciencedirect.com › topics › computer-science https://www.forcepoint.com › cyber-edu › defense-depth https://www.cisco.com › Products & Services › Security https://www.techtarget.com › searchsecurity › definition https://www.itgovernance.co.uk › what-is-cybersecurity https://www.gartner.com › topics › cybersecurity https://www.ibm.com › za-en › topics › mobile-security https://www.archonsecure.com › mobile-device-guide https://preyproject.com › blog › what-are-cyber-threats-h.. https://emeritus.org › learn › different-types-of-cyber-s https://www.simplilearn.com › cyber-security-tutorial

252901001-KM-098: Data And Databases Vulnerabilities
Module Code 252901001-KM-098 NQF Level 4 Credits 3 Curriculum Code 252901001 Qualification Title Occupational Certificate: Cybersecurity Analyst SAQA QUAL ID 118986 Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME):  NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry  CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to build an understanding of data and databases and giving meaning to data through data processing, analysis and visualisation Topic elements to be covered include The learning will enable learners to demonstrate an understanding of:  KM-08-KT01: Data vulnerability and security  KM-08-KT02: Data and data processing  KM-08-KT03: Databases, data storage and access to data  KM-08-KT04: Structured query language (SQL)  KM-08-KT05: Data scraping  KM-08-KT06: Software for analysing and visualising data. Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks. Listen carefully to the instructions of the facilitator and do the given activities in the time given to you. KM-08-KT01: Data vulnerability and security Learning Outcome KT0101 Definition KT0102 Data vulnerability, risk and exploitation KT0103 Stages of data vulnerability: at network level, at system level, at data level. KT0104 Purpose of protecting data KT0105 Process for protecting data KT0106 Unauthorised access, elevation of privileges or denial of data KT0107 Data corruption KT0108 Data security solutions

KM-08-KT02: Data and data processing
Learning Outcome KT0201 Value of data KT0202 Data analysis for RPA: Importance of analysis KT0203 Data sourcing: Data sources Data types Reliable data Automated data collection KT0204 Refining data: Missing data Data misalignments Separating useful data from the rest KT0205 Flaws in data: Commission Omission Perspective Bias Frame of reference KT0206 Limits of data acquisition KT0207 Data: Setting up data, Data interactions, Assigned to different fields

KM-08-KT03: Databases, data storage and access to data
• Learning Outcome • • KT0301 Database: definition, components, function, types, characteristics of good databases, structure and challenges • KT0302 Data: • storage, characteristics of quality data, • KT0303 Data: • collection warehousing, mining and managing concepts • KT0304 Relational database design • KT0305 Database design tools • KT0306 Create, design and modify relational database • KT0307 Import and export data • KT0308 Design and create queries

KM-08-KT04: Structured query language (SQL)
Learning Outcome KT0401 SQL programming language KT0402 SQL code constructs to perform database transactions KT0403 Storing, retrieving, managing or manipulating the data inside a relational database management system (RDBMS)

KM-08-KT05: Data scraping
Learning Outcome KT0501 Concept and definition KT0502 Purpose of data scraping KT0503 Data scraping tools KT0504 Legal issues KT0505 Web scraping procedure: Find the URL to scrape Inspecting the page Find the data you want to extract Write the code Run the code and extract the data Store the data in the required format KT0506 Libraries used for web scraping

KM-08-KT06: Software for analysing and visualising data.
Learning Outcome KT0601 Reporting KT0602 Tables KT0603 Pivot tables and pivot charts KT0604 Dashboards KT0605 Hierarchies and time data KT0606 The data model KT0607 Importing data from files KT0608 Importing data from databases KT0609 Importing data from reports References https://codered.eccouncil.org › course › network-defens.. https://www.checkpoint.com › Secure The Network https://www.sciencedirect.com › topics › computer-science https://www.forcepoint.com › cyber-edu › defense-depth https://www.cisco.com › Products & Services › Security https://www.techtarget.com › searchsecurity › definition https://www.itgovernance.co.uk › what-is-cybersecurity https://www.gartner.com › topics › cybersecurity https://www.ibm.com › za-en › topics › mobile-security https://www.archonsecure.com › mobile-device-guide https://preyproject.com › blog › what-are-cyber-threats-h.. https://emeritus.org › learn › different-types-of-cyber-s https://www.simplilearn.com › cyber-security-tutorial

252901001-KM-09 – Introduction to 4ir and future skills
Module Code 252901001-KM-09 NQF Level 4 Credits 4 Curriculum Code 252901001 Qualification Title Occupational Certificate: Cybersecurity Analyst SAQA QUAL ID 118986 Note to the learner This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks. Entry Requirements • NQF 4 Provider Accreditation Requirements for the Knowledge Module Physical Requirements • The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills. • QCTO/ MICT SETA requirements Human Resource Requirements: • Lecturer/learner ratio of 1:20 (Maximum) • Qualification of lecturer (SME):  NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry  CYBERSECURITY vendor certification • Assessors and moderators: accredited by the MICT SETA Legal Requirements • Legal (product) licences to use the software for learning and training • OHS compliance certificate • Ethical clearance (where necessary) Module Purpose The main focus of the learning in this knowledge module is to build an understanding of the impact of 4IR on communities, individuals and businesses and important skills for future needs Topic elements to be covered include The learning will enable learners to demonstrate an understanding of:  KM-09-KT01:4 IR emerging trends  KM-09-KT02: Computing Knowledge  KM-09-KT03: Future skills and competencies (4IR)  KM-09-KT04:4 IR trends affecting businesses  KM-09-KT05: Interpersonal skills  KM-09-KT06: Intrapersonal skills  KM-09-KT07: Communication principles and methods  KM-09-KT08: Written business communication  KM-09-KT09: Presentation skills  KM-09-KT10: Teamwork in the workplace  KM-09-KT11: Committees and meetings  KM-09-KT09: Job descriptions and profiles  KM-09-KT13: Customers and stakeholders  KM-09-KT14: Customer service Venue, Date and Time: Consult your facilitator should there be any changes to the venue, date and/or time. Refer to your timetable Assessments The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence. This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.

KM-09-KT02: Computing Knowledge
Learning Outcome KT0201 Introduction to programming language KT0202 Programming basics KT0203 Basic programming knowledge on HTML, JavaScript (or any scripting language) KT0204 Software development, e.g., C#, C++, Java, .NET KT0205 Databases (SQL or NoSQL) KT0206 Web development technologies

KM-09-KT03: Future skills and competencies (4IR)
KT0301 Disruptive thinking (encourage this) (application to their own environment) KT0302 Continuously searching for ideas KT0303 Thinking innovatively (analyse the current market and come up with solutions to the current problems) KT0304 Soft skills KT0305 Programming languages KT0306 Operating systems KT0307 Open source KT0308 Tools for a cloud environment (for configuration and management), tools for debugging, login and monitoring and tools for image KT0309 Familiarity with Office tools KT0310 Leadership and people management skills

KM-09-KT04:4 IR trends affecting businesses
Learning Outcome KT0401 Afro-centric approach to African problems – taking the best from the existing products and coming up with own solutions - Continental challenges and opportunities KT0402 Using Google, Amazon and MS forms and tools to reduce development time (e.g., embed AI APIs) KT0403 Business intelligence applications and availability of Big Data (collecting data, converting data into information and turning information into knowledge, knowledge into intelligence and intelligence into wisdom) KT0404 Collecting data on clients KT0405 Insight into different markets KT0406 Automated factories KT0407 Exposure to the global world

KM-09-KT05: Interpersonal skills
Learning Outcome KT0501 Concept, definition and terminology KT0502 Principles KT0503 Attributes: Social intelligence Confidentiality Conflict handling and resolution Decision making Defending vs attacking Problem solving, Troubleshooting Respect Roles, responsibilities Thinking about the end-user

KM-09-KT06: Intrapersonal skills
Learning Outcome KT0601 Concept, definition and terminology KT0602 Principles KT0603 Attributes: Adaptability Agility Analytical thinking Cognitive thinking skills Emotional maturity Flexibility Planning Problem solving Reflection Research and investigate Self-management Strong attention to detail Time-management Resilience

KM-09-KT07: Communication principles and methods
Learning Outcome KT0701 Concept, definition and terminology KT0702 The different types and forms of communication and communication processes KT0703 Communication methods KT0704 Barriers to communication KT0705 Communication network: Interdepartmental, Supply chain network, etc. KT0706 Advantages of good communication KT0707 Consequences of poor/no communication

KM-09-KT08: Written business communication
Learning Outcome KT0801 Business requirement specifications KT0802 Types KT0803 Conventions KT0804 Schedules KT0805 Reports, reporting protocols and methods KT0806 Manuals and guidelines KT0807 Work instructions/briefs KT0808 Technical report writing KT0809 Extracting information from written texts KT0810 Policies aligned to standard (IEEE 829-2008 standards)

KM-09-KT09: Presentation skills
Learning Outcome KT0901 Concept, definition and terminology KT0902 Types: visual, verbal, written KT0903 Conventions KT0904 Presenting options and solutions KT0905 Presenting technical details KT0906 Visualisation of business intelligence KT0907 Suitable APIs and storytelling using the right tools to: present frame the story focus on certain aspects pitch clear terms pictorial

KM-09-KT10: Teamwork in the workplace
Learning Outcome KT1001 Concept, definition and terminology KT1002 Principles of teamwork KT1003 Advantages of teamwork KT1004 Team composition and members KT1005 Roles, responsibilities and functions KT1006 Team dynamics KT1007 Common goals and collaboration KT1008 Nature of multidisciplinary teams and teamwork KT1009 Setting and achieving targets KT1010 Collaboration tools (electronic)

KM-09-KT11: Committees and meetings
Learning Outcome KT1101 Procedures KT1102 Agendas and minutes KT1103 Roles and responsibilities KT1104 WSP committees KT1105 EE committees KT1106 Safety and health committees KT1107 Wellness committees

KM-09-KT12: Job descriptions and profiles
Learning Outcome KT1201 Purpose KT1202 Job and person specification KT1203 Content KT1204 Alignment to performance standards

KM-09-KT13: Customers and stakeholders
Learning Outcome KT1301 Concept, definition and terminology KT1302 Types of customers KT1303 Customer profile KT1304 Typical customer behaviour: including habits and mannerisms KT1305 Difficult customers KT1306 Customer care KT1307 Stakeholder management and participation

KM-09-KT14: Customer service
Learning Outcome KT1401 Concept, definition and terminology KT1402 Customer service principles KT1403 Customer centeredness KT1404 Handover and sign-off procedures and techniques KT1405 Technical documentation KT1406 Training in the use of the system References https://codered.eccouncil.org › course › network-defens.. https://www.checkpoint.com › Secure The Network https://www.sciencedirect.com › topics › computer-science https://www.forcepoint.com › cyber-edu › defense-depth https://www.cisco.com › Products & Services › Security https://www.techtarget.com › searchsecurity › definition https://www.itgovernance.co.uk › what-is-cybersecurity https://www.gartner.com › topics › cybersecurity https://www.ibm.com › za-en › topics › mobile-security https://www.archonsecure.com › mobile-device-guide https://preyproject.com › blog › what-are-cyber-threats-h.. https://emeritus.org › learn › different-types-of-cyber-s https://www.simplilearn.com › cyber-security-tutorial

Student Ratings & Reviews

No Review Yet
No Review Yet
Shopping Cart