Occupational Certificate – Cyber Security Analyst (252901001)
About Course
Entry Requirements
- NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
- The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
- QCTO/ MICT SETA requirements
Human Resource Requirements:
- Lecturer/learner ratio of 1:20 (Maximum)
- Qualification of lecturer (SME):
- NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
- CYBERSECURITY vendor certification
- Assessors and moderators: accredited by the MICT SETA
Legal Requirements
- Legal (product) licences to use the software for learning and training
- OHS compliance certificate
- Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of fundamentals of various computer and network security threats such as identity theft, credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks, and social engineering
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
- KM-01-KT01: Introduction to computer and mobile device security
- KM-01-KT02: Various computer and network security threats
- KM-01-KT03: Identity theft
- KM-01-KT04: Adopting good cybersecurity practices
- KM-01-KT05: Safeguard mobile, media and social networking profiles as user
- KM-01-KT06: Protecting computers, accounts and data as user
- KM-01-KT07: Understand security incidents and reporting
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
What Will You Learn?
- Topic elements to be covered include
- The learning will enable learners to demonstrate an understanding of:
- KM-01-KT01: Introduction to computer and mobile device security
- KM-01-KT02: Various computer and network security threats
- KM-01-KT03: Identity theft
- KM-01-KT04: Adopting good cybersecurity practices
- KM-01-KT05: Safeguard mobile, media and social networking profiles as user
- KM-01-KT06: Protecting computers, accounts and data as user
- KM-01-KT07: Understand security incidents and reporting
- References
- https://www.cisco.com › Products & Services › Security
- https://www.techtarget.com › searchsecurity › definition
- https://www.itgovernance.co.uk › what-is-cybersecurity
- https://www.gartner.com › topics › cybersecurity
- https://www.ibm.com › za-en › topics › mobile-security
- https://www.archonsecure.com › mobile-device-guide
Course Content
KM-01-KT01- Introduction to computer and mobile device security
-
KT0101 – Governance and legislation
-
KT0102 – Security policy
-
KT0103 Physical security
-
KT0104 Web content filters
-
KT0105 Need for protection of privacy and data
KM-01-KT02 -Various computer and network security threats
-
KT0201 Malware
-
KT0202 Viruses
-
KT0203 Spyware
-
KT0204 Adware
-
KT0205 Trojan horses
-
KT0206 Worms
-
KT0207 Phishing
-
KT0208 Spear phishing
-
KT0209 Insider security threats
KM-01-KT03: Identity theft
-
KT0301 Phishing scams
-
KT0302 Malware
-
KT0303 Social engineering
-
KT0304 Financial frauds
KM-01-KT04: Adopting good cybersecurity practices
-
KT0401 Use of registered software
-
KT0402 Update software when they become old to newer versions which tend to have more security upgrades
-
KT0403 Encrypt data
-
KT0404 Use strong authentication (passwords and credentials) for all accounts
-
KT0405 Change passwords often and make sure they are strong and not easy to guess
-
KT0406 Data backup
KM-01-KT05
-
KT0501 Security on social networking sites
-
KT0502 Securing mobile devices
KM-01-KT06: Protecting computers, accounts and data as user
-
KT0601 Securing operating systems
-
KT0602 Internet security
-
KT0603 Securing email communications
-
KT0604 Securing the cloud
-
KT0605 Securing network connections
-
KT0606 Firewalls
-
KT0607 Antivirus programs
-
KT0608 Antispyware
KM-01-KT07: Understand security incidents and reporting
-
KT0701 Data backup
-
KT0702 Disaster recovery
KM-02 – Fundamentals of network security and defence
Module Code 252901001-KM-02
NQF Level 5
Credits 12
Curriculum Code 252901001
Qualification Title Occupational Certificate: Cybersecurity Analyst
SAQA QUAL ID 118986
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of the principles and techniques applied in the editing and proofreading processes Network Security and Defence
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-02-KT01: Introduction to network security
KM-02-KT02: Network risk and vulnerability management
KM-02-KT03: Network defense fundamentals
KM-02-KT04: Monitoring for breaches and attacks
KM-02-KT05: Network incident response and management
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
References
https://codered.eccouncil.org › course › network-defens..
https://www.checkpoint.com › Secure The Network
https://www.sciencedirect.com › topics › computer-science
https://www.forcepoint.com › cyber-edu › defense-depth
https://www.cisco.com › Products & Services › Security
https://www.techtarget.com › searchsecurity › definition
https://www.itgovernance.co.uk › what-is-cybersecurity
https://www.gartner.com › topics › cybersecurity
https://www.ibm.com › za-en › topics › mobile-security
https://www.archonsecure.com › mobile-device-guide
-
KM-02-KT0101 Governance and legislation
-
KM-02-KT0102 Security policy
-
KM-02-KT0103 Physical security
-
KM-02-KT0104 Web content filters
-
KM-02-KT0105 Need for protection of privacy and data
KM-02-KT02: Network risk and vulnerability management
-
KM-02-KT0201 Network security threats, vulnerabilities, and attacks
-
KM-02-KT0202 Knowledge on how to protect, detect, and respond to network attacks
KM-02-KT03: Network defense fundamentals
Topic elements to be covered include:
KT0301Network security controls, protocols, and devices
KT0302Physical security
KT0303Host security
KT0304Secure firewall configuration and management
KT0305Secure IDS configuration and management
KT0306Secure VPN configuration and management
KT0307Wireless network defense
KT0308Data backup and recovery
-
KM-02-KT0301 Network security controls, protocols, and devices
-
KM-02-KT0302 Physical security
-
KM-02-KT0303 Host security
-
KM-02-KT0304 Secure firewall configuration and management
-
KM-02-KT0305 Secure IDS configuration and management
-
KM-02-KT0306 Secure VPN configuration and management
-
KM-02-KT0307 Wireless network defense
-
KM-02-KT0308 Data backup and recovery
KM-02-KT04: Monitoring for breaches and attacks
KT0401Network traffic monitoring and analysis
KT0402Intricacies of network traffic signature, analysis, and vulnerability scanning
-
KM-02-KT0401 Network traffic monitoring and analysis
-
KM-02-KT0402 Intricacies of network traffic signature, analysis, and vulnerability scanning
KM-02-KT05: Network incident response and management
Topic elements to be covered include:
KT0501Incident response plan
KT0502Incident response process
KT0503Reporting and documentation
KT0504Lessons learnt
-
KM-02-KT0501 Incident response plan
-
KM-02-KT0502 Incident response process
-
KM-02-KT0503 Reporting and documentation
-
KM-02-KT0504 Lessons learnt
Cybersecurity and cyber threats and attacks 252901001-KM-03
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of principles of cybersecurity and Ethical Hacking and the types of threats and attacks and the respective risk
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-03-KT01: Information security Governance and compliance
KM-03-KT02: Information security
KM-03-KT03: Foot printing and Reconnaissance
KM-03-KT04: Scanning Networks
KM-03-KT05: Enumeration
KM-03-KT06: Vulnerability Analysis
KM-03-KT07: System Hacking
KM-03-KT08: Malware Threats
KM-03-KT09: Sniffing
KM-03-KT10: Social Engineering
KM-03-KT11: Denial-of-Service
KM-03-KT12: Session Hijacking
KM-03-KT13: Evading IDS, Firewalls, and Honeypots
KM-03-KT14: Hacking Web Servers
KM-03-KT15:SQL Injection
KM-03-KT16: Hacking Wireless Networks
KM-03-KT17: Hacking Mobile Platforms
KM-03-KT18: IoT Hacking
KM-03-KT19: Cloud Computing
KM-03-KT20: Cryptography
KM-03-KT21: Cyber incident response and management
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
-
KM-03-KT0101 Governance and legislation
-
KM-03-KT0102 Need for data protection
-
KM-03-KT0103 Computer network and defense fundamentals
-
KM-03-KT0104 Network security policy design and implementation
-
KM-03-KT0105 Information security laws and standards
KM-03-KT02: Information security
Topic elements to be covered include:
KT0201Information security overview
KT0202Information security threats and attack vectors
KT0203Penetration testing concepts
KT0204Hacking concepts
KT0205Ethical hacking concepts
KT0206Information security controls
-
KM-03-KT0201Information security overview
-
KM-03-KT0202 Information security threats and attack vectors
-
KM-03-KT0203 Penetration testing concepts
-
KM-03-KT0204 Hacking concepts
-
KM-03-KT0205 Ethical hacking concepts
-
KM-03-KT0206 Information security controls
KM-03-KT03: Footprinting and Reconnaissance
Topic elements to be covered include:
KT0301Footprinting concepts and objectives
KT0302Footprinting uses
KT0303Types of foot printing
KT0304Passive and active foot printing
KT0305Footprinting methodologies
KT0306Tools, tricks and techniques for information gathering
KT0307Footprinting steps
KT0308Countermeasures and prevention
KT0309Footprinting Pen Testing
-
KM-03-KT0301 Foot printing concepts and objectives
-
KM-03-KT0302 Footprinting uses
-
KM-03-KT0303 Types of foot printing
-
KM-03-KT0304 Passive and active foot printing
-
KM-03-KT0305 Foot printing methodologies
-
KM-03-KT0306 Tools, tricks and techniques for information gathering
-
KM-03-KT0307 Footprinting steps
-
KM-03-KT0308 Countermeasures and prevention
-
KM-03-KT0309 Footprinting Pen Testing
KM-03-KT04: Scanning Networks
Topic elements to be covered include:
KT0401Network scanning concepts and objectives
KT0402Types of scanning
KT0403Scanning methodologies, tools and techniques
KT0404Draw network diagrams
KT0405Scanning pen testing
KT0406Vulnerability scanning
KT0407Countermeasures against scanning
-
KM-03-KT0401 Network scanning concepts and objectives
-
KM-03-KT0402 Types of scanning
-
KM-03-KT0403 Scanning methodologies, tools and techniques
-
KM-03-KT0404 Draw network diagrams
-
KM-03-KT0405 Scanning pen testing
-
KM-03-KT0406 Vulnerability scanning
-
KM-03-KT0407 Countermeasures against scanning
KM-03-KT05: Enumeration
Topic elements to be covered include:
KT0501Enumeration concepts and objectives
KT0502Types of enumeration
KT0503Enumeration countermeasures
KT0504Enumeration methodologies, techniques and tools
KT0505Enumeration pen testing
-
KT0501 Enumeration concepts and objectives
-
KT0502 Types of enumeration
-
KT0503 Enumeration countermeasures
-
KT0504 Enumeration methodologies, techniques and tools
-
KT0505 Enumeration pen testing
KM-03-KT06: Vulnerability Analysis
Topic elements to be covered include:
KT0601Vulnerability analysis concepts and objectives
KT0602Vulnerability assessment solutions
KT0603Vulnerability scoring systems
KT0604Vulnerability assessment tools
KT0605Vulnerability assessment reports
-
KT0601 Vulnerability analysis concepts and objectives
-
KT0602 Vulnerability assessment solutions
-
KT0603 Vulnerability scoring systems
-
KT0604 Vulnerability assessment tools
-
KT0605 Vulnerability assessment reports
KM-03-KT07: System Hacking
Topic elements to be covered include:
KT0701System hacking concepts
KT0702Passwords, privileges, applications
KT0703Covering tracks
KT0704Penetration testing
KT0705Human precautions against hacking
-
KT0701 System hacking concepts
-
KT0702 Passwords, privileges, applications
-
KT0703 Covering tracks
-
KT0704 Penetration testing
KM-03-KT08: Malware Threats
Topic elements to be covered include:
KT0801Malware concepts and objectives
KT0802Malware types
KT0803Malware analysis
KT0804Countermeasures and anti-malware software
KT0805Malware penetration testing
-
KT0801 Malware concepts and objectives
-
KT0802 Malware types
-
KT0803 Malware analysis
-
KT0804 Countermeasures and anti-malware software
-
KT0805 Malware penetration testing
KM-03-KT09: Sniffing
Topic elements to be covered include:
KT0901Sniffing concepts and objectives
KT0902Sniffing attacks
KT0903Sniffing techniques
KT0904Sniffing tools
KT0905Countermeasures
KT0906Detection techniques
KT0907Sniffing pen testing
-
KT0901 Sniffing concepts and objectives
-
KT0902 Sniffing attacks
-
KT0903 Sniffing techniques
-
KT0904 Sniffing tools
-
KT0905 Countermeasures
-
KT0906 Detection techniques
-
KT0907 Sniffing pen testing
KM-03-KT10: Social Engineering
Topic elements to be covered include:
KT1001Social engineering concepts and objectives
KT1002Social engineering techniques
KT1003Types of social engineering attacks
KT1004Countermeasures
KT1005Social engineering penetration testing
-
KT1001 Social engineering concepts and objectives
-
KT1002 Social engineering techniques
-
KT1003 Types of social engineering attacks
-
KT1004 Countermeasures
-
KT1005 Social engineering penetration testing
KM-03-KT11: Denial-of-Service
Topic elements to be covered include:
KT1101DoS/DDoS concepts and objectives
KT1102DoS/DDoS attack techniques and tools
KT1103Countermeasures and protection tools
KT1104DoS/DDoS attack penetration testing
-
KT1101 DoS/DDoS concepts and objectives
-
KT1102 DoS/DDoS attack techniques and tools
-
KT1103 Countermeasures and protection tools
-
KT1104 DoS/DDoS attack penetration testing
KM-03-KT12: Session Hijacking
Topic elements to be covered include:
KT1201Session hijacking concepts
KT1202Types of level session hijacking
KT1203Session hijacking tools
KT1204Countermeasures
KT1205Penetration testing
-
KT1201 Session hijacking concepts
-
KT1202 Types of level session hijacking
-
KT1203 Session hijacking tools
-
KT1204 Countermeasures
-
KT1205 Penetration testing
KM-03-KT13: Evading IDS, Firewalls, and Honeypots
Topic elements to be covered include:
KT1301IDS, Firewall, and Honeypot Concepts
KT1302IDS, Firewall, and Honeypot Solutions
KT1303Evading IDS and Firewalls
KT1304IDS/Firewall Evading Tools
KT1305Detecting Honeypots
KT1306IDS/Firewall Evasion Countermeasures
KT1307Penetration Testing
-
KT1301 IDS, Firewall, and Honeypot Concepts
-
KT1302 IDS, Firewall, and Honeypot Solutions
-
KT1303 Evading IDS and Firewalls
-
KT1304 IDS/Firewall Evading Tools
-
KT1305 Detecting Honeypots
-
KT1306 IDS/Firewall Evasion Countermeasures
-
KT1307 Penetration Testing
KM-03-KT14: Hacking Web Servers
Topic elements to be covered include:
KT1401Web server concepts
KT1402Web server attacks
KT1403Attack tools
KT1404Countermeasures
KT1405Defense attack mechanisms
KT1406Security tools
KT1407Penetration testing and pen testing tools
-
KT1401 Web server concepts
-
KT1402 Web server attacks
-
KT1403 Attack tools
-
KT1404 Countermeasures
-
KT1405 Defense attack mechanisms
-
KT1406 Security tools
-
KT1407 Penetration testing and pen testing tools
KM-03-KT15:SQL Injection
Topic elements to be covered include:
KT1501SQL injection concepts
KT1502Types of SQL injection
KT1503SQL injection methodology and tools
KT1504Evasion techniques
KT1505Countermeasures
-
KT1501 SQL injection concepts
-
KT1502 Types of SQL injection
-
KT1503 SQL injection methodology and tools
-
KT1504 Evasion techniques
-
KT1505 Countermeasures
KM-03-KT16: Hacking Wireless Networks
Topic elements to be covered include:
KT1601Wireless concepts
KT1602Wireless encryption
KT1603Wireless threats
KT1604Wireless hacking methodology and tools
KT1605Bluetooth hacking
Topic elements to be covered include:
KT1601Wireless concepts
KT1602Wireless encryption
KT1603Wireless threats
KT1604Wireless hacking methodology and tools
KT1605Bluetooth hacking
KT1606Countermeasures and security tools
KT1607Wi-Fi Pen Testing
-
KT1601 Wireless concepts
-
KT1602 Wireless encryption
-
KT1603 Wireless threats
-
KT1604 Wireless hacking methodology and tools
-
KT1605 Bluetooth hacking
-
KT1606 Countermeasures and security tools
-
KT1607 Wi-Fi Pen Testing
KM-03-KT17: Hacking Mobile Platforms
-
KT1701 Mobile platform attack vectors
-
KT1702 Hacking android OS
-
KT1703 Hacking iOS
-
KT1704 Mobile spyware
-
KT1705 Mobile device management
-
KT1706 Mobile security guidelines and tools
-
KT1707 Mobile pen testing
KM-03-KT18: IoT Hacking
Topic elements to be covered include:
KT1801IoT concepts
KT1802IoT attacks
KT1803IoT hacking methodology and tools
KT1804Countermeasures
KT1805IoT pen testing
-
KT1801 IoT concepts
-
KT1802 IoT attacks
-
KT1803 IoT hacking methodology and tools
-
KT1804 Countermeasures
-
KT1805 IoT pen testing
KM-03-KT19: Cloud Computing
Topic elements to be covered include:
KT1901Cloud computing concepts
KT1902Cloud computing threats and attacks
KT1903Cloud security
KT1904Cloud security tools
KT1905Cloud penetration testing
-
KT1901 Cloud computing concepts
-
KT1902 Cloud computing threats and attacks
-
KT1903 Cloud security
-
KT1904 Cloud security tools
-
KT1905 Cloud penetration testing
KM-03-KT20: Cryptography
Topic elements to be covered include:
KT2001Cryptography concepts and objectives
KT2002Types of cryptography
KT2003Encryption algorithms
KT2004Cryptography tools
KT2005Types of encryption
KT2006Cryptanalysis
KT2007Countermeasures
-
KT2001 Cryptography concepts and objectives
-
KT2002 Types of cryptography
-
KT2003 Encryption algorithms
-
KT2004 Cryptography tools
-
KT2005 Types of encryption
-
KT2006 Cryptanalysis
-
KT2007 Countermeasures
KM-03-KT21: Cyber incident response and management
KT2101Incident response plan
KT2102Incident response process
KT2103Incidence response phases
Preparation
Detection and analysis
Containment and quarantine
Eradication
Recovery (return to production, data)
KT2104Post-incident activity (Lessons Learned)
Identify changes to security
Employee training
Weaknesses in the security system
Updates
-
KT2101 Incident response plan
-
KT2103 Incidence response phases
-
KT2104 Post-incident activity (Lessons Learned)
252901001-KM-04 -Introduction to cybersecurity governance, legislation and ethics
Module Code 252901001-KM-04
NQF Level 4
Credits 4
Curriculum Code 252901001
Qualification Title Occupational Certificate: Cybersecurity Analyst
SAQA QUAL ID 118986
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to acquire general knowledge and understanding of the various legislations governing the workplace and their implication for the employer and employees. The learning of this module will also enable the learner to acquire an understanding of the principles of areas of performance management, business planning concepts, costing of products and concepts of general ethical behaviour and its impact in the workplace
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-04-KT01: Governance
KM-04-KT02: Legislation governing workplaces
KM-04-KT03: Introduction to ethics and security
KM-04-KT04: Ethics at work
KM-04-KT05: Security
KM-04-KT06: Performance management
KM-04-KT07: Business planning
KM-04-KT08: Costing of products
KM-04-KT09: Resources
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
REFERENCE
https://www.saflii.org › legis › consol_act ›
https://codered.eccouncil.org › course › network-defens..
https://www.checkpoint.com › Secure The Network
https://www.sciencedirect.com › topics › computer-science
https://www.forcepoint.com › cyber-edu › defense-depth
https://www.cisco.com › Products & Services › Security
https://www.techtarget.com › searchsecurity › definition
https://www.itgovernance.co.uk › what-is-cybersecurity
https://www.gartner.com › topics › cybersecurity
https://www.ibm.com › za-en › topics › mobile-security
https://www.archonsecure.com › mobile-device-guide
https://preyproject.com › blog › what-are-cyber-threats-h..
https://emeritus.org › learn › different-types-of-cyber-s
https://www.simplilearn.com › cyber-security-tutorial
-
KM-04-KT01: Governance
-
KT0102 Rules, norms and actions that are structured, sustained, regulated and held accountable
-
KT0103 Structures and processes and industry codes of practice
-
KT0104 Transparent, participatory, inclusive and responsive
-
KT0105 Domains of IT governance
-
KT0106 Compliance vs non-compliance
KM-04-KT02: Legislation governing workplaces
Learning Outcome
KT0201 LRA
KT0202 POPI
KT0203 B-BBEE
KT0204 BCEA
KT0205 SDA
KT0206 Current trends
-
KT0201 LRA
-
KT0202 POPI
-
KT0203 B-BBEE
-
KT0204 BCEA
-
KT0205 SDA
-
KT0206 Current trends
KM-04-KT03: Introduction to ethics and security
Learning Outcome
KT0301 Principles and practices
KT0302 Concepts, definitions and terminology
-
KT0301 Principles and practices
-
KT0302 Concepts, definitions and terminology
KM-04-KT04: Ethics at work
Learning Outcome
KT0401 Code of conduct and moral compass
KT0402 Components of ethical behaviour, including integrity, honesty, fair dealing, respecting diversity
KT0403 Unwritten but expected behaviours, including reliability, accountability, time keeping, respect for others
KT0404 Lapses in ethical behaviour, including sexual harassment, racism, bullying, theft, abuse of company property, rules, time and sick leave
KT0405 Conflicts of interest, including primary and secondary interests, the impact on individuals and organisations and the link to corruption
KT0406 The need for ethical behaviour and the impact or consequences of lapses in ethical behaviour
KT0407 Copyright and plagiarism
KT0408 Intellectual property
KT0409 Spamming
KT0410 Contract management
KT0411 Software licensing
KT0412 Pricing
-
KT0401: Ethics at work
-
KT0402 Components of ethical behaviour, including integrity, honesty, fair dealing and respecting diversity
-
KT0403 Unwritten but expected behaviours, including reliability, accountability, time keeping and respect for others
-
KT0404 Lapses in ethical behaviour, including sexual harassment, racism, bullying, theft, abuse of company property, rules, time and sick leave
-
KT0405 Conflicts of interest, including primary and secondary interests, the impact on individuals and organisations and the link to corruption
-
KT0406 The need for ethical behaviour and the impact or consequences of lapses in ethical behaviour
-
KT0407 Copyright and plagiarism
-
KT0408 Intellectual property
-
KT0409 Spamming
-
KT0410 Contract management
-
KT0411 Software licensing
-
KT0412 Pricing
KM-04-KT05: Security
Learning Outcome
KT0501 Risks, threats and vulnerabilities
KT0502 Mitigation tools and strategies
KT0503 Digital forensics
KT0504 Cloud
KT0505 Commercial law
KT0506 Cyber security
KT0507 New trends
-
KT0501 Risks, threats and vulnerabilities
-
KT0502 Mitigation tools and strategies
-
KT0503 Digital forensics
-
KT0504 Cloud
-
KT0505 Commercial law
-
KT0506 Cyber security
-
KT0507 New trends
KM-04-KT06: Performance management
Learning Outcome
KT0601 Planning, organising and control
KT0602 Work flow
KT0603 Cost, waste
KT0604 Productivity, efficiency
KT0605 Housekeeping
KT0606 Risk, health, safety, environment and related systems
KT0607 Quality and quality systems
KT0608 Continual improvement
-
KT0601 Planning, organising and control
-
KT0602 Work flow
-
KT0603 Cost, waste
-
KT0604 Productivity, efficiency
-
KT0605 Housekeeping
-
KT0606 Risk, health, safety, environment and related systems
-
KT0607 Quality and quality systems
-
KT0608 Continual improvement
KM-04-KT07: Business planning
Learning Outcome
KT0701 Business sustainability
KT0702 Concept of supply and demand
KT0703 Concept of profit, loss and breakeven
KT0704 Accountability and responsibility
KT0705 Competition
KT0706 Customers
KT0707 Contracts
KT0708 Budgets
-
KT0701 Business sustainability
-
KT0702 Concept of supply and demand
-
KT0703 Concept of profit, loss and breakeven
-
KT0704 Accountability and responsibility
-
KT0705 Competition
-
KT0706 Customers
-
KT0707 Contracts
-
KT0708 Budgets
KM-04-KT08: Costing of products
Learning Outcome
KT0801 Input cost
KT0802 Overhead costs
KT0803 Direct labour cost
KT0804 Pricing a product (Under- or over-pricing)
-
KT0801 Input cost
-
KT0802 Overhead costs
-
KT0803 Direct labour cost
-
KT0804 Pricing a product (Under- or over-pricing)
KM-04-KT09: Resources
Learning Outcome
KT0901 Human resources
KT0902 Financial resources
KT0903 Physical resources (infrastructure, machinery, equipment)
KT0904 Communication and information technology
-
KT0901 Human resources
-
KT0902 Financial resources
-
KT0903 Physical resources (infrastructure, machinery, equipment)
-
KT0904 Communication and information technology
252901001-KM-05 – Fundamentals of design thinking and innovation
Module Code 252901001-KM-05
NQF Level 4
Credits 1
Curriculum Code 252901001
Qualification Title Occupational Certificate: Cybersecurity Analyst
SAQA QUAL ID 118986
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of the design thinking principles and application in the workplace
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-05-KT01: Introduction to design thinking
KM-05-KT02: The human element
KM-05-KT03: Creativity
KM-05-KT04: Innovation
KM-05-KT05: Design
KM-05-KT06: Design thinking methodology
KM-05-KT07: Application of design thinking
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
-
KM-05-KT01: Introduction to design thinking – KT0101 Philosophy
-
KT0102 Approach and concepts
-
KT0103 Definitions and terminology
-
KT0104 History
KM-05-KT02: The human element
Learning Outcome
KT0201 Human centeredness
KT0202 Human participation
-
KT0201 Human centeredness
-
KT0202 Human participation
KM-05-KT03: Creativity
Learning Outcome
KT0301 Creativity: is unleashing the potential of the mind to conceive new ideas
KT0302 Perceiving the world in new ways
KT0303 Find hidden patterns
KT0304 Make connections between seemingly unrelated phenomena
KT0305 Generate solutions
KT0306 Application in the workplace
-
KT0301 Creativity: is unleashing the potential of the mind to conceive new ideas
-
KT0302 Perceiving the world in new ways
-
KT0303 Find hidden patterns
-
KT0304 Make connections between seemingly unrelated phenomena
-
KT0305 Generate solutions
-
KT0306 Application in the workplace
KM-05-KT04: Innovation
• Learning Outcome
• KT0401 Innovation: is the action of putting things into practical reality, despite challenges and resistance
• KT0402 Different innovations:
• Incremental
• Disruptive
• Architectural and
• Radical
• KT0403 Main types of innovation:
• Process innovation
• Product innovation
• Organisational innovation
• Market innovation
• KT0404 What innovation means to business
-
KT0401 Innovation: is the action of putting things into practical reality, despite challenges and resistance
-
KT0402 Different innovations:
-
KT0403 Main types of innovation:
-
KT0404 What innovation means to business
KT-05-KT05: Design
Learning Outcome
KT0501 Think outside the box
KT0502 Push beyond the obvious solutions
KT0503 Communication through shape and form
-
KT0501 Think outside the box
-
KT0502 Push beyond the obvious solutions
-
KT0503 Communication through shape and form
KM-05-KT06: Design thinking methodology
Learning Outcome
KT0601 Design thinking phases
KT0602 Design thinking tools and techniques
-
KT0601 Design thinking phases
-
KT0602 Design thinking tools and techniques
KM-05-KT07: Application of design thinking
Learning Outcome
KT0701 Application in software development
KT0702 Application in cyber security
KT0703 Business innovation
KT0704 Innovative problem solving
-
KT0701 Application in software development
-
KT0702 Application in cyber security
-
KT0703 Business innovation
-
KT0704 Innovative problem solving
252901001-KM-06 – Refresher Logical Thinking And Basic Calculations
Module Code 252901001-KM-06
NQF Level 4
Credits 3
Curriculum Code 252901001
Qualification Title Occupational Certificate: Cybersecurity Analyst
SAQA QUAL ID 118986
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to acquire mathematical thinking theory for solving problems and acquire basic maths knowledge for using software toolkits or platforms
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
• KM-06-KT01: Mathematical thinking skills for problem solving.
• KM-06-KT02: Basic math
• KM-06-KT03: Conversion between decimal and binary systems
• KM-06-KT04: Express size and magnitude
• KM-06-KT05: Error in calculations
• KM-06-KT06: Cartesian coordinate system
• KM-06-KT07: Pythagorean theorem for finding the distance between two points
• KM-06-KT08: Operator precedence
• KM-06-KT09: Integer division
• KM-06-KT10: Modulus
• KM-06-KT11: Increments
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
-
KM-06-KT01: Mathematical thinking skills for problem solving. Learning Outcome
-
KT0102 Mathematical thinking steps for solving problems:
KM-06-KT02 : Conversion between decimal and binary systems
Learning Outcome
KT0201 Introduction to binary numbers
KT0202 Performing addition and subtraction of positive whole numbers in binary
KT0203 Binary arithmetic
KT0204 Use of BODMAS
-
KT0201 Introduction to binary numbers
-
KT0202 Performing addition and subtraction of positive whole numbers in binary
-
KT0203 Binary arithmetic
-
KT0204 Use of BODMAS
KM-06-KT03 : Expressing size and magnitude
Learning Outcome
KT0301 Use scientific notation for small and large numbers
KT0302 Prefixes: From Giga to Pica (109 to 10 -12)
KT0303 Conversions: SI to Imperial: degrees F to degrees C
-
KT0301 Use scientific notation for small and large numbers
-
KT0302 Prefixes: From Giga to Pica (109 to 10 -12)
-
KT0303 Conversions: SI to Imperial: degrees F to degrees C
KM-06-KT04: Error in calculations
Learning Outcome
KT0401 Rational and irrational numbers
KT0402 Explore repeating decimals and convert them to fraction form
KT0403 Symbols for irrational numbers
KT0404 Rounding prematurely in calculations
KT0405 Accuracy
KT0406 Final value of a calculation expressed in terms of the required unit
-
KT0401 Rational and irrational numbers
-
KT0402 Explore repeating decimals and convert them to fraction form
-
KT0403 Symbols for irrational numbers
-
KT0404 Rounding prematurely in calculations
-
KT0405 Accuracy
-
KT0406 Final value of a calculation expressed in terms of the required unit
KM-06-KT05 :Cartesian coordinate system
Learning Outcome
KT0501 Definition
KT0502 Terminology
KT0503 The coordinate plane
KT0504 Intersecting x- and y-axes
KT0505 Four quadrants
KT0506 Naming using Roman numerals
KT0507 Use and application – creating graphs and maps
-
KT0501 Definition
-
KT0502 Terminology
-
KT0503 The coordinate plane
-
KT0504 Intersecting x- and y-axes
-
KT0505 Four quadrants
-
KT0506 Naming using Roman numerals
-
KT0507 Use and application – creating graphs and maps
KM-06-KT06 : Pythagorean theorem for finding the distance between two points
Learning Outcome
KT0601 Definition
KT0602 Terminology
KT0603 Purpose
KT0604 Determine the distance between two points on the Cartesian grid
-
KT0601 Definition
-
KT0602 Terminology
-
KT0603 Purpose
-
KT0604 Determine the distance between two points on the Cartesian grid
KM-06-KT07 : Operator precedence
Learning Outcome
KT0701 Definition and terminology
KT0702 Purpose and use
KT0703 Order of operations (left to right)
KT0704 Apply precedence:
Parentheses
Multiply and divide
Add and subtract
KT0705 Use of PEDMAS in programming
-
KT0701 Definition and terminology
-
KT0702 Purpose and use
-
KT0703 Order of operations (left to right)
-
KT0704 Apply precedence:
-
KT0705 Use of PEDMAS in programming
KM-06-KT08 : Integer division
Learning Outcome
KT0801 Definition and terminology
KT0802 Purpose and use
KT0803 Rules on how to divide integers
KT0804 Names and symbols for integer division
KT0805 Software for integer division
-
KT0801 Definition and terminology
-
KT0802 Purpose and use
-
KT0803 Rules on how to divide integers
-
KT0804 Names and symbols for integer division
-
KT0805 Software for integer division
KM-06-KT09 : Modulus
Learning Outcome
KT0901 Definition and terminology
KT0902 Purpose and use
KT0903 Modulus abbreviated as “mod”
KT0904 % application
KT0905 (==) application
KT0906 Modulus in programming
-
KT0901 Definition and terminology
-
KT0902 Purpose and use
-
KT0903 Modulus abbreviated as “mod”
-
KT0904 % application
-
KT0905 (==) application
-
KT0906 Modulus in programming
KM-06-KT10 : Increments
Learning Outcome
KT1001 Definition and terminology
KT1002 Purpose and use
KT1003 Increment a variable
KT1004 compound assignment operator
KT1005 Increments in programming
-
KT1001 Definition and terminology
-
KT1002 Purpose and use
-
KT1003 Increment a variable
-
KT1004 Compound Assignment Operator
-
KT1005 Increments in programming
KM-06-KT11 : Mixing types
Learning Outcome
KT1101 Definition and terminology
KT1102 Purpose and use
KT1103 Apply an operator
KT1104 Combination with the order of operations
KT1105 The order in which an expression is written
KT1106 How a computer would evaluate some expressions that combine types
REFERENCE
://press.rebus.community › chapter › integer-division..
https://blog.mattclemente.com › 2019/07/12 › modulus..
https://en.wikipedia.org › wiki › Modulo_operation
https://codered.eccouncil.org › course › network-defens..
https://www.checkpoint.com › Secure The Network
https://www.sciencedirect.com › topics › computer-science
https://www.forcepoint.com › cyber-edu › defense-depth
https://www.cisco.com › Products & Services › Security
https://www.techtarget.com › searchsecurity › definition
https://www.itgovernance.co.uk › what-is-cybersecurity
https://www.gartner.com › topics › cybersecurity
https://www.ibm.com › za-en › topics › mobile-security
https://www.archonsecure.com › mobile-device-guide
https://preyproject.com › blog › what-are-cyber-threats-h..
https://emeritus.org › learn › different-types-of-cyber-s
https://www.simplilearn.com › cyber-security-tutorial
-
KT1101 Definition and terminology
-
KT1102 Purpose and use
-
KT1103 Apply an operator
-
KT1104 Combination with the order of operations
-
KT1105 The order in which an expression is written
-
KT1106 How a computer would evaluate some expressions that combine types
252901001-KM-098: Data And Databases Vulnerabilities
Module Code 252901001-KM-098
NQF Level 4
Credits 3
Curriculum Code 252901001
Qualification Title Occupational Certificate: Cybersecurity Analyst
SAQA QUAL ID 118986
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of data and databases and giving meaning to data through data processing, analysis and visualisation
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-08-KT01: Data vulnerability and security
KM-08-KT02: Data and data processing
KM-08-KT03: Databases, data storage and access to data
KM-08-KT04: Structured query language (SQL)
KM-08-KT05: Data scraping
KM-08-KT06: Software for analysing and visualising data.
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
Listen carefully to the instructions of the facilitator and do the given activities in the time given to you.
KM-08-KT01: Data vulnerability and security
Learning Outcome
KT0101 Definition
KT0102 Data vulnerability, risk and exploitation
KT0103 Stages of data vulnerability: at network level, at system level, at data level.
KT0104 Purpose of protecting data
KT0105 Process for protecting data
KT0106 Unauthorised access, elevation of privileges or denial of data
KT0107 Data corruption
KT0108 Data security solutions
-
KT0101 Definition
-
KT0102 Data vulnerability, risk and exploitation
-
KT0103 Stages of data vulnerability: at network level, at system level, at data level.
-
KT0104 Purpose of protecting data
-
KT0105 Process for protecting data
-
KT0106 Unauthorised access, elevation of privileges or denial of data
-
KT0107 Data corruption
-
KT0108 Data security solutions
KM-08-KT02: Data and data processing
Learning Outcome
KT0201 Value of data
KT0202 Data analysis for RPA: Importance of analysis
KT0203 Data sourcing:
Data sources
Data types
Reliable data
Automated data collection
KT0204 Refining data:
Missing data
Data misalignments
Separating useful data from the rest
KT0205 Flaws in data:
Commission
Omission
Perspective
Bias
Frame of reference
KT0206 Limits of data acquisition
KT0207 Data:
Setting up data,
Data interactions,
Assigned to different fields
-
KT0201 Value of data
-
KT0202 Data analysis for RPA: Importance of analysis
-
KT0203 Data sourcing:
-
KT0204 Refining data:
-
KT0205 Flaws in data:
-
KT0206 Limits of data acquisition
-
KT0207 Data:
KM-08-KT03: Databases, data storage and access to data
• Learning Outcome
• • KT0301 Database: definition, components, function, types, characteristics of good databases, structure and challenges
• KT0302 Data:
• storage, characteristics of quality data,
• KT0303 Data:
• collection warehousing, mining and managing concepts
• KT0304 Relational database design
• KT0305 Database design tools
• KT0306 Create, design and modify relational database
• KT0307 Import and export data
• KT0308 Design and create queries
-
KT0301 Database: definition, components, function, types, characteristics of good databases, structure and challenges
-
KT0302 Data:
-
KT0303 Data:
-
KT0304 Relational database design
-
KT0305 Database design tools
-
KT0306 Create, design and modify relational database
-
KT0307 Import and export data
-
KT0308 Design and create queries
KM-08-KT04: Structured query language (SQL)
Learning Outcome
KT0401 SQL programming language
KT0402 SQL code constructs to perform database transactions
KT0403 Storing, retrieving, managing or manipulating the data inside a relational database
management system (RDBMS)
-
KT0401 SQL programming language
-
KT0402 SQL code constructs to perform database transactions
-
KT0403 Storing, retrieving, managing or manipulating the data inside a relational database
-
KT0403 Storing, retrieving, managing or manipulating the data inside a relational database
KM-08-KT05: Data scraping
Learning Outcome
KT0501 Concept and definition
KT0502 Purpose of data scraping
KT0503 Data scraping tools
KT0504 Legal issues
KT0505 Web scraping procedure:
Find the URL to scrape
Inspecting the page
Find the data you want to extract
Write the code
Run the code and extract the data
Store the data in the required format
KT0506 Libraries used for web scraping
-
KT0501 Concept and definition
-
KT0502 Purpose of data scraping
-
KT0503 Data scraping tools
-
KT0504 Legal issues
-
KT0505 Web scraping procedure:
-
KT0506 Libraries used for web scraping
KM-08-KT06: Software for analysing and visualising data.
Learning Outcome
KT0601 Reporting
KT0602 Tables
KT0603 Pivot tables and pivot charts
KT0604 Dashboards
KT0605 Hierarchies and time data
KT0606 The data model
KT0607 Importing data from files
KT0608 Importing data from databases
KT0609 Importing data from reports
References
https://codered.eccouncil.org › course › network-defens..
https://www.checkpoint.com › Secure The Network
https://www.sciencedirect.com › topics › computer-science
https://www.forcepoint.com › cyber-edu › defense-depth
https://www.cisco.com › Products & Services › Security
https://www.techtarget.com › searchsecurity › definition
https://www.itgovernance.co.uk › what-is-cybersecurity
https://www.gartner.com › topics › cybersecurity
https://www.ibm.com › za-en › topics › mobile-security
https://www.archonsecure.com › mobile-device-guide
https://preyproject.com › blog › what-are-cyber-threats-h..
https://emeritus.org › learn › different-types-of-cyber-s
https://www.simplilearn.com › cyber-security-tutorial
-
KT0609 Importing data from reports – KT0601 Reporting
-
KT0602 Tables
-
KT0603 Pivot tables and pivot charts
-
KT0604 Dashboards
-
KT0605 Hierarchies and time data
-
KT0606 The data model
-
KT0607 Importing data from files
-
KT0608 Importing data from databases
-
KT0609 Importing data from reports
-
KT0610 Creating and formatting measures
-
KT0611 Visualizing data
252901001-KM-09 – Introduction to 4ir and future skills
Module Code 252901001-KM-09
NQF Level 4
Credits 4
Curriculum Code 252901001
Qualification Title Occupational Certificate: Cybersecurity Analyst
SAQA QUAL ID 118986
Note to the learner
This Learner Guide provides a comprehensive overview of the module. It is designed to improve the skills and knowledge of learners, and thus enabling them to effectively and efficiently complete specific tasks.
Entry Requirements
• NQF 4
Provider Accreditation Requirements for the Knowledge Module
Physical Requirements
• The provider must have lesson plans and structured learning material or provide learners with access to structured learning material that addresses all the topics in all the knowledge modules as well as the applied knowledge in the practical skills.
• QCTO/ MICT SETA requirements
Human Resource Requirements:
• Lecturer/learner ratio of 1:20 (Maximum)
• Qualification of lecturer (SME):
NQF 6 in industry recognised qualifications with 1 years’ experience in the IT industry
CYBERSECURITY vendor certification
• Assessors and moderators: accredited by the MICT SETA
Legal Requirements
• Legal (product) licences to use the software for learning and training
• OHS compliance certificate
• Ethical clearance (where necessary)
Module Purpose
The main focus of the learning in this knowledge module is to build an understanding of the impact of 4IR on communities, individuals and businesses and important skills for future needs
Topic elements to be covered include
The learning will enable learners to demonstrate an understanding of:
KM-09-KT01:4 IR emerging trends
KM-09-KT02: Computing Knowledge
KM-09-KT03: Future skills and competencies (4IR)
KM-09-KT04:4 IR trends affecting businesses
KM-09-KT05: Interpersonal skills
KM-09-KT06: Intrapersonal skills
KM-09-KT07: Communication principles and methods
KM-09-KT08: Written business communication
KM-09-KT09: Presentation skills
KM-09-KT10: Teamwork in the workplace
KM-09-KT11: Committees and meetings
KM-09-KT09: Job descriptions and profiles
KM-09-KT13: Customers and stakeholders
KM-09-KT14: Customer service
Venue, Date and Time:
Consult your facilitator should there be any changes to the venue, date and/or time.
Refer to your timetable
Assessments
The only way to establish whether you are competent and have accomplished the learning outcomes is through continuous assessments. This assessment process involves interpreting evidence about your ability to perform certain tasks. You will be required to perform certain procedures and tasks during the training programmer and will be assessed on them to certify your competence.
This module includes assessments in the form of self-evaluations/activities and exercises. The exercises, activities and self-assessments will be done in pairs, groups or on your own. These exercises/activities or self-assessments (Learner workbook) must be handed to the facilitator. It will be added to your portfolio of evidence, which will be proof signed by your facilitator that you have successfully performed these tasks.
-
KM-09-KT01:4 IR emerging trends: KT0101Artificial intelligence
-
KT0102 Cloud computing
-
KT0103 Cyber security
-
KT0104 Data science
-
KT0105 Internet of things
-
KT0106 Quality engineering automation
-
KT0107 Robotic processing automation
-
KT0108 Software programming
-
KT0109 Design thinking and innovation
-
KT0110 e-Waste
KM-09-KT02: Computing Knowledge
Learning Outcome
KT0201 Introduction to programming language
KT0202 Programming basics
KT0203 Basic programming knowledge on HTML, JavaScript (or any scripting language)
KT0204 Software development, e.g., C#, C++, Java, .NET
KT0205 Databases (SQL or NoSQL)
KT0206 Web development technologies
-
KT0201 Introduction to programming language
-
KT0202 Programming basics
-
KT0203 Basic programming knowledge on HTML, JavaScript (or any scripting language)
-
KT0204 Software development, e.g., C#, C++, Java, .NET
-
KT0205 Databases (SQL or NoSQL)
-
KT0206 Web development technologies
KM-09-KT03: Future skills and competencies (4IR)
KT0301 Disruptive thinking (encourage this) (application to their own environment)
KT0302 Continuously searching for ideas
KT0303 Thinking innovatively (analyse the current market and come up with solutions to the current problems)
KT0304 Soft skills
KT0305 Programming languages
KT0306 Operating systems
KT0307 Open source
KT0308 Tools for a cloud environment (for configuration and management), tools for debugging, login and monitoring and tools for image
KT0309 Familiarity with Office tools
KT0310 Leadership and people management skills
-
KT0301 Disruptive thinking (encourage this) (application to their own environment)
-
KT0302 Continuously searching for ideas
-
KT0303 Thinking innovatively (analyse the current market and come up with solutions to the current problems)
-
KT0304 Soft skills
-
KT0305 Programming languages
-
KT0306 Operating systems
-
KT0307 Open source
-
KT0308 Tools for a cloud environment (for configuration and management), tools for debugging, login and monitoring and tools for image
-
KT0309 Familiarity with Office tools
-
KT0310 Leadership and people management skills
KM-09-KT04:4 IR trends affecting businesses
Learning Outcome
KT0401 Afro-centric approach to African problems – taking the best from the existing products and coming up with own solutions - Continental challenges and opportunities
KT0402 Using Google, Amazon and MS forms and tools to reduce development time (e.g.,
embed AI APIs)
KT0403 Business intelligence applications and availability of Big Data (collecting data, converting data into information and turning information into knowledge, knowledge into intelligence and intelligence into wisdom)
KT0404 Collecting data on clients
KT0405 Insight into different markets
KT0406 Automated factories
KT0407 Exposure to the global world
-
KT0401 Afro-centric approach to African problems – taking the best from the existing products and coming up with own solutions – Continental challenges and opportunities
-
KT0402 Using Google, Amazon and MS forms and tools to reduce development time (e.g., embed AI APIs)
-
KT0403 Business intelligence applications and availability of Big Data (collecting data, converting data into information and turning information into knowledge, knowledge into intelligence and intelligence into wisdom)
-
KT0404 Collecting data on clients
-
KT0405 Insight into different markets
-
KT0406 Automated factories
-
KT0407 Exposure to the global world
KM-09-KT05: Interpersonal skills
Learning Outcome
KT0501 Concept, definition and terminology
KT0502 Principles
KT0503 Attributes:
Social intelligence
Confidentiality
Conflict handling and resolution
Decision making
Defending vs attacking
Problem solving, Troubleshooting
Respect
Roles, responsibilities
Thinking about the end-user
-
KT0501 Concept, definition and terminology
-
KT0502 Principles
-
KT0503 Attributes:
KM-09-KT06: Intrapersonal skills
Learning Outcome
KT0601 Concept, definition and terminology
KT0602 Principles
KT0603 Attributes:
Adaptability
Agility
Analytical thinking
Cognitive thinking skills
Emotional maturity
Flexibility
Planning
Problem solving
Reflection
Research and investigate
Self-management
Strong attention to detail
Time-management
Resilience
-
KT0601 Concept, definition and terminology
-
KT0602 Principles
-
KT0603 Attributes:
KM-09-KT07: Communication principles and methods
Learning Outcome
KT0701 Concept, definition and terminology
KT0702 The different types and forms of communication and communication processes
KT0703 Communication methods
KT0704 Barriers to communication
KT0705 Communication network: Interdepartmental, Supply chain network, etc.
KT0706 Advantages of good communication
KT0707 Consequences of poor/no communication
-
KT0701 Concept, definition and terminology
-
KT0702 The different types and forms of communication and communication processes
-
KT0703 Communication methods
-
KT0704 Barriers to communication
-
KT0705 Communication network: Interdepartmental, Supply chain network, etc.
-
KT0706 Advantages of good communication
-
KT0707 Consequences of poor/no communication
KM-09-KT08: Written business communication
Learning Outcome
KT0801 Business requirement specifications
KT0802 Types
KT0803 Conventions
KT0804 Schedules
KT0805 Reports, reporting protocols and methods
KT0806 Manuals and guidelines
KT0807 Work instructions/briefs
KT0808 Technical report writing
KT0809 Extracting information from written texts
KT0810 Policies aligned to standard (IEEE 829-2008 standards)
-
KT0801 Business requirement specifications
-
KT0802 Types
-
KT0803 Conventions
-
KT0804 Schedules
-
KT0805 Reports, reporting protocols and methods
-
KT0806 Manuals and guidelines
-
KT0807 Work instructions/briefs
-
KT0808 Technical report writing
-
KT0809 Extracting information from written texts
-
KT0810 Policies aligned to standard (IEEE 829-2008 standards)
KM-09-KT09: Presentation skills
Learning Outcome
KT0901 Concept, definition and terminology
KT0902 Types: visual, verbal, written
KT0903 Conventions
KT0904 Presenting options and solutions
KT0905 Presenting technical details
KT0906 Visualisation of business intelligence
KT0907 Suitable APIs and storytelling using the right tools to:
present
frame the story
focus on certain aspects
pitch
clear terms
pictorial
-
KT0901 Concept, definition and terminology
-
KT0902 Types: visual, verbal, written
-
KT0903 Conventions
-
KT0904 Presenting options and solutions
-
KT0905 Presenting technical details
-
KT0906 Visualisation of business intelligence
-
KT0907 Suitable APIs and storytelling using the right tools to:
KM-09-KT10: Teamwork in the workplace
Learning Outcome
KT1001 Concept, definition and terminology
KT1002 Principles of teamwork
KT1003 Advantages of teamwork
KT1004 Team composition and members
KT1005 Roles, responsibilities and functions
KT1006 Team dynamics
KT1007 Common goals and collaboration
KT1008 Nature of multidisciplinary teams and teamwork
KT1009 Setting and achieving targets
KT1010 Collaboration tools (electronic)
-
KT1001 Concept, definition and terminology
-
KT1002 Principles of teamwork
-
KT1003 Advantages of teamwork
-
KT1004 Team composition and members
-
KT1005 Roles, responsibilities and functions
-
KT1006 Team dynamics
-
KT1007 Common goals and collaboration
-
KT1008 Nature of multidisciplinary teams and teamwork
-
kT1009 Setting and achieving targets
-
KT1010 Collaboration tools (electronic)
KM-09-KT11: Committees and meetings
Learning Outcome
KT1101 Procedures
KT1102 Agendas and minutes
KT1103 Roles and responsibilities
KT1104 WSP committees
KT1105 EE committees
KT1106 Safety and health committees
KT1107 Wellness committees
-
KT1101 Procedures
-
KT1102 Agendas and minutes
-
KT1103 Roles and responsibilities
-
KT1104 WSP committees
-
KT1105 EE committees
-
KT1106 Safety and health committees
-
KT1107 Wellness committees
KM-09-KT12: Job descriptions and profiles
Learning Outcome
KT1201 Purpose
KT1202 Job and person specification
KT1203 Content
KT1204 Alignment to performance standards
-
KT1201 Purpose
-
KT1202 Job and person specification
-
KT1203 Content
-
KT1204 Alignment to performance standards
KM-09-KT13: Customers and stakeholders
Learning Outcome
KT1301 Concept, definition and terminology
KT1302 Types of customers
KT1303 Customer profile
KT1304 Typical customer behaviour: including habits and mannerisms
KT1305 Difficult customers
KT1306 Customer care
KT1307 Stakeholder management and participation
-
KT1301 Concept, definition and terminology
-
KT1302 Types of customers
-
KT1303 Customer profile
-
KT1304 Typical customer behaviour: including habits and mannerisms
-
KT1305 Difficult customers
-
KT1306 Customer care
-
KT1307 Stakeholder management and participation
KM-09-KT14: Customer service
Learning Outcome
KT1401 Concept, definition and terminology
KT1402 Customer service principles
KT1403 Customer centeredness
KT1404 Handover and sign-off procedures and techniques
KT1405 Technical documentation
KT1406 Training in the use of the system
References
https://codered.eccouncil.org › course › network-defens..
https://www.checkpoint.com › Secure The Network
https://www.sciencedirect.com › topics › computer-science
https://www.forcepoint.com › cyber-edu › defense-depth
https://www.cisco.com › Products & Services › Security
https://www.techtarget.com › searchsecurity › definition
https://www.itgovernance.co.uk › what-is-cybersecurity
https://www.gartner.com › topics › cybersecurity
https://www.ibm.com › za-en › topics › mobile-security
https://www.archonsecure.com › mobile-device-guide
https://preyproject.com › blog › what-are-cyber-threats-h..
https://emeritus.org › learn › different-types-of-cyber-s
https://www.simplilearn.com › cyber-security-tutorial
-
KT1401 Concept, definition and terminology
-
KT1402 Customer service principles
-
KT1403 Customer centeredness
-
KT1404 Handover and sign-off procedures and techniques
-
KT1405 Technical documentation
-
KT1405 Technical documentation
-
KT1406 Training in the use of the system
