Cyber Security Risk Analyst

Course details

Level

shield with tick

Level 4

Duration

calendar

15 months

One-to-one support

handshake

Every 4 weeks

You will achieve

BCS Level 4 Cyber Security Analyst

Delivery of programme

Phase one

Pre-Induction

Before your induction we’ll take you and your employer through the apprenticeship standard and discuss your job role. You’ll also begin your personalised Vocational Scorecard, which assesses your current skill level so that we can develop an individual learning plan tailored to your needs.

Induction

Your induction will take place within the first two weeks of starting your employment. You’ll be taken through the dedicated support available to you throughout your learning journey and will be introduced to our Virtual Learning Environment and online portfolio platform.

Functional skills

We use BKSB tests to determine your current level of knowledge in English and/or Maths. If you require Functional Skills training you’ll undertake 3 remote sessions and workshops before sitting an exam.

Phase two

Modules

What you will learn

  • Security controls for networks, servers and applications
  • Security principals
  • Implementing proper procedures for data confidentiality and availability
  • Develop critical thinking and problem solving skills using real equipment and packet tracer

What you will learn

  • Explain what is meant by data and protocol and how they relate to each other
  • Describe an example data format and a simple protocol in current use (using protocol diagrams)
  • Describe example failure modes in protocols
  • Describe at least one approach to error control in a network
  • Describe the main features of network protocols in widespread use on the Internet, their purpose and relationship to each other in a layered model
  • Describe the main routing protocols in current use in computer networks and explain the differences between static and dynamic routing protocols and the pros and cons of each in different circumstances
  • Explain some of the main factors that affect network performance and propose ways to improve perf

What you will learn

  • Explain why information and cyber security is important to business and society
  • Explain basic concepts: security, identity, confidentiality, integrity, availability, threat, vulnerability, risk & hazard
  • Explain how the concepts of threat, hazard and vulnerability relate to each other and lead to risk
  • Explain what penetration testing (‘ethical hacking’) is and how it contributes to assurance
  • Apply basic security concepts to develop security requirements
  • Describe some common vulnerabilities in computer networks and systems (for example, non-secure coding and unprotected networks)
  • Describe the main types of common attack techniques (for example: phishing, social engineering, malware, network interception, blended techniques e.g. ‘advanced persistent threat’, denial of service, theft)
  • Describe legal standards, regulations and ethical standards relevant to cyber security

What you will learn

  • Risk assessment theory including principles and terminology associated with risk, key steps in risk management, qualitative and quantitative approaches to risk assessment and presenting the results of risk assessment
  • Risk assessment threats and vulnerabilities
  • Risk assessment standards including methodologies and frameworks, as well as their differences and similarities and how to apply risk methodologies and frameworks
  • Risk assessment practice including the application of methodologies and frameworks in organisations, comparing approaches to treating risk and the role of the risk owner by comparison with other stakeholders

What you will learn

  • Governance and the need, purpose and implementation of it. This includes why it’s necessary to manage information security, information management security structures, how structures operate together to deliver security outcomes and how legislation and regulation can be implemented to meet information security risks
  • Access control support for governance, including how effective management of identity supports an organisation’s security policies, standards and governance
  • Policies and procedures in different organisational environments, including the factors that shape the environment, types of organisations and sectors and how this has an impact on security management, regulations, and GDPR
  • Security expert roles and information providers including key characteristics of roles, main professional qualifications, external specialists, security teams and the purpose of security intelligence
  • Legal framework including how legislation interacts to support security, privacy and data protection. Another factor is the consideration of the key security standards that impact information security
  • Applying ISO 27001:2013 including ISMS, the standard key concepts, achieving certification and the benefits of certification.
  • Security breach notification including reporting to the Information Commissioner’s Office, and it’s relation to UK Data Protection Act and GDPR
People icon

One-to-one support

Your Technical Trainer and Progress Management Co-ordinator (PMC) will be on-hand to support you throughout your apprenticeship. Your PMC will contact you every 4 weeks to discuss your progress made to date and your Technical Trainer will work with you to set and support you with your projects. Once your training is complete, a dedicated EPA facilitator will help get you prepared for End Point Assessment.

portfolio

Your portfolio

Throughout the apprenticeship, you will contribute evidence towards your online e-portfolio. We use e-portfolios as they are accessible from anywhere, and enable you to track your progress throughout your apprenticeship. You’ll have access to your personal dashboard to monitor your progress and identify any gaps in your portfolio of evidence.

20 percent pie chart

Off-the-job training

Off-the-job (OTJ) training is comprised of, but not limited to activities such as: training with Estio, shadowing, journal entries and projects for e-portfolio. Completed within working hours as agreed with the employer but average at 6 hours per week (20% of your time on your apprenticeship). You can track your OTJ progress on your e-portfolio.

Phase three

Assessment Gateway, preparation & administration week

The Gateway week is used to finetune your skills and offer a simulated Synoptic Project for systems familiarisation, and to ensure that your Summative Portfolio and Employer Reference are completed before entering into EPA.

Phase four

End Point Assessment

You will be assessed by an End Point Assessment Organisation, chosen by your employer. This independent assessor will feedback the results (Pass, Merit or Distinction) and the ESFA will provide your certificate.

Where can this apprenticeship take me?

More information about this apprenticeship can be found on the institute for apprenticeships website.

University study

Level 4 apprenticeships are the equivalent to a foundation degree. If you wish to study further whilst staying in work, some univeristies will offer the ability to learn remotely. If you wish to take a break from work, you may need to apply for a student loan whilst you study.

Current vacancies

Get in touch!

Call our team on 01133 500 333 or fill out our enquiry form below