Cyber Security Technologist

Course details

Level

shield with tick

Level 4

Duration

calendar

15 months

Skills Coach support

handshake

Every 4 weeks

You will achieve

Cyber Security Technologist Logo

Level 4 Cyber Security Technologist
BCS

Common job roles

  • Security Architect
  • Security Analyst/Risk Analyst
  • Intelligence Researcher
  • Security Sales Engineer
  • Security Administrator

Roles you may progress into

  • Senior Cyber Operations Manager
  • Governance & Compliance Analyst
  • Information Security Assurance & Threat Analyst
  • Forensics & Incident Response Analyst
  • Senior Security Analyst

Delivery of programme

Phase one

Induction

Your induction takes place within the first 2 weeks of starting your apprenticeship and is delivered by your Skills Coach during your first face-to-face coaching session.

Inductions include an informative presentation to discuss an overview of the programme and cover support that is available to you, details of our policies, and will introduce you to our systems and the resources available to you throughout your programme. You will undergo a Vocational Skills Scan (VSS) to identify your current skill set and where the apprenticeship can bring you most value.

Functional skills

We use BKSB tests to determine your current level of knowledge, to assess if you need further support with English and/or Maths.

If you do, our Functional Skills Training team will work with you to supply these skills. You will be supported through remote training sessions and workshops, which run for 3 days (for each). Once you feel comfortable, you can sit the Level 2 Maths and/or English exams. These qualifications are equivalent to an A* – C (4-9) grade at GCSE, they are fully certified by City & Guilds and can be used to further enhance your CV and skillset.

Phase two

Modules

Training centre learning:

Part 1: 3 days
Part 2: 3 days
Part 3: 3 days

What you will learn:

  • Explain what is meant by data and protocol and how they relate to each other
  • Describe an example data format and a simple protocol in current use (using protocol diagrams). Describe example failure modes in protocols
  • Describe at least one approach to error control in a network
  • Describe the main features of network protocols in widespread use on the Internet, their purpose and relationship to each other in a layered model
  • Describe the main routing protocols in current use in computer networks and explain the differences between static and dynamic routing protocols and the pros and cons of each in different circumstances.
  • Explain some of main factors that affect network performance and propose ways to improve performance

Training centre learning:

Part 1: 5 days
Part 2: 5 days

Remote learning:

20 hours self-study
10 remote training sessions

What you will learn:

  • Explain why information and cyber security is important to business and society
  • Explain basic concepts: security, identity, confidentiality, integrity, availability, threat, vulnerability, risk & hazard
  • Explain how the concepts of threat, hazard and vulnerability relate to each other and lead to risk
  • Explain what penetration testing (‘ethical hacking’) is and how it contributes to assurance
  • Applying basic security concepts to develop security requirements
  • Describe some common vulnerabilities in computer networks and systems (for example, non-secure coding and unprotected networks)
  • Describe the main different types of common attack techniques (for example: phishing, social engineering, malware, network interception, blended techniques e.g. ‘advanced persistent threat’, denial of service, theft)
  • Describe Legal, standards, regulations and ethical standards relevant to cyber security

Training centre learning:

Part 1: 2 days
Part 2: 2 days

What you will learn:

  • Describe common types of security hardware and software which are used to protect systems (e.g. firewalls, encryption for data at rest, encryption for communication, IDS, IPS, IDAM tools, AV, web proxy, application firewalls, cross domain components, HSM, TPM, UTM)
  • Explain how each may be used to deliver risk mitigation or implement a security case
  • Understanding the benefits/limitations, and taking into account the implicit assurance (including supplier assurance and considering the benefits and risks of open source options) of the component, describing any residual risks.

Training centre learning: 

Part 1: 2 days 

Part 2: 2 days 

Remote learning: 

20 hours self-study 

4 remote training sessions 

What you will learn: 

  • Describe the main cryptographic techniques (e.g. symmetric, public key, secure hash, digital signing, block cipher etc) and explain how they are applied and to what end and their limitations 
  • Explain the significance of key management and the main features, benefits and limitations of symmetric and public key cryptosystems and the significance of entropy  
  • Describe the role of cryptographic techniques in a range of different systems and the practical issues introducing such into service and updating them  
  • Appreciate that there are legal issues relevant to cryptography in particular when crossing national borders  
  • Awareness of UK, EU and US export control of cryptography 

Training centre learning:

Part 1: 2 days
Part 2: 2 days

Remote learning:

20 hours self-study
4 remote training sessions

What you will learn:

  • Describe what good practice in design is and how this may contribute to security
  • Describe common security architectures that incorporate security hardware and software components
  • Understand how to develop a ‘security case’, recognising that threats evolve and threats also respond to security design
People icon

Your skills coach

You will have a skills coach assigned to support you throughout your apprenticeship, who will regularly arrange meetings with you both face-to-face and remotely.

During visits to your workplace, a variety of activities take place such as Tri-Party review meetings between you, your employer representative and your skills coach to discuss progress and set SMART targets. The skills coach will also work with your employer to complete your Employer Reference, a document which highlights key behaviours you have demonstrated.

portfolio

Your portfolio

Throughout the apprenticeship, you will contribute evidence towards your online e-portfolio. We use e-portfolios as they are accessible from anywhere, and enable you to track your progress throughout your apprenticeship.

You’ll have access to your personal dashboard, which shows you a number of key milestones and deadlines coming up, such as the training you have completed, work that is due, and any gaps in your portfolio of evidence.

Your skills coach will be available to contact at any point throughout the apprenticeship and will advise you how to provide the best evidence.

20 percent pie chart

Off-the-job training

Off-the-job (OTJ) training is comprised of, but not limited to activities such as: training with Estio, shadowing, journal entries and projects for e-portfolio. Completed within working hours as agreed with the employer but average at 6 hours per week (20% of your time on your apprenticeship).

You can track your OTJ progress on your e-portfolio.

Phase three

Assessment Gateway, preparation & administration week

The Gateway week is used to finetune your skills and offer a simulated Synoptic Project for systems familiarisation, and to ensure that your Summative Portfolio and Employer Reference are completed before entering into EPA.

Phase four

End Point Assessment

Learners are assessed by an End Point Assessment Organisation, chosen by the Employer. Included in EPA is Evidence Submission (portfolio & certificates), Employer Reference, Synoptic Project and an Interview.
The Independent Assessor will feedback the results (Pass, Merit or Distinction) and the ESFA will provide your certificate.

Learners who also chose Cyber Security Technologist...

Luke McGuinness is March’s Learner of the Month

Where can this apprenticeship take me?

The Level 4 Cyber Security Technologist apprenticeship will give you all the skills and experience to excel in a role such as a Cyber Operations Manager, Security Architect, Penetration Tester, Security Analyst, Risk Analyst, Intelligence Researcher, Security Sales Engineer, Cyber Security Specialist, Information Security Analyst, Governance & Compliance Analyst, Information Security Assurance & Threat Analyst, Forensics & Incident Response Analyst, Security Engineer, Information Security Auditor, Security Administrator, or Information Security Officer.

After achieving a recommended minimum of 1 years experience within your role after completion (this is subject to employers) you can begin a Level 6 Cyber Security Technical Professional apprenticeship.

Level 6 Cyber Security Technical Professional roles

Cyber Risk Manager; Cyber Risk Analyst; Cyber Research Analyst; Cyber Incident Manager; Cyber Security Engineer; Cyber Security Design Engineer.

University study

Level 4 apprenticeships are the equivalent to a foundation degree. If you wish to study further whilst staying in work, some univeristies will offer the ability to learn remotely. If you wish to take a break from work, you may need to apply for a student loan whilst you study.

Current vacancies

Get in touch!

Call our team on 01133 500 333 or fill out our enquiry form below