ProQual Level 4 Certificate in Cyber Security and Intrusion for Business Course in Pakistan || Registration Open

ProQual Level 4 Certificate in Cyber Security and Intrusion for Business Course in Pakistan || Registration Open

Registration Open= +92-3315999937, +92- 3215056755 (WhatsApp Only)

Introduction                                                                               

This qualification builds on the fundamental principles of cyber security and is a natural progression for individuals working in an IT role, helping them to qualify as cyber security professionals. The qualification also provides a clear route of progression for individuals seeking to move from IT support roles, into better paid and more testing cyber security positions.

 

The awarding organisation for this qualification is ProQual Awarding Body and the regulatory body is the Office of Qualifications and Examinations Regulation (Ofqual). The specification for these qualifications has been approved by the Welsh Government for use by centres in Wales.

Entry Requirements

There are no formal entry requirements for this qualification. Centres should carry out an initial assessment of candidate skills and knowledge to identify any gaps and help plan the assessment.

Qualification Profile

Qualification title ProQual Level 4 Certificate in Cyber Security and Intrusion

for Business

Ofqual qualification number 601/8167/9
Level 4
Total Qualification Time 70 hours
 

Assessment

Pass or fail

Internally assessed and verified by centre staff External quality assurance by ProQual verifiers

Qualification start date 1/12/15
Qualification end date  

 

Qualification Structure                                                              

Candidates must complete the 3 Mandatory units.

 

T/507/9458 Cyber Security for Business Networks A/507/9459 Managing Cyber Security in Business M/507/9460 Cyber Intrusion for Business

 

Centre Requirements

Centres must be approved to offer this qualification. If your centre is not approved please complete and submit form ProQual Additional Qualification Approval Application.

 

Staff

Staff delivering this qualification must be appropriately qualified and occupationally competent.

 

Assessors/Internal Quality Assurance

For each competence-based unit centres must be able to provide at least one assessor and one internal verifier who are suitably qualified for the specific occupational area. Assessors and internal verifiers for competence-based units or qualifications will normally need to hold appropriate assessor or verifier qualifications, such as:

 

  • ProQual Level 3 Certificate in Teaching, Training and Assessing
  • Award in Assessing Competence in the Work Environment
  • Award in Assessing Vocationally Related Achievement
  • Certificate in Assessing Vocational Achievement
  • Award in the Internal Quality Assurance of Assessment Processes and Practices
  • Certificate in Leading the Internal Quality Assurance of Assessment Processes and Practices
  • Support for Candidates

Materials produced by centres to support candidates should:

 

  • enable them to track their achievements as they progress through the learning outcomes and assessment criteria;
  • provide information on where ProQual’s policies and procedures can be viewed;
  • provide a means of enabling Internal and External Quality Assurance staff to authenticate evidence

 

Assessment

  Candidates must demonstrate the level of knowledge and competence described in the unit. Assessment is the process of measuring a candidate’s knowledge and understanding against the standards set in the qualification.

Assessment guidance is included to assure consistency.

 

Each candidate is required to produce evidence which demonstrates their achievement of all of the learning outcomes and assessment criteria for each unit.

 

Evidence can include:             –      assignments/projects/reports

  • worksheets
  • portfolio of evidence
  • record of oral and/or written questioning
  • candidate test papers

Learning outcomes set out what a candidate is expected to know, understand or be able to do.

Assessment criteria specify the standard a candidate must meet to show the learning outcome has been achieved.

 

Learning outcomes and assessment criteria for this qualification can be found from page 7 onwards.

 Internal Quality Assurance

An internal quality assurance verifier confirms that assessment decisions made in centres are made by competent and qualified assessors, that they are the result of sound and fair assessment practice and that they are recorded accurately and appropriately.

Adjustments to Assessment

Adjustments to standard assessment arrangements are made on the individual needs of candidates. ProQual’s Reasonable Adjustments Policy and Special Consideration Policy sets out the steps to follow when implementing reasonable adjustments and special considerations and the service that ProQual provides for some of these arrangements.

Centres should contact ProQual for further information or queries about the contents of the policy.

Results Enquiries and Appeals

All enquiries relating to assessment or other decisions should be dealt with by centres, with reference to ProQual’s Enquiries and Appeals Procedures.

Certification                                                                         Candidates who demonstrate achievement of the qualification will be awarded a certificate giving the full qualification title –

ProQual Level 4 Certificate in Cyber Security and Intrusion for Business

 Claiming certificates

 Centres may claim certificates for candidates who have been registered with ProQual and who have successfully achieved the required number of credits for a qualification. All certificates will be issued to the centre for successful candidates.

Replacement certificates

 If a replacement certificate is required a request must be made to ProQual in writing. Replacement certificates are labelled as such and are only provided when the claim has been authenticated. Refer to the Fee Schedule for details of charges for replacement certificates.

Learning Outcomes and Assessment Criteria

 T/507/9458 Cyber Security for Business Networks

 

  Learning Outcomes – the learner will:   Assessment Criteria – the learner can:
1. Understand how to securely configure ICT systems 1.1

 

1.2

 

1.3

Explain the importance of securely configuring all ICT systems

Explain the application of security patches

Explain the purpose of a systems inventory

2. Be able to securely configure ICT systems 2.1 Demonstrate the secure configuration of
      an ICT system
    2.2 Demonstrate the application of security
      patches
    2.3 Define a security baseline for all ICT
      devices
3. Understand how to test and monitor 3.1 Explain the purpose of penetration
  network security   testing
    3.2 Explain the processes involved in
      penetration testing
    3.3 Evaluate software that can be used for
      penetration testing
    3.4 Explain the purpose of a network
      perimeter
    3.5 Explain why security controls must be
      monitored and tested
4. Be able to test and monitor organisational 4.1 Demonstrate penetration testing
  network security 4.2 Identify network security issues through
      penetration testing
    4.3 Manage the network perimeter
      including wireless access
    4.4 Demonstrate the use of software setup
      related to malware and other
      monitoring products
    4.5 Analyse the monitoring and testing of
      security controls
5. Understand the importance of compliance

with organisational Malware Protection Policy

5.1

 

5.2

5.3

Explain the risks associated with a range

of malware

Evaluate a range of malware defences Explain the purpose of malware scanning

6. Be able to demonstrate compliance with

organisational Malware Protection Policy

6.1

6.2

Establish adequate malware defences

Demonstrate malware scanning and secure backup of ICT systems

 

A/507/9459 Managing Cyber Security in Business                                                         

 

  Learning Objectives – the learner will:   Assessment Criteria – the learner can:
1. Understand the requirement to determine the risks to an organisations information 1.1

 

 

1.2

Evaluate the need for an effective governance structure relating to cyber risk

Explain a range of information risks

2. Understand the use of account

management processes

2.1

 

2.2

 

2.3

Explain the potential approaches to

account management processes Explain control procedures relating to activity and audit logs

Explain the importance of monitoring user activities

3. Be able to demonstrate the use of account 3.1 Demonstrate the use of account
  management processes   management processes
    3.2 Develop reports related to user
      privileges and accounts
    3.3 Demonstrate control procedure
      evidence related to activity and audit
      logs
    3.4 Monitor user activity, providing
      evidence and reports
4. Understand the implementation of user 4.1 Explain the importance of
  security policies within organisations   organisational level user security
      policies
    4.2 Identify examples of acceptable and
      secure use policies
    4.3 Explain why staff training is essential
      for effective cyber security policies
    4.4 Identify current back door cyber threats
5. Be able to develop user security policies

within organisations

5.1

 

5.2

Develop organisational level user

security policies

Determine the acceptable and secure use of organisational ICT systems

6. Understand how to manage cyber incident

response and disaster recovery

6.1

 

6.2

 

6.3

Explain potential disaster recovery

activities

Explain the requirement for incident management plans

Describe the reporting process for criminal incidents

7. Be able to manage cyber incident response

and disaster recovery

7.1 Demonstrate an effective response to

incidents and disaster recovery activities

8. Understand how to monitor organisational

ICT systems and networks

8.1

 

8.2

 

8.3

Explain the purpose of an ICT

monitoring strategy

Summarise the content of ICT security logs

Explain how to secure ICT systems further to the indication of an attack

 

  Learning Objectives – the learner will:   Assessment Criteria – the learner can:
9. Be able to monitor organisational ICT 9.1 Determine an ICT Monitoring Strategy
  systems and networks 9.2 Develop an ICT Monitoring Policy
    9.3 Demonstrate the monitoring of ICT
      systems and networks
    9.4 Analyse security logs
    9.5 Secure all ICT systems further to the
      indication of an attack
10. Be able to manage organisational Access to

Removable Media Policy

10.1

 

10.2

Explain the necessity for an Access to

Removable Media Policy

Develop an Access to Removable Media Policy

11. Understand how to manage organisational

Secure Use of ICT Policy for Home and Mobile Working

11.1

 

 

11.2

 

 

11.3

Evaluate current government

legislation and frameworks relevant to the control of digital data

Identify the types of staff training events suitable for Home and Mobile Working policies.

Explain how to apply a secure baseline

build to all their organisation’s ICT devices

12. Be able to manage organisational Secure

Use of ICT Policy for Home and Mobile Working

12.1 Develop a Secure Use of ICT Policy for

Home and Mobile Working for all employees

 

M/507/9460 Cyber Intrusion for Business                                                                         

 

  Learning Outcomes – the learner will:   Assessment Criteria – the learner can:
1. Understand how to establish a security 1.1 Explain the use of hardware and
  perimeter in a Wifi zone   software related to security in Wifi zones
      Identify current back door threats
    1.2 Explain the importance of mobile device
      policies for Wifi zones
    1.3 Explain how hardware and software can
      be utilised in relation to securing a Wifi
    1.4 perimeter
    1.5 Explain what rogue access points are
    1.6 Identify applications that are of high risk
      to a network area
2. Know how to establish a security 2.1 Develop and demonstrate a mobile
  perimeter within a Wifi zone   policy for Wifi zones
    2.2 Demonstrate the use of appropriate
      hardware and software in relation to
      securing a Wifi perimeter
    2.3 Provide an analysis of a Wifi zone
    2.4 Develop a policy on the detection of
      rogue access points and applications
      that are of risk to a network area
    2.5 Develop a policy to counter back door
      threats to networks
3. Understand the regulatory frameworks 3.1 Identify regulatory frameworks
  associated with cyber intrusion   associated with Wifi monitoring
    3.2 Explain the legislation relating to hacking
      or breaking into user networks
    3.3 Evaluate the problems that can be
      encountered when monitoring Wifi
      zones
    3.4 Explain the risk associated with
      managing Wifi zones within an
      International context
4. Be able to analyse activities within Wifi

zones

4.1 Analyse potential problems that could

be encountered when monitoring Wifi zones

 

  Learning Objectives – the learner will:   Assessment Criteria – the learner can:
5. Know how to utilise technology to secure 5.1 Explain the use of VPN functionality and
  networks from hacking   application tunnelling to promote
      security
    5.2 Critically evaluate at least three
      commercial products that are available
      to secure LAN and other mobile
      networks
    5.3 Explain encryption methods such as
      TLS/SSL
    5.4 Explain the features of account lock out
    5.5 Explain host isolation in relation to Wifi
      networks
    5.6 Explain network separation in relation
      to Wifi networks
    5.7 Explain what a man in the middle attack
      is and how it affects network users
    5.8 Explain how to establish secure
      passwords
6. Be able to utilise technology to secure 6.1 Use VPN functionality and application
  networks from hacking   tunnelling to promote security
    6.2 Secure a LAN using commercially
      available products
    6.3 Demonstrate the use of encryption
      methods such as TSL/SSL
    6.4 Demonstrate account lock out and
      show how to enable and secure this
      setting
    6.5 Establish secure passwords for network
      users

  Assessment                                                                                                 

 

There must be valid, authentic and sufficient for all the assessment criteria. However, one piece of evidence may be used to meet the requirements of more than one learning outcome or assessment criterion.

Registration Open= +92-3315999937, +92- 3215056755 (WhatsApp Only)

Add your comment

Your email address will not be published.