BDATS - Cybersecurity Specialist

Cyber Security Specialist

A cyber security analyst is responsible for the implementation, maintenance and support of the security controls that protect an organisation’s systems and data assets from threats and hazards. They ensure that security technologies and practices are operating in accordance with the organisation’s policies and standards to provide continued protection. They require a broad understanding of network infrastructure, software and data to identify where threat and hazard can occur. They are responsible for performing periodic vulnerability assessments to evaluate the organisation’s ongoing security posture and will provide visibility to management of the main risks and control status on an ongoing basis. They respond to security incidents and implement resolution activities across the organisation.

Skills

Be able to:

  • Analyse and evaluate security threats and vulnerabilities to planned and installed information systems or services and identify how these can be mitigated against.
  • Perform security risk assessments for a range of information systems and propose solutions.
  • Develop a security case against recognised security threats, and recommend mitigation, security controls and appropriate processes.
  • Define and justify a user access policy for an information system given knowledge of the system architecture, security requirements and threat/risk environment. This should be in terms of what they can do, resources they can access, and operations they are allowed to perform.
  • Perform a business impact analysis in response to a security incident and follow a disaster recovery plan to meet elements of a given business continuity policy.
  • Conduct a range of cyber security audit activities to demonstrate security control effectiveness

Technical Knowledge

Knows and understands:

  • The types of security (confidentiality, authentication; non-repudiation; service integrity) and security big picture (network security; host OS security; physical security).
  • The main types of common attack techniques, including phishing, social engineering, malware, network interception, blended techniques, denial of service and theft.
  • How to recognise and assess risk including performing a risk assessment.
  • How to apply penetration testing effectively and how it contributes to assurance.
  • The different approaches to risk treatment and management in practice.
  • What the ‘cyber security culture’ in an organisation is, and how it may contribute to security risk.

Level 4 - 1st Year - September Start

Winter - Sept - Jan (12 Weeks of Teaching)
COM411 - Problem Solving through Programming
COM412* - Introduction to Networks & Security
Spring - Jan - May (12 Weeks of Teaching)
COM415 Cyber Security Essentials
COM417 - Introduction to Databases
Summer - May - Sept (8 Weeks of Teaching)
COM423 - Systems Analysis & Design Work Based Project
COM414* Routing & Switching

Level 5 - 2nd Year - September Start

Winter - Sept - Jan (12 Weeks of Teaching)
COM521 Ethical Hacking & Pen Testing
COM511 Network Systems Automation
Spring - Jan - May (12 Weeks of Teaching)
COM512 Network Security*
COM522 Threat Intelligence Analysis
Summer - May - Sept (8 Weeks of Teaching)
COM532 - Work Based IT Project Management
COM530 - Work Based Business Organisation

Level 6 - 3rd Year - September Start

Winter - Sept - Jan(12 Weeks of Teaching)
COM613 CyberOps*
COM615 Network Management
Spring - Jan - May (12 Weeks of Teaching)
COM614 Cloud Computing
COM617 - Industrial Consulting Project
Summer - May - Sept (8 Weeks of Teaching)
COM625 - Synoptic Work Based IT Project

*Modules with embedded CISCO Training

COM412 - CISCO CCNA 1

COM414 - CISCO CCNA 2

COM512 - CISCO Network Security

COM513 - Model Driven Programming & CCNA exam

COM515 - CISCO CCNA 3

COM612 - CISCO Connecting Things

COM613 - CISCO Cyber Operations