This unit provides the knowledge and skills necessary for a cyber security practitioner to detect and recognize discrepancies in data by performing analysis. The unit covers the collection of data on a scenario and performing basic analysis and includes the process of breaking down the scenario to a set of subtasks which are examined for their effectiveness. The unit includes an introduction of databases as a repository for data and the vulnerabilities that exist and an introduction to software tools to supporting pattern recognition.

This unit provides the knowledge and skills required to ensure and maintain the security of an organisation’s website by utilizing the outcomes of the Open Web Application Security Project (OWASP). Current penetration testing tools are also utilised to determine the vulnerabilities of a web site. Vulnerabilities are assessed and reported to appropriate personnel to minimize risk.

This unit provides introductory skills and knowledge required to implement testing procedures for systems in an organisation. These involve application layer testing tools as defined by the Open Web Application Security Project (OWASP), network testing and monitoring tools. The unit examines common threats, ethical hacking principles and introduction to penetration testing, social engineering security issues, enumeration, port scanning, sniffers, footprinting, traffic sniffers and wireless LAN vulnerabilities and contains a solid treatment of intrusions.

This unit provides introductory knowledge and skills to recognize threats, risks and vulnerabilities to cyber security in an organisation. It includes the threats an organisation encompasses such as networks, machines, applications, data, users and infrastructure. The unit also covers an introduction to common cyber security attack mechanisms and an introduction to identity and threat management as well as security issues surrounding Internet of Things (IOT) devices. Finally, the unit introduces the implementation of tools and systems an organisation can use to protect from cyber-attacks.

This unit describes the skills and knowledge required to gather, organise, analyse and present workplace information using available systems. This includes identifying research requirements and sources of information, applying information to a set of facts, evaluating the quality of the information, and preparing and producing reports. It applies to individuals who are required to apply their broad knowledge of the work environment to analysis and research tasks, evaluate information from a variety of sources and apply solutions to a range of unpredictable problems.

This unit provides a cyber security practitioner with an introduction to the skills and knowledge required to comprehend how data travels around the internet and the function and operation of protocols such as the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and devices that facilitate this data transfer. The exposure to these protocols is at an introductory level in this unit.

This unit provides base level skills and knowledge to configure an operating system on a personal computer, adding security, setting user level passwords and privileges to limit and identify user access – all required to increase protection of the end point from cyber security attacks. The unit also provides an overview of internet of things (IOT) devices, an introduction to computer networking virtualisation and base level Linux commands – deemed to be invaluable in using cyber security tools.