Skip to content

Cyber Security Technician Apprenticeship

  • Details
  • Employers
  • Students

    This apprenticeship standard is for those providing first line cyber security support. This
    requires individuals to monitor and detect potential security threats and escalate as necessary,
    and to support secure and uninterrupted business operations of an organisation through the
    implementation of cyber security mechanisms and the application of cyber security procedures
    and controls.

    Delivery model and duration:
    Skills and behaviours developed in the workplace, complemented by
    college block delivery of required knowledge
    Duration: Typically 18 months

    Ideal for:
    • Cyber Security Administrator
    • Access Control Administrator
    • Incident Response Technician
    • Junior Security Operations Centre (SOC) Analyst
    • Junior Information Security Analyst
    • Junior Threat and Risk Analyst
    • Junior Penetration Tester
    • Junior Security Analyst

    The apprenticeship will cover the following core areas:
    • Threat hazards, risk and intelligence
    • Security threats
    • Maintaining security and control of an organisation
    • Cyber security mechanisms and controls: patching software, installing software updates, implementing access control, configuring firewalls
    • Security incident and event management tools (SIEM) tools and protection tools
    • Information security policy and procedure Benefits to business:
    • Develop the skills your business needs
    • Get qualified and motivated staff
    • Future proof your business

    Benefits for learners:
    • Develop skills that will increase your career potential
    • Support from industry experienced staff working with the British Computing Society
    • Become an associate member of the BCS
    • Become a registered IT Technician (RITTech)
    • Become an accredited affiliate of the Chartered Institute for Information Security

     

     

  • Employers

    Benefits to business:
    • Develop the skills your business needs
    • Get qualified and motivated staff
    • Future proof your business

    End Point Assessment
    The End Point Assessment will test the entire Standard, and be undertaken as follows:
    • Scenario demonstrations with questioning by an independent assessor
    • A professional discussion with an independent assessor underpinned by a portfolio of 8 discrete pieces of evidence
    • A knowledge test Performance in the End Point Assessment will determine the overall apprenticeship standard grade of pass, fail or distinction

     

    Duties developed during the apprenticeship will include:
    Cyber security policies and standards based on an Information Security Management System (ISMS)
    Principles of cyber security compliance and compliance monitoring techniques
    Cryptography, certificates and use of certificate management tools
    Processes for detecting, reporting, assessing, responding to, dealing with and learning from information security events
    Threat sources and threat identification and network reconnaissance techniques and the impact that threats might have on an organisation
    Types of information security events – brute force attack, malware activity, suspicious user behaviour, suspicious device behaviour,
    unauthorized system changes
    Computer forensic principles – the importance of ensuring that evidence is not contaminated and maintaining the continuity of evidence
    without compromising it
    Standard information security event incident, exception and management reporting requirements and how to document incident and event
    information as part of a chain or evidence
    Cyber security audit requirements, procedures and plans, need to obtain and document evidence in an appropriate form for an internal or
    external auditor to review
    Different learning techniques and the breadth and sources of knowledge and sources of verified information and data
    Risk assessment, risk management and business impact analysis principles
    How their occupation fits into the wider digital landscape and any current or future regulatory requirements
    How to use data ethically and the implications for wider society, with respect to the use of data
    Roles within a multidisciplinary team and the interfaces with other areas of an organisation

Shortlist and Apply

Course Variant

Campus

Start Date

Shortlist and Apply

If you would like to apply for this course, please add it to your shortlist. You may then add further courses to your shortlist or continue to complete your application.


Shortlist and Apply

What You Will Pay

Please contact Student Services on 0345 155 2020 for pricing information.

top

Why Gloucestershire College?

We guide any ambitious and motivated person on their journey through education and their career, by providing the right environment that encourages and nurtures individual talents.

Our industry-standard facilities and experienced teaching team provide our students with the skills businesses truly need.

We are here to help

0345 155 2020

90% of students would recommend GC and 95% said that the teaching on their course was good.

Ofsted has rated us good.

  • We offer industry relevant facilities
  • Our lecturers are passionate subject specialists
  • Employers value our students' skills

We'll look after you. We have dedicated teams to help you and a great Learning Mentor scheme.

top