
Cyber Security Accreditation Course
The accreditation course to become a Cyber Security professional includes a self-paced 30 hour course with practical exercises, case studies, and a capstone module that is focused around applying the knowledge and skills needed to assess cyber threats and risks, plan and implement a cyber security framework, and evaluate and monitor it’s effectiveness.
The Course consists of:
1. An introductory module that takes the participants on a journey through the origins of Cyber Security as a concept and as a profession, as well as definitions, terminology and relevant concepts. An introductory set of case studies are put to applicants to test their understanding of concepts. Basic understanding of concepts and problem identification also form part of this introductory module. This module can be completed as the Foundations of Cyber Security Course.
2. The second module includes a more indepth case analysis focused on identifying, assessing and planning the framework for determining cyber security risks. Whilst this module is still focused on recognising the risks, it also provides the beginning to practical planning and security architecture as well as controls needed to detect as well as prevent cyber security risks.
3. The third module involves the finalisation of planning and execution, as well as construction of the IT and human infrastructure necessary to implement a Cyber Security system. Issues with implementation, contingency planning, and resource considerations form part of the learning curve. Again a practical case analysis is part of the learning process, as well as discussion and feedback on the participants’ progress.
4. The fourth and final module is a capstone module that involves bringing together all of the prior learning with a hypothetical scenario mirroring a real life situation, and involves practical responses as well as evaluating and monitoring of the Cyber Security system designed by the participants. The capstone module give the participants the necessary learning and guidance to confidentally design and build a cyber security system and response from start to finish.