|
All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source. |
| SOUTH AFRICAN QUALIFICATIONS AUTHORITY |
| REGISTERED QUALIFICATION: |
| Higher Certificate in Computer Forensics |
| SAQA QUAL ID | QUALIFICATION TITLE | |||
| 111617 | Higher Certificate in Computer Forensics | |||
| ORIGINATOR | ||||
| Richfield Graduate Institute Of Technology (Pty) Ltd. (previously known as PC Training And Business College (Pty) Ltd) | ||||
| PRIMARY OR DELEGATED QUALITY ASSURANCE FUNCTIONARY | NQF SUB-FRAMEWORK | |||
| - | HEQSF - Higher Education Qualifications Sub-framework | |||
| QUALIFICATION TYPE | FIELD | SUBFIELD | ||
| Higher Certificate | Field 10 - Physical, Mathematical, Computer and Life Sciences | Information Technology and Computer Sciences | ||
| ABET BAND | MINIMUM CREDITS | PRE-2009 NQF LEVEL | NQF LEVEL | QUAL CLASS |
| Undefined | 120 | Not Applicable | NQF Level 05 | Regular-Provider-ELOAC |
| REGISTRATION STATUS | SAQA DECISION NUMBER | REGISTRATION START DATE | REGISTRATION END DATE | |
| Reregistered | EXCO 0821/24 | 2019-09-03 | 2027-06-30 | |
| LAST DATE FOR ENROLMENT | LAST DATE FOR ACHIEVEMENT | |||
| 2028-06-30 | 2031-06-30 | |||
| In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise. |
This qualification does not replace any other qualification and is not replaced by any other qualification. |
| PURPOSE AND RATIONALE OF THE QUALIFICATION |
| Purpose:
The purpose of the Higher Certificate in Computer Forensics is to provide learners with the necessary expertise and knowledge to take on appropriate professional positions in the information technology industry and in particular the field of Computer Forensics. This qualification seeks to provide learners with the aptitude and fortitude to deal with the responsibilities connected to the computer forensics field and respond to challenges, both internal and external to the organisation, including the international environment. It will also equip learners with the technical skills and reflective competences to deal with the broad based cybercrime issues related to optimising the competitive positions of the organisation by acquiring competences relating to computer forensics. In essence, the focus of this qualification is to improve the practice of information security with a special focus on computer forensics. Learners will be able to apply critical technical skills; interrogate specific case situations and apply various computer forensic techniques in the investigation of cybercrime. This approach facilitates the application of theory to practice and practice to theory. Further, the qualification together with the specific mode of delivery seeks to prepare the learners as an effective Computer Forensic Analyst capable of being pro-active and responding positively to dynamically evolving cybersecurity environment, intersecting national and international business practice to ensure uniformity, growth and sustainability. Rationale: The introduction of Information Commutation and Technology (ICT) into many aspects of everyday life has led to the development of the modern concept of the information society. The availability of ICTs and network-based services offer a number of advantages for society in general, especially for developing countries. ICT applications, such as e-government, e-commerce, e-education, e-health and e-environment, are seen as enablers for development, as they provide an efficient channel to deliver a wide range of services. ICT applications can facilitate the achievement of the Sustainable Development Goals, reducing poverty and improving health and environmental conditions in developing countries. However, the growth of the information society is accompanied by new and serious threats. Essential services such as water and electricity supply now rely on ICTs, as do most businesses and organisations, as well as citizens. Attacks against information infrastructure and internet services have already taken place, while online fraud and hacking attacks are just some examples of computer-related crimes that are committed on a large scale every day. The financial damage caused by cybercrime is reported to be enormous. This 'digital paradox' means that while governments and organisations can offer more services, more quickly, than ever before, yet at the same time cybercrime has become a powerful countervailing force that's limiting that potential. This has led to an urgent need to find the necessary preventive measures to combat these crimes. As a result, this has led to the comprehensive development of new and improved computer forensic investigation tools and techniques that will assist in the investigation process of these crimes. While technological introduces greater variety and convenience into our lives, it also opens more and more avenues for people to be targeted by cyber criminals. International and domestic cyber criminals increasingly view businesses and private individuals as attractive targets for a range of cybercrime. Therefore, the rationale for this qualification is based on the need to develop skills in the globally critical area of Computer Forensics. The urgent demand for competent personnel has been increasing over time with the proliferation of cybercrime. This demand is coupled with the need for Computer Forensic expertise in order to apply various computer forensic techniques in the investigation of these crimes. The Higher Certificate qualification is expected to sustain continuous learning and development of learners as well as meet needs of other stakeholders. The qualification is also designed to address the five critical areas to building a developmental information society as identified by the South African Department of Communications: The demand coupled with the statistics of the National Scarce Skills list for South Africa (2015), published by the Department of Labour also identifies scarce and critical skills required by the country. The national demand for Information Technology skills is extracted from this report. With the proliferation of cyber-attacks and the increasing effectiveness of cyber criminals, organisations and indeed nation states are increasingly finding themselves vulnerable and at risk. There is an urgent need to investigate these crimes. Knowledge of the cyber domain, is the first and vital step in being able to analyse a cyber-attack. |
| LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING |
| Recognition of Prior Learning (RPL):
Recognition of Prior Learning (RPL) is seen as having the capacity to widen access to education and training and to enhance the qualification status of historically disadvantaged adults and youths. By enabling people to apply what they already know and can do, RPL can reduce barriers and create opportunities that will lead to greater social and economic prosperity. The institution recognises the importance of RPL as an admission requirement. The qualification may be obtained in part through the Recognition of Prior Learning. In cases where prior learning will be recognised for gaining entrance into the qualification, the following criteria must be satisfied: Entry Requirements: The minimum entry requirement for this qualification is: |
| RECOGNISE PREVIOUS LEARNING? |
| Y |
| QUALIFICATION RULES |
| This qualification consists of the following compulsory modules at National Qualifications Framework Level 5 totalling 125 Credits:
|
| EXIT LEVEL OUTCOMES |
| 1. Understand the concepts of digital forensic science.
2. Gain knowledge and understanding of the processes involved in digital forensics investigation. 3. Demonstrate the ability to conduct digital investigations that conform to accepted professional standards. 4. Identify and document potential security breaches of systems and data that suggest violations of acceptable standards. 5. Demonstrate ability to use various tools and techniques for data collection and computer forensic investigations. 6. Demonstrate an understanding of the statutory and regulatory requirements of computer forensic investigation. 7. Demonstrate knowledge of emerging trends in the area of computer forensics. |
| ASSOCIATED ASSESSMENT CRITERIA |
| Associated Assessment Criteria for Exit Level Outcome 1:
Associated Assessment Criteria for Exit Level Outcome 2: Associated Assessment Criteria for Exit Level Outcome 3: Associated Assessment Criteria for Exit Level Outcome 4: Associated Assessment Criteria for Exit Level Outcome 5: Associated Assessment Criteria for Exit Level Outcome 6: Associated Assessment Criteria for Exit Level Outcome 7: Integrated Assessment: Assessment is integrated with most modules and learners will complete a series of assignments as they progress to build a portfolio. Assignments and tasks are marked and feedback will be given to learners. The feedback will support their learning, achievement of Exit Level Outcomes and prepare them for examinations. Tasks included in portfolios may include projects, case studies, essays, simulations, experiments, assignments, online activities interactions, and presentations. Portfolios will be assessed to determine a module year/semester mark. A minimum of 40% is required for entry into the examination which serves as the summative assessment which evaluates the achievement of outcomes and mastery of the larger body of knowledge which forms part of the curricula. The final examination will be undertaken under normal examination conditions. |
| INTERNATIONAL COMPARABILITY |
| This qualification has been compared with qualifications offered internationally. Given that it incorporates the latest trends, developments and knowledge in a rapidly changing and advancing field, it compares favourably with similar qualifications offered at different institutions.
Ryerson University in Canada offers a Certificate in Computer Security and Digital Forensics, which contains modules, such as Digital Forensics Investigation and Digital Forensics Systems, which relate to the modules in Higher Certificate in Computer Forensics, such as Digital Crime Investigations, Network Forensics and Internet Forensics. Marshall University in West Virginia offers a Certificate in Digital Forensics and consists of content and modules such as Network Forensics, Digital Evidence Search and Seizure, Forensic Digital Imagining and Advanced Digital Evidence Detection and Recovery, which relate to modules in Higher Certificate in Computer Forensics, for example Network Forensics, Forensic Exploitation and Intelligence, Digital Crime and Investigation and Advanced Forensic Computing. The One-year Certificate in Digital Forensics offered by Carnegie Mellon University in Pennsylvania contains content and modules, such as Introduction to Computer Forensics and Advanced Digital Forensics, which relate favourably with content and modules in Higher Certificate in Computer Forensics with specific reference to Advanced Forensic Computing, Forensic Computing Fundamentals and Forensic Science modules. The University of the Sunshine Coast in Queensland, Australia offers a One-year Certificate in Cyber Security. The qualification contains modules, such as Introduction to Device and Network Security, Introduction to Cybersecurity and Ethics in Digital Investigation and Cyber Security, which compare well with Fundamentals of Information Security and Digital Crime and Investigation modules in Higher Certificate in Computer Forensics. |
| ARTICULATION OPTIONS |
| This qualification allows for horizontal and vertical articulation.
Horizontal Articulation: Vertical Articulation: |
| MODERATION OPTIONS |
| N/A |
| CRITERIA FOR THE REGISTRATION OF ASSESSORS |
| N/A |
| NOTES |
| N/A |
| LEARNING PROGRAMMES RECORDED AGAINST THIS QUALIFICATION: |
| NONE |
| PROVIDERS CURRENTLY ACCREDITED TO OFFER THIS QUALIFICATION: |
| This information shows the current accreditations (i.e. those not past their accreditation end dates), and is the most complete record available to SAQA as of today. Some Primary or Delegated Quality Assurance Functionaries have a lag in their recording systems for provider accreditation, in turn leading to a lag in notifying SAQA of all the providers that they have accredited to offer qualifications and unit standards, as well as any extensions to accreditation end dates. The relevant Primary or Delegated Quality Assurance Functionary should be notified if a record appears to be missing from here. |
| NONE |
| All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source. |