All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source. |
SOUTH AFRICAN QUALIFICATIONS AUTHORITY |
REGISTERED QUALIFICATION: |
Occupational Certificate: Cybersecurity Analyst |
SAQA QUAL ID | QUALIFICATION TITLE | |||
118986 | Occupational Certificate: Cybersecurity Analyst | |||
ORIGINATOR | ||||
Development Quality Partner-MICT SETA | ||||
PRIMARY OR DELEGATED QUALITY ASSURANCE FUNCTIONARY | NQF SUB-FRAMEWORK | |||
- | OQSF - Occupational Qualifications Sub-framework | |||
QUALIFICATION TYPE | FIELD | SUBFIELD | ||
Occupational Certificate | Field 10 - Physical, Mathematical, Computer and Life Sciences | Information Technology and Computer Sciences | ||
ABET BAND | MINIMUM CREDITS | PRE-2009 NQF LEVEL | NQF LEVEL | QUAL CLASS |
Undefined | 173 | Not Applicable | NQF Level 05 | Regular-Provider-ELOAC |
REGISTRATION STATUS | SAQA DECISION NUMBER | REGISTRATION START DATE | REGISTRATION END DATE | |
Registered | EXCO 0522/24 | 2022-04-21 | 2025-12-31 | |
LAST DATE FOR ENROLMENT | LAST DATE FOR ACHIEVEMENT | |||
2026-12-31 | 2029-12-31 |
In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise. |
This qualification does not replace any other qualification and is not replaced by any other qualification. |
PURPOSE AND RATIONALE OF THE QUALIFICATION |
Purpose:
The purpose of this qualification is to prepare a learner to operate as a Cybersecurity Analyst. Cybersecurity Analysts apply the practice of protecting assets such as networks, computer systems and information assets from malicious attacks and threats. They assess and mitigate risks and potential intrusions and identify risks and vulnerabilities. They study existing techniques for managing security issues and maintaining the security of information and systems in the working environment, ensuring legal compliance. On completion of this qualification, the learner will be able to demonstrate an understanding of and how to investigate cybersecurity issues and challenges as they affect the legal compliance, communities, society, the ICT sector, and the economy. The learner will understand how cybercrime can affect businesses causing disruption, how to respond effectively to incidences such as vulnerabilities testing and threats and how to analyse their consequences. The learner also evaluates efficient design of efficient security solutions and ensures compliance. A qualified learner will be able to: Rationale: As Information and Communication Technology (ICT) adoption rates increase so does cybercrime and, in direct relation, the serious need for security and integrity of ICT systems is recognised as being of paramount importance. The urgent need and demand for competent personnel have been increasing over time. There is a global shortage of cybersecurity experts, and this number is diminishing every year. The recently published 2019 (ISC) 2 Cybersecurity Workforce Study pointed to a severe shortage of cybersecurity professionals. The study estimated, for the first time, that there are 2.8 million skilled professionals worldwide currently working in the field and that an additional 4.07 million more are needed to defend organizations. Acquiring this qualification will assist in fulfilling the obvious and serious need for cyber security experts, will have a direct, positive impact on the ICT sector and will consequently benefit the economy as well. The global cybersecurity market size is forecasted to grow to ZAR 3764 billion by 2023. In Africa the cyber security market size grows from ZAR 14 billion in 2015 to ZAR35 Billion by 2020, at a Compound Annual Growth Rate (CAGR) of 20.41% from 2015 to 2020. According to 6Wresearch, South Africa's Cyber Security Market size is projected to register a CAGR of 11.1% during 2020-26. There are no similar qualifications registered on the NQF other than those used as articulation possibilities in the section below and no professional registration or licencing is expected for Cybersecurity Analysts to seek employment in the sector. Through the growth of Cyber Security Analysts that have completed this qualification, it is expected that there will be a measurable reduction in Cyber Crime-related disruption in business continuity, a reduction in losses incurred and an increase in the number of perpetrators brought to justice. It will also provide a remedy to the severe shortage of cybersecurity professionals in Africa. Cybersecurity Analysts can be employed as Cybersecurity Specialists, Information Security Specialists, Security Analysts, Cyber Monitoring Analysts, Security Consultants or Network Security Analysts. Typical learners include school leavers, graduates from TVET colleges and those currently in employment without formal recognition of competencies. This qualification will support the recommendations of the Presidential Commission on the 4th Industrial Revolution. This recommendations forefront human capital and the future of work and refers to growing skills instability. It states that work will change, and that robotic process automation (RPA) will play a more pivotal role in the execution of tasks. The 4th Industrial Revolution (4IR) is a fusion of advances in artificial intelligence (AI), robotics, process automation, the Internet of Things (IoT), genetic engineering, quantum computing, cyber security, cloud computing and data science. |
LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING |
Recognition of Prior Learning (RPL):
RPL for Access to the Qualification RPL for Access to the External Integrated Summative Assessment Accredited providers and approved workplaces must apply the internal assessment criteria specified in the related curriculum document to establish and confirm prior learning. Accredited providers and workplaces must confirm prior learning by issuing a statement of result. Entry Requirements: The minimum entry requirement for this qualification is: |
RECOGNISE PREVIOUS LEARNING? |
Y |
QUALIFICATION RULES |
This qualification is made up of compulsory Knowledge, Practical Skill and Work Experience Modules:
Knowledge Modules Total number of credits for Knowledge Modules: 53 Practical Skill Modules Total number of credits for Practical Skill Modules: 68 Work Experience Modules Total number of credits for Work Experience Modules: 52 |
EXIT LEVEL OUTCOMES |
1. Analyse, identify, and solve potential and actual security risks, vulnerabilities and inefficiencies to safeguard information system assets from malicious cybersecurity attacks.
2. Protect organisation's digital assets from both internal and external threats by maintaining cybersecurity attack mitigation and incident response capability. 3. Execute ethical cybersecurity monitoring in line with cybersecurity policies to provide defence to a level of confidentiality, integrity, and availability equal with the threat to assets and their value to the company. 4. Execute response procedures to mitigate cyber-attacks and secure information assets, intellectual property, and computer systems. 5. Execute recovery protocols and procedures as per recovery plan to restore data and/or assets affected by cybersecurity incidents. |
ASSOCIATED ASSESSMENT CRITERIA |
Associated Assessment Criteria for Exit Level Outcome 1:
Associated Assessment Criteria for Exit Level Outcome 2: Associated Assessment Criteria for Exit Level Outcome 3: Associated Assessment Criteria for Exit Level Outcome 4: Associated Assessment Criteria for Exit Level Outcome 5: Integrated Assessment: Integrated Formative Assessment The skills development provider will use the curriculum to guide them on the stipulated internal assessment criteria and weighting. They will also apply the scope of practical skills and applied knowledge as stipulated by the internal assessment criteria. This formative assessment together with work experience leads to entrance in the integrated external summative assessment. Integrated summative assessment An external integrated summative assessment, conducted through the relevant QCTO Assessment Quality partner is required for the issuing of this qualification. The external integrated summative assessment will focus on the exit level outcomes and associated assessment criteria. The external integrated summative assessment will be conducted through a theoretical assessment and the evaluation of practical tasks at decentralised approved assessment sites in a simulated environment and conducted by an assessor(s) registered with the relevant AQP. |
INTERNATIONAL COMPARABILITY |
The Occupational Certificate: Cybersecurity Analyst was compared with the British Level 5 Diploma in Cyber Security and a sequence of programs leading to CompTIA exams and certifications. CompTIA operates globally.
United Kingdom: The London School of International Business offers a Level 5 Diploma in Cyber Security. The method of presentation is a blended approach and includes online study, study material, e-library availability and tutor support via live chat or email. It has 120 credits and is advertised as a self-paced learning experience over a period of 9 months. Entry requirements are stated as Level 4 Award/Diploma. Learning outcomes are: Mandatory units include: Similarities: Both qualifications are at Level 5 and the entry requirement is Level 4. Content related to the above-mentioned learning outcomes 1 - 8 is similar in both qualifications. Differences: Content related to the above-mentioned learning outcomes 9 and 10 is not included in the Occupational Certificate: Cybersecurity Analyst. United States of America (USA): A second comparability was conducted against best of practice which is with a sequence of modules leading to Computing Technology Industry Association (CompTIA) certifications, namely IT Fundamentals+, A+, Network+ and Security+. The successful completion of these modules in the sequence captured leads to a CompTIA certification. The duration of these modules is not specified, other than that it is self-paced and offered online by a number of institutions, such as Pearson Education. CompTIA is the leading provider of vendor-neutral IT certifications in the world. The content of this sequence of courses include: IT Fundamentals+ includes the following aspects: Identify and explain the basics of computing, IT infrastructure, application and software, software development, database fundamentals and security, as well as install software, establish basic network connectivity, identify/prevent basic security risks, explain troubleshooting theory and preventative maintenance of devices. A+ includes the following aspects: Baseline security topics core to the IT support role, including physical versus logical security concepts and measures, malware, competency in operational procedures including basic disaster prevention and recovery and scripting basics, dependency on networking and device connectivity as well as demonstrate baseline security skills for IT support professionals, configure device operating systems, troubleshoot and problem solve core service and support challenges while applying best practices for documentation, change management, and scripting, support basic IT infrastructure and networking, configure and support PC, mobile and IoT device hardware, Implement basic data backup and recovery methods and apply data storage and management best practices. Network+ includes the following aspects: Identify benefits and drawbacks of existing network configurations, implement network security, standards, and protocols, troubleshoot network problems, support the creation of virtualized networks Security+ includes the following aspects: Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions, help identify attacks and vulnerabilities to mitigate them before they infiltrate, understand secure virtualization, secure application deployment, and automation concepts, identify and implement the best protocols and encryption, understand the importance of compliance, awareness of applicable laws and policies, including principles of governance, risk, and compliance Similarities The OC: Cybersecurity Analyst entails all the above content aspects. In terms of the CompTIA courses, lab tasks and capstone projects provide for the practical skills component which can be regarded as similar to the practical skills component in the OC: Cybersecurity Analyst. Differences The duration of the OC: Cybersecurity Analyst is specified as 11 months whilst the CompTIA modules are a number of consecutive short modules. The OC: Cybersecurity Analyst includes learning in the workplace. Conclusion This South African qualification compares favourably with the competencies covered in the international qualifications and programmes. |
ARTICULATION OPTIONS |
This qualification provides opportunities for horizontal and vertical articulation options.
Horizontal Articulation: Vertical Articulation: |
NOTES |
Qualifying for External Assessment:
To qualify for an external assessment, learners must provide proof of completion of all required knowledge and practical modules by means of statements of results and a record of completed work experience. Additional Legal or Physical Entry Requirements: Criteria for the accreditation of providers Accreditation of providers will be done against the criteria as reflected in the relevant curriculum on the QCTO website. The curriculum title and code are: Cybersecurity Analyst: 252901-001-00. Encompassed Trade: This qualification encompasses the following trades as recorded on the NLRD: Assessment Quality Partner (AQP) |
LEARNING PROGRAMMES RECORDED AGAINST THIS QUALIFICATION: |
NONE |
PROVIDERS CURRENTLY ACCREDITED TO OFFER THIS QUALIFICATION: |
This information shows the current accreditations (i.e. those not past their accreditation end dates), and is the most complete record available to SAQA as of today. Some Primary or Delegated Quality Assurance Functionaries have a lag in their recording systems for provider accreditation, in turn leading to a lag in notifying SAQA of all the providers that they have accredited to offer qualifications and unit standards, as well as any extensions to accreditation end dates. The relevant Primary or Delegated Quality Assurance Functionary should be notified if a record appears to be missing from here. |
NONE |
All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source. |