Cyber Security Technologist apprentices will gain technical knowledge in areas such as security design and architecture, security testing, investigations and response and an understanding of current cyber threats, hazards and risks and how to apply the necessary controls, measures and mitigation to protect an organisation’s systems and people.  Apprentices will develop and apply practical knowledge of information security to deliver solutions that fulfil an organisation’s requirements.

Apprentices must:

Successfully complete five knowledge modules:

  • Cyber Security Introduction
  • Network and Digital Communications Theory
  • Security Case Development
  • Security Technology Building Blocks
  • Employment of Cryptography

Submit a portfolio of evidence showing how they have applied the knowledge from these modules to projects and activities in their workplace.

Complete their formal End Point Assessment which includes:

  • a synoptic project to showcase knowledge and skills from across the apprenticeship
  • a review of their portfolio of evidence
  • a final interview with an independent EPA assessor

Upon completion of their Cyber Security Technologist apprenticeship, individuals will be able to:

  • discover (through a mix of research and practical exploration) vulnerabilities in a system
  • analyse and evaluate security threats and hazards to a system or service or processes
  • demonstrate the use of relevant external sources of threat intelligence or advice (e.g. CERT UK)
  • research and investigate some common attack techniques and recommend how to defend against them
  • demonstrate the use of relevant external sources of vulnerabilities (e.g. OWASP)
  • undertake a security risk assessment for a simple system without direct supervision and propose basic remediation advice in the context of the employer
  • source and analyse a security case (e.g. a Common Criteria Protection Profile for a security component) and describe what threats, vulnerability or risks are mitigated and
  • identify any residual areas of concern
  • develop a simple security case without supervision
    identify and follow organisational policies and standards for information and cyber security
  • operate according to service level agreements or employer defined performance targets
  • investigate different views of the future (using more than one external source) and trends in a relevant technology area and describe what this might mean for your business

Upon completion of their Cyber Security Technologist apprenticeship, individuals will be able to:

  • Understand the basics of networks: data, protocols and how they relate to each other; the main routing protocols; the main factors affecting network performance including typical failure modes in protocols and approaches to error control.
  • Understand at a deeper level than from Knowledge Module 1, how to build a security case: describe what good practice in design is; describe common security architectures; be aware of reputable security architectures that incorporates hardware and software components, and sources of architecture patterns and guidance. Understand how to build a security case including context, threats, justifying the selected mitigations and security controls with reasoning and recognising the dynamic and adaptable nature of threats.
  • Understand how cyber security technology components are typically deployed in networks and systems to provide security functionality including: hardware and software
  • Understand the basics of cryptography – can describe the main techniques, the significance of key management, appreciate the legal issues

Upon completion of their Cyber Security Technologist apprenticeship, individuals focusing on the technical side will also be able to:

  • design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, that includes servers, hubs, switches, routers and user devices to a given design requirement without supervision
  • analyse security requirements (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.), given for a given system or product
  • design and build a simple system in accordance with a simple security case
  • select and configure relevant types of common security hardware and software components to implement a given security policy
  • design a system employing a crypto to meet defined security objectives
  • logical and creative thinking skills
  • analytical and problem solving skills
  • ability to work independently and to take responsibility
  • can use own initiative
  • a thorough and organised approach
  • ability to work with a range of internal and external people
  • ability to communicate effectively in a variety of situations
  • maintain productive, professional and secure working environment

Apprentices will achieve 5 BCS qualifications.

This is a level 4 apprenticeship

16 months including assessment

Register your interest for a cyber security apprenticeship

How it works

Off the job training
Mentoring
Masterclasses
Online learning
Skills Coach
Virtual labs