Pearson Vue Certified IT Specialist Cybersecurity
About This Course
This WSQ Pearson Vue Certified IT Specialist Cybersecurity course equips professionals with the skills to develop, implement, and maintain cybersecurity policies and procedures. Participants will learn key security principles, including industry frameworks, common vulnerabilities, and access management techniques. The course covers securing networks, identifying security threats, and implementing encryption to protect data integrity and confidentiality.
This course also provides hands-on training in securing endpoint devices, conducting vulnerability assessments, and managing cybersecurity risks. Learners will develop expertise in incident handling, digital forensics, penetration testing, and disaster recovery planning. By mastering these critical cybersecurity skills, participants will be able to enhance their organization’s security posture and respond effectively to evolving cyber threats.
What You'll Learn
LO1: Establish organizational cybersecurity policies and procedures to protect information confidentiality and integrity.
LO2: Ensure adherence to cybersecurity policies and procedures in response to evolving security developments.
LO3: Continuously improve cybersecurity policies and procedures to enhance organizational security measures.
Topics Covered:
Topic 1: Security Principles
• Common security principles
• Cybersecurity frameworks and industry-accepted best practices
• Vulnerabilities, threats, and common attacks
• Recognize social engineering attacks
• Access management principles and procedures
• How encryption protects the confidentiality and integrity of data
Topic 2: Securing the Network
• Identify vulnerabilities associated with commonly used protocols
• The role of addressing in network security
• The purpose and function of network security technologies
• Validate the security of wireless networks
• Examine network security logs to identify anomalies
Topic 3: Securing Endpoint Devices
• Apply security settings to harden operating systems
• Use endpoint tools to gather security assessment information
• Use packet capture utilities to identify anomalies
• Demonstrate familiarity with endpoint security policies and standards
• Interpret system logs to identify anomalies
• Perform malware removal
Topic 4: Vulnerability Assessment and Risk Management
• Use threat intelligence sources to identify potential network vulnerabilities
• Risk management
• Penetration testing process
Topic 5: Incident Handling
• Monitor security events to determine if escalation is required
• Digital forensics process and attack frameworks
• Elements of cybersecurity incident response
• Importance of disaster recovery and business continuity planning
• Assist users in restoring data after an incident
Entry Requirements
Knowledge and Skills
• Able to operate computer functions with minimum Computer Literacy Level 2 based on ICAS Computer Skills Assessment Framework
• Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
• Positive Learning Attitude
• Enthusiastic Learner
Experience
• Minimum of 1 year of working experience.
Target Year Group : 21-65 years old