QS-Cybersecurity-L1-L2
QS-Cybersecurity-L1-L2
(Level 1 - Level 2)
Qualification Specification: Cybersecurity
Page 2 of 30
Qualification Specification: Cybersecurity
Page 3 of 30
Qualification Specification: Cybersecurity
This qualification specification is intended for tutors, internal quality assurers, centre quality
managers and other staff within Gateway Qualifications recognised centres and/or
prospective centres.
It sets out what is required of the learner in order to achieve the qualifications. It also
contains information specific to managing and delivering the qualifications including specific
quality assurance requirements.
The guide should be read in conjunction with the Gateway Qualifications Centre Handbook
and other publications available on the website which contain more detailed guidance on
assessment and quality assurance practice.
In order to offer these qualifications you must be a Gateway Qualifications recognised centre
and be approved to offer the qualifications.
If your centre is not yet recognised, please contact our Development Team to discuss
becoming a Gateway Qualifications Recognised Centre:
Page 4 of 30
Qualification Specification: Cybersecurity
Contents
1. Qualification Information ................................................................................................ 7
1.1 About the qualifications ............................................................................................. 7
1.2 Purpose..................................................................................................................... 7
1.3 Funding ..................................................................................................................... 7
1.4 Geographical coverage ............................................................................................. 8
1.5 Progression opportunities ......................................................................................... 8
1.6 Equality, diversity and inclusion ................................................................................ 8
2. Learner Entry Requirements .......................................................................................... 9
2.1 Key information ......................................................................................................... 9
2.2 Access to qualifications for learners with disabilities or specific needs .................... 9
2.3 Recruiting learners with integrity ............................................................................... 9
3. Qualification Details ......................................................................................................... 10
3.1 Achievement methodology ...................................................................................... 10
3.2 Qualification size ..................................................................................................... 10
3.3 Qualification structure ............................................................................................. 11
Gateway Qualifications Level 1 Award in Cybersecurity ................................................ 11
Gateway Qualifications Level 2 Award in Cybersecurity ................................................ 11
3.4 Recognition of prior learning ................................................................................... 12
3.5 Links to other qualifications ..................................................................................... 12
4 Assessment ................................................................................................................... 13
4.1 Assessment overview ............................................................................................. 13
4.2 Assessment format ................................................................................................. 13
4.3 Assessment language ............................................................................................. 13
4.4 Support materials and resources ............................................................................ 13
4.5 Access Arrangements, Reasonable Adjustments and Special Considerations ...... 13
5 Centre Recognition and Qualification Approval ........................................................ 16
5.1 Centre Recognition ................................................................................................. 16
5.2 Centre requirements ............................................................................................... 16
5.3 Qualification-specific staffing requirements ............................................................ 16
6 Quality Assurance......................................................................................................... 18
6.1 Internal Quality Assurance ...................................................................................... 19
6.2 Quality assuring centre marking ............................................................................. 20
6.3 Malpractice.............................................................................................................. 20
6.4 Additional quality assurance requirements ............................................................. 20
7 Learner Registration and Results ................................................................................ 21
Page 5 of 30
Qualification Specification: Cybersecurity
Page 6 of 30
Qualification Specification: Cybersecurity
1. Qualification Information
1.1 About the qualifications
The qualifications have been approved by the Office of Qualifications and Examinations
Regulation (Ofqual) that regulates qualifications, examinations and assessments in England
and Qualifications Wales, the regulator of non-degree qualifications and the qualifications
system in Wales.
This single unit qualification is designed for learners to learn about cybercrime. They will
understand routine protective methods used to maintain cybersecurity including the
principles of vulnerability and penetration testing and user access control. While they can
easily be offered as stand-alone bite-sized awards, the new qualifications could also be
usefully combined with other units or qualifications into meaningful packages of learning.
The single unit within each qualification is also included within Digital and IT Skills
qualifications.
1.2 Purpose
1.3 Funding
For information on potential sources of funding in England please visit the Education and
Skills Funding Agency:
https://www.gov.uk/government/organisations/education-and-skills-funding-agency
https://www.gov.uk/government/collections/qualifications-approved-for-public-funding
https://hub.fasst.org.uk/Pages/default.aspx
For information regarding potential sources of funding in Wales please visit Qualification
Wales:
https://www.qualificationswales.org/
Page 7 of 30
Qualification Specification: Cybersecurity
If a centre based outside England or Wales would like to offer these qualifications, they
should make an enquiry to Gateway Qualifications. The qualifications are not available for
delivery in Northern Ireland.
This qualification is designed to enable progression into further learning at the same level
(e.g. from an award to a certificate in Digital and IT Skills) or to further learning at a higher
level.
It is Gateway Qualifications’ aim that there shall be equal opportunities within this
organisation and in all the services it provides and within its recognised centres and via the
services they provide and so meet the organisation’s legal responsibilities to prevent
discrimination.
Page 8 of 30
Qualification Specification: Cybersecurity
1. Gateway Qualifications and recognised centres have a responsibility to ensure that the
process of assessment is robust and fair and allows the learner to show what they know
and can do without compromising the assessment criteria.
Centres must recruit learners with integrity. They must ensure that learners have the correct
information and advice on their selected qualification and that the qualification will meet their
needs.
Centres must assess each potential learner and make justifiable and professional
judgements about their potential to successfully complete the assessment and achieve the
qualification. Such an assessment must identify, where appropriate, the support that will be
made available to the learner to facilitate access to the qualification.
Page 9 of 30
Qualification Specification: Cybersecurity
3. Qualification Details
3.1 Achievement methodology
The qualification will be awarded to learners who successfully achieve an approved
combination of units through a Portfolio of Evidence that has been successfully verified and
monitored through Gateway Qualifications’ Quality Assurance process. Achievement is
therefore determined by successful completion of unit assessment with no further
requirement for additional/summative assessment.
Total Qualification Time is the number of notional hours which represents an estimate of
the total amount of time that could be reasonably expected to be required for a Learner to
achieve and demonstrate the achievement of the level of attainment necessary for the award
of the qualification.
• the number of hours which an awarding organisation has assigned to a qualification for
Guided Learning, and
Page 10 of 30
Qualification Specification: Cybersecurity
The knowledge, skills and understanding that will be assessed as part of the qualification are
set out within unit specifications. Unit contents, including the learning outcomes and
associated assessment criteria, are published on the Gateway Qualifications website and are
also available to download from the qualification library in the online system Prism.
For information on Recognition of Prior Learning/Exempt and Equivalent units please see
section 3.4 Recognition of Prior Learning (RPL)
Mandatory (M)
Mandatory (M)
Page 11 of 30
Qualification Specification: Cybersecurity
Recognition of Prior Learning (RPL) provides learners and Centres with an alternative
assessment method by which a learner’s previous achievements can meet the assessment
requirements for a unit/qualification through the knowledge, understanding or skills that they
already possess and so, do not need to develop these through a course of learning.
It enables the recognition of achievement from a range of activities using any valid
assessment methodology. Provided that the assessment requirements of a given unit or
qualification have been met, the use of RPL is acceptable to contribute to a unit, units, or a
whole qualification according to the RPL criteria for a given qualification.
The process of Recognition for Prior Learning is not applicable to these qualifications.
These qualifications form part of the Gateway Qualifications’ qualifications in Digital and IT
Skills.
Page 12 of 30
Qualification Specification: Cybersecurity
4 Assessment
4.1 Assessment overview
Should a learner not achieve the required standard to pass an assessment, further teaching
and learning should take place before attempting the assessment again.
In addition to this qualification specification, the following resources are available on the
Gateway Qualifications website:
• Centre Handbook
Gateway Qualifications and recognised centres have a responsibility to ensure that the
process of assessment is robust and fair and allows the learner to show what they know and
can do without compromising the assessment criteria. Gateway Qualifications understands
its requirement as an awarding organisation to make reasonable adjustments where a
learner, who is disabled within the meaning of the Equality Act 2010, would be at a
substantial disadvantage in comparison to someone who is not disabled.
Learners can have access to all forms of equipment, software and practical assistance, such
as a reader or a scribe that reflect their normal way of working within the centre. However,
such adjustments must not affect the reliability or validity of assessment outcomes or give
Page 13 of 30
Qualification Specification: Cybersecurity
the candidate an assessment advantage over other candidates undertaking the same or
similar assessments.
The following adaptations are examples of what may be considered for the purposes of
facilitating access, as long as they do not impact on any competence standards being tested:
It is important to note that not all the adjustments (as above) will be reasonable, permissible
or practical in particular situations. The learner may not need, nor be allowed the same
adjustment for all assessments.
Learners should be fully involved in any decisions about adjustments/adaptations. This will
ensure that individual needs can be met, whilst still bearing in mind the specified assessment
criteria for a particular qualification.
All reasonable adjustments made by the centre must be recorded on the Gateway
Qualifications’ Reasonable Adjustments Form and should be made available to Gateway
Qualifications upon request. Guidance on the process for applying for formal adjustments
can be found on the Forms and Guidance page of Gateway Qualifications’ website.
Centres should keep records of adjustments they have permitted and those they have
requested from Gateway Qualifications. These records should normally be kept for 3 years
following the assessment to which they apply.
Page 14 of 30
Qualification Specification: Cybersecurity
Special Considerations
Requests for special consideration should be submitted as soon as possible. Please refer to
the Reasonable Adjustments and Special Consideration Policy.
Page 15 of 30
Qualification Specification: Cybersecurity
Both centre recognition and qualification approval must be gained before centres are
permitted to deliver these qualifications.
Guidance on the centre recognition and qualification approval processes is available on the
website: https://www.gatewayqualifications.org.uk/advice-guidance/help-admin-tasks/centre-
recognition/
Centres must ensure that they have the appropriate resources in place when delivering
performance units from vocational areas.
In the delivery of qualification and units to pre-16 learners centres are required to exercise
due diligence in respect of the following:
- the learner’s needs and access to information and advice about the units offered and
how the course of learning will meet their needs;
- the learner’s present capacity to undertake the tasks set by tutors, and tutors
understanding of how particular tasks accord with the assessment criteria for the unit;
- tutors should be fully conversant with the qualification and unit specification/s offered
to learners, where clarification is required the centre should consult with the assigned
External Quality Assurer for further advice and guidance in the delivery of units and
refer to the Centre Handbook and Reasonable Adjustment and Special Consideration
policy and guidance.
- centres will be required to have appropriate and up to date risk assessments and
ensure that appropriate support and supervision is provided; appropriate subject
specialist knowledge should be consulted where the possibility of harm to learners is
identified; this will be monitored through Gateway Qualifications’ quality assurance
process.
- the centre contact for the unit/qualification being delivered must ensure that all
procedures relating to the delivery of the unit/qualification operate effectively in the
centre.
Please refer to the Staffing Requirements - Qualification Specific Roles section within the
online centre handbook for tutor/assessor/IQA requirements:
https://www.gatewayqualifications.org.uk/advice-guidance/delivering-our-
qualifications/centre-handbook/quality-compliance/
Page 16 of 30
Qualification Specification: Cybersecurity
Internal Quality Assurers in addition to being Tutor/Assessors will have knowledge and
experience of carrying out internal quality assurance/verification and will hold a recognised
internal quality assurance/verification or be working towards one, examples as follows;
• D34 qualification
• V1 qualification
• Internal Verify Award
• Internal Verification of Credit Based Learning: Continuing Professional Development
for Practitioners Award
• Level 4 Award in the Internal Quality Assurance of Assessment Processes and
Practice
• Level 4 Certificate in Leading the Internal Quality Assurance of Assessment
Processes and Practice
• L4 TAQA
Tutor/Assessors must be fully qualified and experienced in the subject area in which they are
delivering, details of which must be provided to Gateway Qualifications as part of the
Qualification Approval application.
Internal Quality Assurers in addition to being Tutor/Assessors will have knowledge and
experience of carrying out internal quality assurance/verification and will hold a recognised
internal quality assurance/verification or be working towards one, examples as follows;
• D34 qualification
• V1 qualification
• Internal Verify Award
• Internal Verification of Credit Based Learning: Continuing Professional Development
for Practitioners Award
• Level 4 Award in the Internal Quality Assurance of Assessment Processes and
Practice
• Level 4 Certificate in Leading the Internal Quality Assurance of Assessment
Processes and Practice
• L4 TAQA
Page 17 of 30
Qualification Specification: Cybersecurity
6 Quality Assurance
Centres should refer to the online Centre Handbook for further guidance.
The quality assurance process for these qualifications is through risk-based external quality
assurance monitoring through reviews of centres’ internal quality assurance systems against
key quality standards and sampling of assessment decisions and internal quality assurance
activity to ensure that qualification standards are maintained.
The EQA carries out an initial risk assessment at the centre recognition stage and then
annually on an on-going basis using Gateway Qualifications’ risk assessment criteria, and
gives a high/medium/low risk rating in each of the following categories:
EQAs arrange quality monitoring visits to all recognised centres. These visits:
• monitor the centre’s compliance with the centre recognition terms and conditions by
reviewing programme documentation and meeting managers and centre staff
• identify any staff development needs
• ensure that all procedures are being complied with, through an audit trail, and make
sure that the award of certificates of completion to learners is secure.
EQAs contact the centre in advance of a visit, however Gateway Qualifications reserves the
right to undertake unannounced visits including during assessment times.
EQAs will request information from the centre in advance of a planned visit to help inform the
evidence to be reviewed during the visit. Centres are obliged to comply with any requests for
access to premises, people and records for the purposes of the monitoring visit. If a centre
fails to provide access, then Gateway Qualifications will take appropriate action.
Page 18 of 30
Qualification Specification: Cybersecurity
Once a visit date has been agreed, the centre should ensure that the appropriate members
of staff attend the meeting, all requested documentation is provided and access to
qualification, learner and staff records is available.
If a centre cancels a pre-arranged monitoring visit at short notice the EQA must be satisfied
that there was a legitimate reason for the cancellation. If this cannot be established,
Gateway Qualifications reserves the right to withhold certification claims until a monitoring
visit is completed.
Following the visit, the EQA completes a monitoring report which will be sent to the centre for
reference afterwards.
The frequency of the quality monitoring visits will be determined by the volume of learner
registrations and the actions arising from previous monitoring activity.
Centres found in breach of these procedures may be subject to sanctions by Gateway
Qualifications. Please refer to the Gateway Qualifications Sanctions Policy.
If a centre cancels a pre-arranged monitoring visit at short notice the EQA must be satisfied
that there was a legitimate reason for the cancellation. If this cannot be established,
Gateway Qualifications reserves the right to withhold certification claims until a monitoring
visit is completed.
Following the visit, the EQA completes a monitoring report which will be sent to the centre for
reference afterwards.
The frequency of the quality monitoring visits will be determined by the volume of learner
registrations and the actions arising from previous monitoring activity.
Centres found in breach of these procedures may be subject to sanctions by Gateway
Qualifications. Please refer to the Gateway Qualifications Sanctions Policy.
As the assessments are tutor marked the centre must operate an internal quality assurance
process. This ensures that qualification standards are being applied consistently within a
centre through training, standardisation, sampling of marking and feedback. A centre’s
internal quality assurance process is led by the Internal Quality Assurer (IQA) who is
responsible for ensuring that all tutors are marking assessments in line with the standards
set by Gateway Qualifications.
Internal Standardisation
Internal standardisation is a collaborative process by which tutors within a centre consider
work that they have marked and, using pre-determined criteria, reach a common agreement
on standards as being typical of work at a particular level by comparing samples and
providing peer evaluation.
Standardisation will be facilitated by the Centre’s IQA and should include all those involved in
marking assessments. Centre standardisation events should be held at regular intervals and
to a schedule which reflects delivery patterns and supports the marking of live assessments.
Centres will be required to keep records of each internal standardisation event including the
date, attendees and notes on any outcomes and actions. Centres will be required to store
Page 19 of 30
Qualification Specification: Cybersecurity
these reports securely for three years and Gateway Qualifications may ask to see these
records as part of the centre quality assurance and monitoring activities.
Once the internal quality assurance process is complete, an EQA will be allocated to a centre
to sample the centre marking.
The sample selected is based on the number of learners and the centre’s risk rating, derived
from centre monitoring.
Evidence of the inconsistent marking and actions taken informs the centre’s risk rating and
this information will be taken into account with the sampling of future assessments, for
example, leading to an increase in sampling size.
6.3 Malpractice
Malpractice is any deliberate activity, neglect, default or other practice that compromises the
integrity of the internal and external assessment process, and/or the validity of certificates. It
covers any deliberate actions, neglect, default or other practice that compromises, or could
compromise:
Centre staff should be familiar with the contents of Gateway Qualifications Malpractice and
Maladministration Policy:
https://www.gatewayqualifications.org.uk/wp-content/uploads/2017/10/Malpractice-and-
Maladministration-Policy.pdf
Page 20 of 30
Qualification Specification: Cybersecurity
Centres will register learners via the Gateway Qualifications’ online registration portal.
Learner registration guidance is available on our website,
https://www.gatewayqualifications.org.uk/advice-guidance/help-admin-tasks/registering-
learners/.
7.2 Awarding
The qualifications will be awarded as Pass or Fail. Learners must pass the assessment to
be awarded a Pass.
Results for learners who do not reach the minimum standard for a pass will be recorded as
fail.
7.4 Appeals
Centres must have internal appeal arrangements which learners can access if they wish to
appeal against a decision taken by Centres, which will include a named contact at the
Centre. These arrangements have to be transparent and accessible in order that appeals
from learners can be received, considered and resolved fairly.
Please refer to the Gateway Qualifications’ Appeals policy:
https://www.gatewayqualifications.org.uk/wp-content/uploads/2017/09/Appeals-Policy.pdf
7.5 Enquiries
Enquiries about assessment decisions should be made once the centre has followed its
internal enquiries and appeal procedures.
Page 21 of 30
Qualification Specification: Cybersecurity
8 What to do next
For existing centres please contact your named Development Manager or Development
Officer.
Email: [email protected]
9 Gateway Qualifications
Gateway Qualifications, a not for profit registered charity, is an Awarding Organisation based
in Colchester.
We work with learning providers and industry experts to design and develop qualifications
that benefit the learner and the employer.
We support flexible, responsive and quality assured learning opportunities whether it’s in the
classroom, at work, in the community or through distance learning.
We are recognised by Ofqual, to design, develop and submit qualifications to the Regulated
Qualifications Framework (RQF) and Qualification Wales to offer regulated qualifications in
Wales.
Page 22 of 30
Qualification Specification: Cybersecurity
Cybersecurity
Level: Level 1
Credit Value: 6
GLH: 48
Unit Aim: Learners will learn about cybercrime and the risks and
effects it has on individuals and organisations. They will
understand routine protective methods used to maintain
cybersecurity including the principles of vulnerability and
penetration testing and user access control.
Assessment Guidance: N/A
Page 23 of 30
Qualification Specification: Cybersecurity
• Cryptojacking (where hackers mine cryptocurrency using resources they do not own)
• Cyberespionage (where hackers access government or company data)
AC 1.3:
• Social engineering: relies on human instinct of trust, carefully worded email, voicemail,
or text message from a cybercriminal can convince people to transfer money, provide
confidential information, or download a file that installs malware.
Tactics to defraud:
• Phishing: tactics include deceptive emails, websites, and text messages to steal
information.
• Spear phishing: email is used to carry out targeted attacks against individuals or
businesses.
• Baiting: an online and physical social engineering attack that promises the victim a
reward.
• Malware: victims are tricked into believing that malware is installed on their computer
and that if they pay, the malware will be removed.
• Pretexting: uses false identity to trick victims into giving up information.
• Vishing: urgent voice mails convince victims they need to act quickly to protect
themselves from arrest or other risk.
• Learners could refer to a ‘real world’, for example, by looking at each other’s social
media accounts to identify information that could potentially be used to defraud their
peers.
3 Know about legislation and codes of 3.1 Identify protections for and
conduct related to cybersecurity. responsibilities of individuals and
organisations as set out in key
legislation.
Page 24 of 30
Qualification Specification: Cybersecurity
Page 25 of 30
Qualification Specification: Cybersecurity
Cybersecurity
Unit Number: L/618/3674
Level: Level 2
Credit Value: 6
GLH: 48
Page 26 of 30
Qualification Specification: Cybersecurity
Page 27 of 30
Qualification Specification: Cybersecurity
• Software and hardware firewalls and the filtering techniques they use, inbound and
outbound rules and network addressing.
• User authentication methods and processes and their advantages and disadvantages:
types of biometric authentication (fingerprint, retina, facial recognition), two-step/multi-
factor verification (MFA), security tokens, including USB-based keys, knowledge-based
authentication, including question and response pairs, certificate-based authentication,
digital signature, Completely Automated Public Turing Test To Tell Computers and
Humans Apart (CAPTCHA).
• Login procedures: user name and password, rules for password security, best practice
for password complexity/strength, graphical password, password history and time
between password changes, account lockout and password reset procedures.
• Access controls to restrict user access to: applications, folders/shared areas, files –
files’ access rights (read only, full access (read/write/execute), read/write, no access),
physical resources (access to peripheral devices).
• Protection of data during transmission: virtual private network (VPN), encryption, digital
signatures.
• Encryption of files, folders, disks.
• Precautions that can be taken to secure a wireless local area network (WLAN),
including: wireless encryption – wired equivalent privacy (WEP), Wi-Fi protected
access (WPA2) and Wi-Fi protected setup (WPS), wireless MAC address filtering and
hiding the service set identifier (SSID).
AC 2.2:
• Comparing the types, characteristics, benefits and risks, their advantages and
disadvantages, and the effectiveness of different physical security measures used to
protect IT systems and data.
• Building and IT/network room security: site security locks, card entry, passcode,
biometrics– fingerprint, retina, facial recognition, closed circuit television (CCTV),
security staff, alarms.
• Data storage: data protection methods, central storage.
• Backup procedures: selection of data, timing, frequency, media, planned, automated
and manual, type (full, differential and incremental), on- site, off-site and cloud data
storage.
• User/individual actions: logging out of applications, logging off machines, screen
locking, shoulder surfing prevention, shredding documents.
Page 28 of 30
Qualification Specification: Cybersecurity
• Learners need to show how the use of ethical hacking and penetration tools supports
cybersecurity by performing a range of activities such as port scanning, vulnerability
scanning and password cracking.
Page 29 of 30