Qualifi-Level-7-Diploma-in-Cyber-Security
Qualifi-Level-7-Diploma-in-Cyber-Security
Cyber Security
Qualification Specification
January 2024
All QUALIFI materials, including assessment materials related to your course and provided to you,
whether electronically or in hard copy, as part of your study, are the property of (or licensed to) QUALIFI
Ltd and MUST not be distributed, sold, published, made available to others, or copied other than for
your personal study use unless you have gained written permission to do so from QUALIFI Ltd. This
applies to the materials in their entirety and to any part of the materials.
Contents
Contents ...................................................................................................................................2
About QUALIFI.......................................................................................................................4
Why Choose QUALIFI Qualifications? ................................................................................4
Employer Support for the Qualification Development ......................................................4
Equality and Diversity ........................................................................................................4
Qualification Title and Accreditation Number ......................................................................5
Qualification Aims and Learning Outcomes ..........................................................................5
Aims of the QUALIFI Level 7 Diploma in Cyber Security ....................................................5
Learning Outcomes of the QUALIFI Level 7 Diploma in Cyber Security .............................5
Delivering the Qualification ..................................................................................................6
External Quality Assurance Arrangements ........................................................................6
Learner Induction and Registration ...................................................................................6
Entry Criteria .....................................................................................................................7
Recognition of Prior Learning ............................................................................................7
Data Protection .................................................................................................................7
Learner Voice.....................................................................................................................8
Professional Development and Training for Centres.........................................................8
Progression and Links to other QUALIFI Programmes ..........................................................8
Qualification Structure and Requirements ...........................................................................8
Credits and Total Qualification Time (TQT) .......................................................................8
Rules of Combination for QUALIFI Level 7 Diploma in Cyber Security ..............................9
Achievement Requirements ..............................................................................................9
Awarding Classification/Grading .......................................................................................9
Assessment Strategy and Methods .....................................................................................10
Unit Specifications...............................................................................................................11
Unit DCS701: Fundamentals of Cyber Security Technology ............................................11
Unit DCS702: Network, Infrastructure and Systems Security..........................................13
Unit DCS703: Applications of Cyber Security ..................................................................15
Unit DCS704: Security management and governance .....................................................17
Unit DCS705: Cryptography .............................................................................................19
The QUALIFI Level 7 Diploma in Cyber Security aims to give learners the opportunity to:
1. Gain a recognised qualification from an internationally recognised Awarding Organisation.
2. Develop research and critical thinking abilities to carry out independent cyber security research.
3. Develop competence in security management (risk assessment, compliance, and governance)
4. Gain in-depth knowledge of network security, digital forensics, ethical hacking, and cloud security.
5. Develop an understanding of ethical and legal aspects relating to privacy, compliance, and the legal
frameworks that regulate cyber operations.
The learning outcomes and assessment criteria for each unit are outlined in the Unit Specifications.
Data Protection
All personal information obtained from learners and other sources in connection with studies will be held
securely and will be used during the course and after they leave the course for a variety of purposes and
may be made available to our regulators. These should be all explained during the enrolment process at
the commencement of learner studies. If learners or centres would like a more detailed explanation of the
partner and QUALIFI policies on the use and disclosure of personal information, please contact QUALIFI via
email [email protected]
Achievement Requirements
Learners must demonstrate they have met all assessment criteria for all units to achieve this qualification.
QUALIFI will issue certificates to all successful learners via their registered centres.
Awarding Classification/Grading
All unit grading is shown on the qualification transcript.
Fail - 0-39%
Pass - 40%-59%
Merit - 60% - 69%
Distinction 70%+
All units will be internally assessed through written assignment, internally marked by the QUALIFI approved
centre and subject to external quality assurance by QUALIFI.
Unit Aim
The aim of this unit is to give learners an understanding if the key concepts of cyber security, allowing them
to recognise and analyse security threats in a range of scenarios.
1. Understand the key concepts in 1.1 Discuss what is meant by cyber security and its importance.
cyber security.
1.2 Analyse the principal techniques and technologies used to
achieve cyber security and the challenges faced.
2. Understand the impact of cyber 2.1 Analyse existing and emerging threats and the impact on
security threats and attacks on individuals and organisations.
individuals and organisations. 2.2 Discuss the organisational policies and procedures that need to
be in place to protect against cyber security attacks.
• SMART Objectives
• Cyber security threats, risks and vulnerabilities, threat landscape and attack vectors
• System vulnerabilities
• Legal responsibilities
• Physical security measures
• Software and hardware
• security measures Various Obstacles
• Delivery formats
• Network types
• Network components
• Networking infrastructure services and resources
• Importance of training staff on cyber security
Suggested Resources
Shea, S., Gillis, A. S., & Clark, C. (2023, January 11). What is cybersecurity? Security.
https://www.techtarget.com/searchsecurity/definition/cybersecurity).
Unit Aim
The main objective of this unit is to for learners to gain an understanding of the various types of threats
and vulnerabilities that can affect computer networks, infrastructure and systems, such as malware,
hacking, and social engineering. It also aims to familiarise learners with various security technologies and
tools, such as firewalls, intrusion detection systems, and encryption methods.
1. Understand the security implications of 1.1 Discuss the concepts and the role of
networked systems.
• Network types
• Network components
• Networking infrastructure services and resources.
2. Understand the design and security of an 2.1 Analyse operational technologies, the internet and
organisational network. critical infrastructure.
2.2 Evaluate vulnerabilities and exploits that target
computer networks and systems, the internet
infrastructure.
4 Understand computer systems from the 4.1 Evaluate a range of deployments that support the
operating systems and security services. worldwide web and distributed computing services.
Indicative Content
• Research methodologies
• Networking principles
• Firewalls, VPN, and Firmware
• Access logs
• Baselines and assurance
• Firmware updates
• End user device security
• Malware and Anti-virus protection
• Identify security weaknesses and focus on them
• End-point protection
• Security designs and related principles
• Internet and cloud computing/infrastructure
Suggested Resources
What is Network Security? The Different Types of Protections. Check Point Software.
https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/
Unit Aim
The aim of this unit is to for learners to learn about the security measures and defence mechanisms that
are used to defend against and respond effectively to security incidents, breaches, and anomalies.
Learning Outcomes and Assessment Criteria
1. Understand the principles around software and 1.1 Analyse the issues of malicious software and the
applications. effect on the security of systems.
2. Understand the techniques used for secure 2.1 Discuss principles of secure programming.
software development.
Suggested Resources
Incident Response | Cyber Security Incident Response Services. (2023, October 9). Redscan.
https://www.redscan.com/services/cyber-incident-response/
Wall, P. (2023, October 17). Define Your Incident Response Lifecycle | Application Security | Imperva.
Learning Center. https://www.imperva.com/learn/application-security/define-security-incident-response/
Beaver, K. (2023, February 23). Top incident response tools: How to choose and use them. Security.
https://www.techtarget.com/searchsecurity/feature/Incident-response-tools-How-when-and-why-to-use-
them
Unit Aim
The aim of this unit is to develop learners understanding of what constitutes effective
security management in relation to different types of cyber threat that can affect
organisations and individuals. Learners will have the opportunity to analyse and review a
response to a cyber security incident.
Indicative content
• Data breaches
• Malware
• Cyber threats
• Attach vectors
• Zero-day vulnerabilities
• SQL injections
• Network infrastructure
• Emerging threats
• Legal compliance
• Data reports
• Data protection
• Record keeping
• Key standardised approaches and the fundamental importance of a risk-based
approach
Suggested Resources
Cyber Security Threats and Countermeasures. Social Science Research Network; RELX Group
(Netherlands). https://doi.org/10.2139/ssrn.4425678
Security Threats and Countermeasures | Global | Ricoh. (n.d.). Copyright RICOH Co., Ltd.
https://www.ricoh.com/products/security/mfp/countermeasur.
Unit Aim
The aim of this unit is for learners to develop their understanding of cryptography, the
different cryptography tools and how and when these tools are used.
1. Understand the key concepts of 1.1 Analyse how the security of everyday digital
cryptography and its limitations. applications tools is achieved and maintained.
2. Understand the function and purpose of the Explain how the main cryptographic tools are used.
main cryptographic tools. Assess the decision-making process used to select the
most appropriate cryptographic tools to deploy in
specific settings.
Suggested Resources
Data Backup & Recovery | Certitude Security | Cyber Security. (2023, February 10).
Certitude Security. https://www.certitudesecurity.com/services/data-backup-and-recovery/