22
Analyst Endpoint Security Model Curriculum Analyst Endpoint Security SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: IT-ITeS IT SERVICES INFORMATION/CYBER SECURITY SSC/Q0905, V1.0 7

Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security

Model Curriculum

Analyst Endpoint Security

SECTOR: SUB-SECTOR: OCCUPATION:

REF ID: NSQF LEVEL:

IT-ITeS IT SERVICES INFORMATION/CYBER SECURITY SSC/Q0905, V1.0

7

Page 2: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security

Page 3: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security

TABLE OF CONTENTS

1. Curriculum 01

2. Trainer Prerequisites 12

3. Assessment Criteria 13

Page 4: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 1

Analyst Endpoint Security CURRICULUM / SYLLABUS

This program is aimed at training candidates for the job of an “Analyst Endpoint Security” in the “IT-

Services” Sector/Industry and aims at building the following key competencies amongst the learner

Program Name

Analyst Endpoint Security

Qualification Pack Name & Reference ID.

SSC/Q0905, V1.0

Version No.

1.0

Version Update Date

01/04/2018

Pre-requisites to Training

Diploma in IT/Computer

Training Outcomes After completing this programme, participants will be able to:

Troubleshoot and maintain endpoint security in an enterprise environment

Assist in the installation of endpoint security measures

Manage your work to meet requirements

Work effectively with colleagues

Maintain a healthy, safe and secure working environment.

Provide data/information in standard formats

Develop your knowledge, skills and competence

Page 5: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 2

This course encompasses 7 out of 7 National Occupational Standards (NOS) of “Analyst Endpoint

Security” Qualification Pack issued by “IT-ITeS SSC”.

Sr. No.

Module

Key Learning Outcomes

Equipment Required

1 IT-ITES/BPM Industry – An Introduction

Theory Duration

(hh:mm) 06:00

Practical Duration (hh:mm) 01:00

Corresponding NOS Code Bridge Module

Establish the nature and

scope of IT-ITeS/BPM

Industry with their sub-

sectors.

Collate information, evidence,

and artifacts regarding the IT-

ITeS/BPM industry.

Identify the processes

involved in maintaining and

managing the IT-ITeS/BPM

industry with their sub-sectors.

List the roles in IT sub-

sectors.

Review the scope of the

industry with appropriate

people and incorporate their

inputs.

Whiteboard and Markers

LCD Projector and Laptop for

presentations

Lab equipped with the following: -

PCs/Laptops

Internet with WiFi (Min 2

Mbps Dedicated)

Networking Equipment

Routers & Switches

Chart paper and sketch

pens

2 IT Services – An Introduction

Theory Duration

(hh:mm) 03:00

Practical Duration (hh:mm) 01:00

Corresponding NOS Code Bridge Module

Establish the nature and

scope of IT services in the IT-

ITeS/BPM industry.

Identify the various categories

of services and sub-sectors

under the IT industry along

with their scope.

Liaise with appropriate people

to gather data/information

required for maintaining IT

services in an organization.

Organize data/information

required for maintaining and

managing IT services along

with their sub-sectors

services.

Provide immediate support to

appropriate people for

maintaining IT services in an

organization.

Participate in discussions/

review meetings, as required.

Whiteboard and Markers

LCD Projector and Laptop for

presentations

Lab equipped with the following:

PCs/Laptops

Internet with WiFi (Min 2

Mbps Dedicated)

Page 6: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 3

3 Information/Cyber Security – An Introduction

Theory Duration

(hh:mm) 05:00

Practical Duration

(hh:mm) 04:00

Corresponding NOS Code Bridge Module.

Explain the societal benefits of

cyber security.

Define the scope of work and

key responsibilities of Analyst

Endpoint security.

List the work priorities of

Analyst endpoint security

within the peripherals of the

organization’s policy

Analyze and create a

document of expected skills

from Analyst Endpoint

security.

Provide immediate support to

staff for maintaining security

regulations in organizations.

Create/ draw a career path in

the field of information/ cyber

security.

Whiteboard and Markers

Chart paper and sketch pens

Lab equipped with the following:

PCs/Laptops

Internet with Wi-Fi (Min 2

Mbps Dedicated)

4 Fundamentals of Endpoint Security

Theory Duration

(hh:mm) 06:00

Practical Duration

(hh:mm) 23:00

Corresponding NOS Code SSC/N0912

Establish the context and

scope of the endpoint devices

for maintaining the security

posture of an organization.

Compare various endpoint

security products in

accordance with the

mentioned functionalities and

features.

Carry out assessment process

for the required

data/information.

Report any unresolved

anomalies security

architecture to appropriate

people in the organization.

Carry out configuration

reviews of Endpoint systems

using automated tools, where

required.

Whiteboard and Markers

LCD Projector and Laptop for

presentations

Lab with key devices, software,

and hardware in a large network.

Should include but not be limited

to- application of multiple

networking topology; use of

various Network Protocols;

Desktop computer; Smartphone;

Tablet (tablet PC); Thin client

(lean client); Printer; the need of

endpoint; benefits of endpoint etc.

Page 7: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 4

5 Threats and Vulnerability

Theory Duration

(hh:mm) 7:00

Practical Duration

(hh:mm) 22:00

Corresponding NOS Code SSC/N0912

Establish the scope of the

vulnerability assessment for detecting

threats and security issues.

Carry out vulnerability assessment to

detect the emerging threats and

vulnerabilities in the existing systems.

Monitor systems and apply controls

in line with the security policy to apply

countermeasures against attack

vectors.

List various types of threat vectors

along with their characteristics to

mitigate them in the future.

Obtain advice and guidance on

emerging issues and advancements

in the attacker’s motivation from

appropriate people, where required.

Analyze and operate in the direction

to comprehend the capability of an

attacker for maintaining system

security.

List the action items must be

performed in case of any security

incident and prioritize them

accordingly.

Whiteboard and markers

LCD projector and laptop for

presentations

Provision for online research in

the lab for all students

At least two subject matter

experts from the industry in the

field of endpoint security

The demo for providing

security to the endpoint

devices.

6 Endpoint Security System Functionality

Theory Duration

(hh:mm) 10:00

Practical Duration (hh:mm) 24:00

Corresponding

NOS Code

SSC/N0912

Establish and explain the layered

working of endpoint security platform

in an organization.

Record, classify and prioritize the

security events to be analyzed

through BYOD.

Access organization’s knowledge

base for information on previous

security incidents and how they were

managed.

Carry out procedures for threat

detection and mitigation as per their

occurrences in the organization.

Analyze the endpoint security

maturity in accordance with the

existing endpoint devices in an

organization.

Contrast and Compare traditional vs.

continuous endpoint security

compliance models for building a

robust security posture.

Whiteboard and markers

LCD projector and laptop for

presentations

Provision for online research in

the lab for all students

Open source code scanning

tools and their tutorials

Access to secure and

unsecured devices for

endpoint security testing

activities

Access to public databases

and vulnerability sharing clubs,

e.g., Bugtraq

National Institute of Standards

and Technology (NIST) NVB,

United States Computer

Emergency Readiness Team

(US-CERT)

Page 8: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 5

Recommend some value addition

points in contrast to the next-

generation endpoint security solution.

7 Endpoint Security Measures

Theory Duration

(hh:mm) 08:00

Practical Duration

(hh:mm) 26:00

Corresponding

NOS Code

SSC/N0912

Identify the Endpoint devices to be

installed/configured/ and

troubleshoot by following the

instructions and guidelines.

Install/configure Endpoint devices as

per instructions and guidelines.

Resolve security issues by following

the defined procedure.

Investigate the installed/configured

Endpoint devices by following

instructions and guidelines

Provide reports for troubleshooting,

configurations, and deployment

using standard templates and tools.

Work within the individual’s scope of

work for installing and configuring the

security devices in adherence to the

organization’s regulations.

Whiteboard and markers

LCD projector and laptop for

presentations

Provision for online research in

the lab for all students

Access to a list of

vulnerabilities and exposures

identified in the application by

participants in the activities of

the previous topic.

Open source tools in the field

of endpoint security for the

above-mentioned activities

Provision for online research

for all participants

Provision of software, such as

word processors,

spreadsheets, etc. for

preparing reports for all

participants.

8 Security Solutions for Endpoint Devices

Theory Duration (hh:mm) 07:00

Practical Duration

(hh:mm) 23:00

Corresponding

NOS Code

SSC/N0912

Identify the best encryption

technique out of various options

available as per the organization’s

policy.

Contrast and compare the benefits of

drive encryption versus file

encryption for data/information

security.

Prioritize the events and processes

required for maintaining devices

security.

Recommend best practices for

managing internet and browser

security.

Obtain an understanding of mobile

phone hardening for safeguarding

against emerging threats and

vulnerabilities.

Analyze the importance of cloud

security and suggest some security

solutions for maintaining the same.

Whiteboard and markers

LCD projector and laptop for

presentations

Provision for online research

in the lab for all students

Access to free OWASP tools

and methods and their

tutorials

Page 9: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 6

Recommend safeguarding

techniques and secure configuration

of the firewall for maintaining the

security posture of an organization.

9 Protection of Endpoint Devices and Networks

Theory Duration

(hh:mm) 06:00

Practical Duration

(hh:mm) 27:00

Corresponding

NOS Code

SSC/N0913

Analyze network security and prioritize

safeguarding events accordingly.

Contrast the benefits of using network

security methodologies.

Recommend threat mitigation solution

to provide a secure infrastructure.

Contrast the importance of patch

management process for security

against ever-evolving threats.

Align the network priorities in

accordance with the existing endpoint

devices and configure them securely

for maintaining a robust security

solution.

Whiteboard and markers

LCD projector and laptop for

presentations

Provision for online research

in a lab for all students

Access to free OWASP tools

and methods and their

tutorials

10 Basics of Safeguarding Resources

Theory Duration

(hh:mm) 07:00

Practical Duration

(hh:mm) 24:00

Corresponding NOS Code SSC/N0913

Analyze various safeguarding

techniques for endpoint devices.

Align with password security and one-

time passwords.

Compare different techniques for

maintaining password security against

emerging attacks.

Identify various regulatory compliance

and global standards along with the

industry’s best practices for better

security management.

Align the organization’s security

posture with industry best practices.

Whiteboard and markers •

LCD projector and laptop for

presentations

Lab with provision for online

research

Page 10: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 7

11 Lab Installation

Theory Duration

(hh:mm) 05:00

Practical Duration

(hh:mm) 30:00

Corresponding NOS Code SSC/N0913

Define the objective and

scope of the Manage

engine desktop central

tool.

Investigate the installation

process of Manage

Engine Desktop Central

as defined.

Install/ configure the

secure USB in Windows

Define steps for

configuring a firewall in an

organization’s network

Document the process

involved in installing and

configuring security

software.

Whiteboard and markers

LCD projector and laptops for

making presentations

Provision for online research in a

lab for all students

Undertake research on various

tools generating VA-PT reports

Hardware requirements:

Processor (CPU): Core i3 3.0 GHz

Memory (RAM): 4 GB

Hard Drive: 150 GB of free hard

disk drive space

Internet Connectivity: 2mbps (min)

Bandwidth Required

Local Network connectivity:

Required

DVD or USB port: Required

Software requirements:

Operating Systems: Win 10 (64 Bit)

setup

Supported Software’s:Net, SQL

Server, PHP,

Supported Browsers: IE v10,

Google Chrome v54 or better

12 Manage your work to meet requirements

Theory Duration

(hh:mm) 20:00

Practical Duration

(hh:mm) 25:00

Corresponding

NOS Code

SSC/N9001

Establish and agree with

your work requirements

with appropriate people.

Keep your immediate work

area clean and tidy.

Utilize your time effectively.

Treat confidential

information correctly

Work in line with your

organization’s policies and

procedures.

Work within the limits of

your job role.

Obtain guidance from

appropriate people, where

necessary.

Ensure your work meets

the agreed requirements

Whiteboard and Markers

LCD Projector and Laptop for

presentations

Training organization’s confidentiality

policy

Page 11: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 8

13 Work effectively with colleagues

Theory Duration

(hh:mm) 20:00

Practical Duration

(hh:mm) 25:00

Corresponding

NOS Code

SSC/N9002

Communicate with

colleagues clearly,

concisely and accurately.

Work with colleagues to

integrate your work

effectively with theirs.

Pass on essential

information to colleagues

in line with organizational

requirements.

Work in ways that show

respect for colleagues.

Carry out the

commitments you have

made to colleagues.

Let colleagues know in

good time if you cannot

carry out your

commitments, explaining

the reasons.

Identify any problems you

have working with

colleagues and take the

initiative to solve these

problems.

Follow the organization’s

policies and procedures

for working with

colleagues.

Whiteboard and Markers

LCD Projector and Laptop for

presentations

Provision to write emails and send

in the lab

Lab with provision for internet,

email, word processor and

presentation software

Chart paper, markers, picture

magazines, and old newspapers

14 Maintain a healthy, safe and secure working environment

Theory Duration

(hh:mm) 20:00

Practical Duration

(hh:mm) 25:00

Corresponding

NOS Code

SSC/N9003

Comply with your

organization’s current

health, safety and security

policies and procedures.

Report any identified

breaches in health, safety,

and security policies and

procedures to the

designated person.

Identify and correct any

hazards that you can deal

with safely, competently

and within the limits of

your authority.

Report any hazards that

you are not competent to

Whiteboard and Markers

LCD Projector and Laptop for

presentations

The training organization’s current

health, safety and security policies

and procedures

Provision for online research in the

Lab

A sample health and safety policy

document

Emergency broadcast system and

mock emergency signage in the

appropriate areas of the training

institute

Page 12: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 9

deal with to the relevant

person in line with

organizational procedures

and warn other people

who may be affected.

Follow your organization’s

emergency procedures

promptly, calmly, and

efficiently.

Identify and recommend

opportunities for improving

health, safety, and

security to the designated

person.

Complete any health and

safety records legibly and

accurately.

15 Provide data/information in standard formats

Theory Duration

(hh:mm) 20:00

Practical Duration

(hh:mm) 25:00

Corresponding

NOS Code

SSC/N9004

Establish and agree with

appropriate people the

data/information you need

to provide, the formats in

which you need to provide

it, and when you need to

provide it.

Obtain the

data/information from

reliable sources.

Check that the

data/information is

accurate, complete and

up-to-date.

Obtain advice or guidance

from appropriate people

where there are problems

with the data/information.

Carry out rule-based

analysis of the

data/information, if

required.

Insert the data/information

into the agreed formats.

Check the accuracy of

your work, involving

Whiteboard and Markers

LCD Projector and Laptop for

presentations

Provision for online research in the

lab

Page 13: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 10

colleagues where

required.

Report any unresolved

anomalies in the

data/information to

appropriate people.

Provide complete,

accurate and up-to-date

data/information to the

appropriate people in the

required formats on time.

16 Develop knowledge, skills and competence

Theory Duration

(hh:mm) 20:00

Practical Duration

(hh:mm) 25:00

Corresponding NOS Code

SSC/N9005

Obtain advice and

guidance from appropriate

people to develop your

knowledge, skills, and

competence.

Identify accurately the

knowledge and skills you

need for your job role.

Identify accurately your

current level of

knowledge, skills and

competence and any

learning and development

needs.

Agree with appropriate

people a plan of learning

and development activities

to address your learning

needs.

Undertake learning and

development activities in

line with your plan.

Apply your new

knowledge and skills in

the workplace, under

supervision.

Obtain feedback from

appropriate people on

your knowledge and skills

and how effectively you

apply them.

Review your knowledge,

skills, and competence

Whiteboard and Markers LCD

Projector and Laptop for

presentations

Provision for online access to all

students in the lab

Questionnaire and key for Honey

and Mumford learning styles

Page 14: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 11

Regularly and take

appropriate action.

Total Duration:

Theory Duration

170:00

Practical

Duration

330:00

Unique Equipment Required:

Whiteboard and Markers

LCD Projector and Laptop for presentations

Chart paper

Lab equipped with the following: PCs/Laptops and Internet with

WiFi (Min 2 Mbps Dedicated), provision for email, word

processor and presentation software.

CRM application, such as Siebel, Zoho, Social networking tool

/ LMS tool to enable blog posts or discussion board, Instant

messenger, chat and email tools to enable mock exercises

A sample health and safety policy document, Emergency

broadcast system and mock emergency signage in the

appropriate areas of the training institute

Grand Total Course Duration: 500 Hours, 0 Minutes

(This syllabus/ curriculum has been approved by SSC: IT-ITeS Sector Skills Council NASSCOM)

Page 15: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 12

Trainer Prerequisite for Job role: “Analyst Endpoint Security” mapped to Qualification Pack: “SSC/Q0905 v1.0”

Sr. No.

Area

Details

1 Description To deliver accredited training service, mapping to the curriculum detailed above, in accordance with the Qualification Pack “SSC/Q0905, V1.0”.

2 Personal Attributes

Aptitude for conducting training, and pre/ post work to ensure competent, Employable candidates at the end of the training. Strong communication skills, interpersonal skills, ability to work as part of a team; a passion for quality and for developing others; well-organized and focused, eager to learn and keep oneself updated with the latest in this field.

3 Minimum Educational Qualifications

Diploma in IT/Computer

4a Domain Certification

Certified for job role “Analyst Endpoint Security” mapped to Qualification Pack “SSC/Q0905” Version 1.0. The minimum accepted score is 80%

4b Platform Certification

Recommended that the trainer is certified for the Job Role “Trainer” mapped to the Qualification Pack “MEP/Q0102”. The minimum accepted score is 80% aggregate.

5 Experience 0-2 years of work experience/internship in security.

Page 16: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 13

Assessment Criteria

Job Role Analyst Endpoint Security

Qualification Pack SSC/Q0905, V1.0

Sector Skill Council IT-ITeS

Sr. No.

Guidelines for Assessment

1 Criteria for assessment for each Qualification Pack (QP) will be created by the Sector Skill Council (SSC). Each performance criteria (PC) will be assigned Theory and Skill/Practical marks proportional to its importance in NOS.

2 The assessment will be conducted online through assessment providers authorized by SSC.

3 Format of questions will include a variety of styles suitable to the PC being tested such as multiple-choice questions, fill in the blanks, situational judgment test, simulation and programming test.

4 To pass a QP, a trainee should pass each individual NOS. Standard passing criteria for each NOS is 70%.

5 For the latest details on the assessment criteria, please visit www.sscnasscom.com.

6 In case of successfully passing only certain number of NOS's, the trainee is eligible to take subsequent assessment on the balance NOS's to pass the Qualification Pack.

Page 17: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 14

Assessment

Outcomes

Assessment Criteria for Outcomes

Total

Marks

(700)

Out of

Marks Allocated

Theory Skills Practical

1. SSC/N0912 PC1. Verify the scope of endpoint assets

(Troubleshoot and maintain

and components to be monitored with authorized persons.

4 1 3

endpoint security in an enterprise environment)

100

PC2. Participate in the day, evening or overnight security operations center shift schedule.

4

1

3

PC3. Receive shift handover along with

relevant information, authorities, and 4 1 3 instructions.

PC4. Verify that endpoint security client 3 1 2

are online and functional.

PC5. Obtain reports and notifications

from the endpoint security tool and respond as per laid out the process for

3 1 2

the same.

PC6. Use reports and logs to identify

security problems and monitor status and security events.

4 1 3

PC7. Interpret the results of reports and

determine the priorities and actions to take to remediate the situation.

4 2 2

PC8. Respond to endpoint security client

messages and apply a solution 4 2 2 accordingly.

PC9. Monitor and troubleshoot an

endpoint security environment, its security management tools, and client

4 1 3

content delivery.

PC10. Monitor and troubleshoot

protection and communication technologies using basic troubleshooting

4 1 3

and other monitoring tools.

PC11. Troubleshoot and remediate a

virus outbreak or client installation 4 1 3 failures.

PC12. Enable debugging and gather logs 4 1 3

for technical support use.

PC13. Identify and prevent false 4 1 3

positives.

PC14. Upgrade and maintain the

endpoint security environment and 4 1 3 clients.

PC15. Manage clients through 4 1 3

groups/locations.

Page 18: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 15

PC16. Manage and apply policies such as virus and spyware protection policies, firewall policies, intrusion prevention policies, application and device control policies, update policies, and centralized exception policies.

5

2

3

PC17. Update products and content as per specifications received.

4 2 2

PC18. Check client status in the endpoint security manager.

4

1

3

PC19. Perform client deployment manager optimizations.

4

2

2

PC20. Create application and device control and firewall rules.

5

2

2

PC21. Use IT analytics to generate comprehensive reports from Endpoint Protection.

4

1

3

PC22. Collaborate with others to resolve information technology issues that are beyond own capabilities or job profile.

4

1

3

PC23. Report the results of the monitoring, ticket raising and ticket closure activities using standard documentation following organizational Procedures.

4

1

3

PC24. Comply with relevant legislation, standards, policies, and procedures.

4

1

3

PC25. Maintain a knowledge-base of the known problems and action taken for the same.

4

1

3

Total 100 31 69

2. SSC/N0913

(Assist in the installation of endpoint security measures)

PC1. Receive instructions from an authorized source for the task(s) to be performed for installation of endpoint security tool on the server of the client endpoint.

100

4

1

3

PC2. Install a management console on a server to help manage clients, product licenses and logs as per specifications provided.

6

2

3

PC3. Create a database containing settings, privileges, events and security policies as per specifications.

5

2

3

PC4. Integrate the tool with directory services or LDAP. 4 1 3

PC5. Manage the endpoint security tools database settings as per instructions provided.

4

1

3

Page 19: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 16

PC6. Activate the product with the appropriate license or serial number.

4 1 3

PC7. Create and manage administrator accounts in the Endpoint Security Manager Console.

6

2

4

PC8. Install and configure Linux clients on the endpoint security manager tool.

5 2 3

PC9. Configure Endpoint security replication, load balancing, and failover as per instructions provided.

5

2

3

PC10. Configure and implement Endpoint Protection domains as per instructions provided.

5

2

3

PC11. Start and navigate the endpoint protection manager.

4

1

3

PC12. Perform endpoint security console authentication.

5 2 3

PC13. Install software on client computers and devices, either directly or across the network as per instructions provided.

5

2

3

PC14. Configure clients for client software updates (automatic or pushed from the server) and virus definition updates, at a minimum.

4

1

3

PC15. Distinguish between client-mode and user-mode.

4 1 3

PC16. Install managed clients as per instructions provided. 4 1 3

PC17. Configure an unmanaged detector as per instructions provided.

4

1

3

PC18. Configuring endpoint protection clients to use Secure Socket Layer (SSL) communication.

5

2

3

PC19. Collaborate with others to resolve information technology issues that are beyond own capabilities or job profile.

5

1

4

PC20. Report the results of the monitoring, ticket raising and ticket closure activities using standard documentation following organizational procedures.

4

1

3

PC21. Obtain help or advice from the specialist if the problem is outside his/her area of competence or experience.

4

1

3

PC22. Comply with relevant legislation, standards, policies, and procedures.

4

1

3

Total 100 31 69

Page 20: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 17

3. SSC/N9001

(Manage your work to meet requirements)

PC1.Establish and agree your work requirements with appropriate people.

7 0 7

PC2. Keep your immediate work area clean and tidy.

12

6

6

PC3. Utilize your time effectively. 12 6 6

PC4. Use resources correctly and efficiently.

19

6

13

PC5. Treat confidential information correctly.

100

7

1

6

PC6. Work in line with your

Organization’s policies and procedures.

12

0

12

PC7. Work within the limits of your job role.

6

0

6

PC8. Obtain guidance from appropriate people, where necessary.

6

0

6

PC9. Ensure your work meets the agreed requirements.

19

6

13

Total 100 25 75

4. SSC/N9002

(Work effectively with colleagues)

PC1. Communicate with colleagues clearly, concisely and accurately.

20

0

20

PC2. Work with colleagues to integrate your work effectively with theirs.

10

0

10

PC3. Pass on essential information to colleagues in line with organizational requirements.

10

10

0

PC4. Work in ways that show respect for colleagues.

100

20 0 20

PC5. Carry out commitments you have made to colleagues. 10 0 10

PC6. Let colleagues know in good time if you cannot carry out your commitments, explaining the reasons.

10

10

0

PC7. Identify any problems you have working with colleagues and take the initiative to solve these problems.

10

0

10

PC8. Follow the organization’s policies and procedures for working with colleagues.

10

0

10

Total 100 20 80

5. SSC/N9003

(Maintain a healthy, safe

PC1. Comply with your organization’s current health, safety and security policies and procedures.

100

20

10

10

Page 21: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 18

and secure working environment)

PC2. Report any identified breaches in health, safety, and security policies and procedures to the designated person.

10

0

10

PC3. Identify and correct any hazards that you can deal with safely, competently and within the limits of your authority.

20

10

10

PC4. Report any hazards that you are not competent to deal with to the relevant person in line with organizational procedures and warn other people who may be affected.

10

0

10

PC5. Follow your organization’s emergency procedures promptly, calmly, and efficiently.

20

10

10

PC6. Identify and recommend opportunities for improving health, safety, and security to the designated person.

10

0

10

PC7. Complete any health and safety records legibly and accurately.

10

0

10

Total 100 30 70

6. SSC/N9004

(Provide data/information in standard formats)

PC1. Establish and agree with appropriate people the data/information you need to provide, the formats in which you need to provide it, and when you need to provide it.

13

13

0

PC2. Obtain the data/information from reliable sources.

13 0 13

PC3. Check that the data/information is accurate, complete and up-to-date.

12 6 6

PC4. Obtain advice or guidance from appropriate people where there are problems with the data/information.

6

0

6

PC5. Carry out rule-based analysis of the data/information, if required.

100 25 0 25

PC6. Insert the data/information into the agreed formats.

13 0 13

PC7. Check the accuracy of your work, involving colleagues where required.

6 0 6

PC8. Report any unresolved anomalies in the data/information to appropriate people.

6

6

0

PC9.Provide complete, accurate and up-

to-date data/information to the

Appropriate people in the required formats on time.

6 0 6

Total 100 25 75

Page 22: Model Curriculum - National Skill Development Corporation Analyst... · Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS

Analyst Endpoint Security 19

7. SSC/N9005

(Develop your knowledge, skills and competence)

PC1. Obtain advice and guidance from appropriate people to develop your knowledge, skills, and competence.

10

0

10

PC2. Identify accurately the knowledge and skills you need for your job role.

10

0

10

PC3. Identify accurately your current level of knowledge, skills and competence and any learning and development needs.

20

10

10

PC4. Agree with appropriate people a plan of learning and development activities to address your learning needs.

100

10

0

10

PC5. Undertake learning and development activities in line with your plan.

20

10

10

PC6. Apply your new knowledge and skills in the workplace, under supervision.

10 0 10

PC7. Obtain feedback from appropriate

people on your knowledge and skills and

How effectively you apply them.

10 0 10

PC8. Review your knowledge, skills, and

competence regularly and take

Appropriate action.

10 0 10

Total 100 20 80

Grand Total 700 700