Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
Analyst Endpoint Security
Model Curriculum
Analyst Endpoint Security
SECTOR: SUB-SECTOR: OCCUPATION:
REF ID: NSQF LEVEL:
IT-ITeS IT SERVICES INFORMATION/CYBER SECURITY SSC/Q0905, V1.0
7
Analyst Endpoint Security
Analyst Endpoint Security
TABLE OF CONTENTS
1. Curriculum 01
2. Trainer Prerequisites 12
3. Assessment Criteria 13
Analyst Endpoint Security 1
Analyst Endpoint Security CURRICULUM / SYLLABUS
This program is aimed at training candidates for the job of an “Analyst Endpoint Security” in the “IT-
Services” Sector/Industry and aims at building the following key competencies amongst the learner
Program Name
Analyst Endpoint Security
Qualification Pack Name & Reference ID.
SSC/Q0905, V1.0
Version No.
1.0
Version Update Date
01/04/2018
Pre-requisites to Training
Diploma in IT/Computer
Training Outcomes After completing this programme, participants will be able to:
Troubleshoot and maintain endpoint security in an enterprise environment
Assist in the installation of endpoint security measures
Manage your work to meet requirements
Work effectively with colleagues
Maintain a healthy, safe and secure working environment.
Provide data/information in standard formats
Develop your knowledge, skills and competence
Analyst Endpoint Security 2
This course encompasses 7 out of 7 National Occupational Standards (NOS) of “Analyst Endpoint
Security” Qualification Pack issued by “IT-ITeS SSC”.
Sr. No.
Module
Key Learning Outcomes
Equipment Required
1 IT-ITES/BPM Industry – An Introduction
Theory Duration
(hh:mm) 06:00
Practical Duration (hh:mm) 01:00
Corresponding NOS Code Bridge Module
Establish the nature and
scope of IT-ITeS/BPM
Industry with their sub-
sectors.
Collate information, evidence,
and artifacts regarding the IT-
ITeS/BPM industry.
Identify the processes
involved in maintaining and
managing the IT-ITeS/BPM
industry with their sub-sectors.
List the roles in IT sub-
sectors.
Review the scope of the
industry with appropriate
people and incorporate their
inputs.
Whiteboard and Markers
LCD Projector and Laptop for
presentations
Lab equipped with the following: -
PCs/Laptops
Internet with WiFi (Min 2
Mbps Dedicated)
Networking Equipment
Routers & Switches
Chart paper and sketch
pens
2 IT Services – An Introduction
Theory Duration
(hh:mm) 03:00
Practical Duration (hh:mm) 01:00
Corresponding NOS Code Bridge Module
Establish the nature and
scope of IT services in the IT-
ITeS/BPM industry.
Identify the various categories
of services and sub-sectors
under the IT industry along
with their scope.
Liaise with appropriate people
to gather data/information
required for maintaining IT
services in an organization.
Organize data/information
required for maintaining and
managing IT services along
with their sub-sectors
services.
Provide immediate support to
appropriate people for
maintaining IT services in an
organization.
Participate in discussions/
review meetings, as required.
Whiteboard and Markers
LCD Projector and Laptop for
presentations
Lab equipped with the following:
PCs/Laptops
Internet with WiFi (Min 2
Mbps Dedicated)
Analyst Endpoint Security 3
3 Information/Cyber Security – An Introduction
Theory Duration
(hh:mm) 05:00
Practical Duration
(hh:mm) 04:00
Corresponding NOS Code Bridge Module.
Explain the societal benefits of
cyber security.
Define the scope of work and
key responsibilities of Analyst
Endpoint security.
List the work priorities of
Analyst endpoint security
within the peripherals of the
organization’s policy
Analyze and create a
document of expected skills
from Analyst Endpoint
security.
Provide immediate support to
staff for maintaining security
regulations in organizations.
Create/ draw a career path in
the field of information/ cyber
security.
Whiteboard and Markers
Chart paper and sketch pens
Lab equipped with the following:
PCs/Laptops
Internet with Wi-Fi (Min 2
Mbps Dedicated)
4 Fundamentals of Endpoint Security
Theory Duration
(hh:mm) 06:00
Practical Duration
(hh:mm) 23:00
Corresponding NOS Code SSC/N0912
Establish the context and
scope of the endpoint devices
for maintaining the security
posture of an organization.
Compare various endpoint
security products in
accordance with the
mentioned functionalities and
features.
Carry out assessment process
for the required
data/information.
Report any unresolved
anomalies security
architecture to appropriate
people in the organization.
Carry out configuration
reviews of Endpoint systems
using automated tools, where
required.
Whiteboard and Markers
LCD Projector and Laptop for
presentations
Lab with key devices, software,
and hardware in a large network.
Should include but not be limited
to- application of multiple
networking topology; use of
various Network Protocols;
Desktop computer; Smartphone;
Tablet (tablet PC); Thin client
(lean client); Printer; the need of
endpoint; benefits of endpoint etc.
Analyst Endpoint Security 4
5 Threats and Vulnerability
Theory Duration
(hh:mm) 7:00
Practical Duration
(hh:mm) 22:00
Corresponding NOS Code SSC/N0912
Establish the scope of the
vulnerability assessment for detecting
threats and security issues.
Carry out vulnerability assessment to
detect the emerging threats and
vulnerabilities in the existing systems.
Monitor systems and apply controls
in line with the security policy to apply
countermeasures against attack
vectors.
List various types of threat vectors
along with their characteristics to
mitigate them in the future.
Obtain advice and guidance on
emerging issues and advancements
in the attacker’s motivation from
appropriate people, where required.
Analyze and operate in the direction
to comprehend the capability of an
attacker for maintaining system
security.
List the action items must be
performed in case of any security
incident and prioritize them
accordingly.
Whiteboard and markers
LCD projector and laptop for
presentations
Provision for online research in
the lab for all students
At least two subject matter
experts from the industry in the
field of endpoint security
The demo for providing
security to the endpoint
devices.
6 Endpoint Security System Functionality
Theory Duration
(hh:mm) 10:00
Practical Duration (hh:mm) 24:00
Corresponding
NOS Code
SSC/N0912
Establish and explain the layered
working of endpoint security platform
in an organization.
Record, classify and prioritize the
security events to be analyzed
through BYOD.
Access organization’s knowledge
base for information on previous
security incidents and how they were
managed.
Carry out procedures for threat
detection and mitigation as per their
occurrences in the organization.
Analyze the endpoint security
maturity in accordance with the
existing endpoint devices in an
organization.
Contrast and Compare traditional vs.
continuous endpoint security
compliance models for building a
robust security posture.
Whiteboard and markers
LCD projector and laptop for
presentations
Provision for online research in
the lab for all students
Open source code scanning
tools and their tutorials
Access to secure and
unsecured devices for
endpoint security testing
activities
Access to public databases
and vulnerability sharing clubs,
e.g., Bugtraq
National Institute of Standards
and Technology (NIST) NVB,
United States Computer
Emergency Readiness Team
(US-CERT)
Analyst Endpoint Security 5
Recommend some value addition
points in contrast to the next-
generation endpoint security solution.
7 Endpoint Security Measures
Theory Duration
(hh:mm) 08:00
Practical Duration
(hh:mm) 26:00
Corresponding
NOS Code
SSC/N0912
Identify the Endpoint devices to be
installed/configured/ and
troubleshoot by following the
instructions and guidelines.
Install/configure Endpoint devices as
per instructions and guidelines.
Resolve security issues by following
the defined procedure.
Investigate the installed/configured
Endpoint devices by following
instructions and guidelines
Provide reports for troubleshooting,
configurations, and deployment
using standard templates and tools.
Work within the individual’s scope of
work for installing and configuring the
security devices in adherence to the
organization’s regulations.
Whiteboard and markers
LCD projector and laptop for
presentations
Provision for online research in
the lab for all students
Access to a list of
vulnerabilities and exposures
identified in the application by
participants in the activities of
the previous topic.
Open source tools in the field
of endpoint security for the
above-mentioned activities
Provision for online research
for all participants
Provision of software, such as
word processors,
spreadsheets, etc. for
preparing reports for all
participants.
8 Security Solutions for Endpoint Devices
Theory Duration (hh:mm) 07:00
Practical Duration
(hh:mm) 23:00
Corresponding
NOS Code
SSC/N0912
Identify the best encryption
technique out of various options
available as per the organization’s
policy.
Contrast and compare the benefits of
drive encryption versus file
encryption for data/information
security.
Prioritize the events and processes
required for maintaining devices
security.
Recommend best practices for
managing internet and browser
security.
Obtain an understanding of mobile
phone hardening for safeguarding
against emerging threats and
vulnerabilities.
Analyze the importance of cloud
security and suggest some security
solutions for maintaining the same.
Whiteboard and markers
LCD projector and laptop for
presentations
Provision for online research
in the lab for all students
Access to free OWASP tools
and methods and their
tutorials
Analyst Endpoint Security 6
Recommend safeguarding
techniques and secure configuration
of the firewall for maintaining the
security posture of an organization.
9 Protection of Endpoint Devices and Networks
Theory Duration
(hh:mm) 06:00
Practical Duration
(hh:mm) 27:00
Corresponding
NOS Code
SSC/N0913
Analyze network security and prioritize
safeguarding events accordingly.
Contrast the benefits of using network
security methodologies.
Recommend threat mitigation solution
to provide a secure infrastructure.
Contrast the importance of patch
management process for security
against ever-evolving threats.
Align the network priorities in
accordance with the existing endpoint
devices and configure them securely
for maintaining a robust security
solution.
Whiteboard and markers
LCD projector and laptop for
presentations
Provision for online research
in a lab for all students
Access to free OWASP tools
and methods and their
tutorials
10 Basics of Safeguarding Resources
Theory Duration
(hh:mm) 07:00
Practical Duration
(hh:mm) 24:00
Corresponding NOS Code SSC/N0913
Analyze various safeguarding
techniques for endpoint devices.
Align with password security and one-
time passwords.
Compare different techniques for
maintaining password security against
emerging attacks.
Identify various regulatory compliance
and global standards along with the
industry’s best practices for better
security management.
Align the organization’s security
posture with industry best practices.
Whiteboard and markers •
LCD projector and laptop for
presentations
Lab with provision for online
research
Analyst Endpoint Security 7
11 Lab Installation
Theory Duration
(hh:mm) 05:00
Practical Duration
(hh:mm) 30:00
Corresponding NOS Code SSC/N0913
Define the objective and
scope of the Manage
engine desktop central
tool.
Investigate the installation
process of Manage
Engine Desktop Central
as defined.
Install/ configure the
secure USB in Windows
Define steps for
configuring a firewall in an
organization’s network
Document the process
involved in installing and
configuring security
software.
Whiteboard and markers
LCD projector and laptops for
making presentations
Provision for online research in a
lab for all students
Undertake research on various
tools generating VA-PT reports
Hardware requirements:
Processor (CPU): Core i3 3.0 GHz
Memory (RAM): 4 GB
Hard Drive: 150 GB of free hard
disk drive space
Internet Connectivity: 2mbps (min)
Bandwidth Required
Local Network connectivity:
Required
DVD or USB port: Required
Software requirements:
Operating Systems: Win 10 (64 Bit)
setup
Supported Software’s:Net, SQL
Server, PHP,
Supported Browsers: IE v10,
Google Chrome v54 or better
12 Manage your work to meet requirements
Theory Duration
(hh:mm) 20:00
Practical Duration
(hh:mm) 25:00
Corresponding
NOS Code
SSC/N9001
Establish and agree with
your work requirements
with appropriate people.
Keep your immediate work
area clean and tidy.
Utilize your time effectively.
Treat confidential
information correctly
Work in line with your
organization’s policies and
procedures.
Work within the limits of
your job role.
Obtain guidance from
appropriate people, where
necessary.
Ensure your work meets
the agreed requirements
Whiteboard and Markers
LCD Projector and Laptop for
presentations
Training organization’s confidentiality
policy
Analyst Endpoint Security 8
13 Work effectively with colleagues
Theory Duration
(hh:mm) 20:00
Practical Duration
(hh:mm) 25:00
Corresponding
NOS Code
SSC/N9002
Communicate with
colleagues clearly,
concisely and accurately.
Work with colleagues to
integrate your work
effectively with theirs.
Pass on essential
information to colleagues
in line with organizational
requirements.
Work in ways that show
respect for colleagues.
Carry out the
commitments you have
made to colleagues.
Let colleagues know in
good time if you cannot
carry out your
commitments, explaining
the reasons.
Identify any problems you
have working with
colleagues and take the
initiative to solve these
problems.
Follow the organization’s
policies and procedures
for working with
colleagues.
Whiteboard and Markers
LCD Projector and Laptop for
presentations
Provision to write emails and send
in the lab
Lab with provision for internet,
email, word processor and
presentation software
Chart paper, markers, picture
magazines, and old newspapers
14 Maintain a healthy, safe and secure working environment
Theory Duration
(hh:mm) 20:00
Practical Duration
(hh:mm) 25:00
Corresponding
NOS Code
SSC/N9003
Comply with your
organization’s current
health, safety and security
policies and procedures.
Report any identified
breaches in health, safety,
and security policies and
procedures to the
designated person.
Identify and correct any
hazards that you can deal
with safely, competently
and within the limits of
your authority.
Report any hazards that
you are not competent to
Whiteboard and Markers
LCD Projector and Laptop for
presentations
The training organization’s current
health, safety and security policies
and procedures
Provision for online research in the
Lab
A sample health and safety policy
document
Emergency broadcast system and
mock emergency signage in the
appropriate areas of the training
institute
Analyst Endpoint Security 9
deal with to the relevant
person in line with
organizational procedures
and warn other people
who may be affected.
Follow your organization’s
emergency procedures
promptly, calmly, and
efficiently.
Identify and recommend
opportunities for improving
health, safety, and
security to the designated
person.
Complete any health and
safety records legibly and
accurately.
15 Provide data/information in standard formats
Theory Duration
(hh:mm) 20:00
Practical Duration
(hh:mm) 25:00
Corresponding
NOS Code
SSC/N9004
Establish and agree with
appropriate people the
data/information you need
to provide, the formats in
which you need to provide
it, and when you need to
provide it.
Obtain the
data/information from
reliable sources.
Check that the
data/information is
accurate, complete and
up-to-date.
Obtain advice or guidance
from appropriate people
where there are problems
with the data/information.
Carry out rule-based
analysis of the
data/information, if
required.
Insert the data/information
into the agreed formats.
Check the accuracy of
your work, involving
Whiteboard and Markers
LCD Projector and Laptop for
presentations
Provision for online research in the
lab
Analyst Endpoint Security 10
colleagues where
required.
Report any unresolved
anomalies in the
data/information to
appropriate people.
Provide complete,
accurate and up-to-date
data/information to the
appropriate people in the
required formats on time.
16 Develop knowledge, skills and competence
Theory Duration
(hh:mm) 20:00
Practical Duration
(hh:mm) 25:00
Corresponding NOS Code
SSC/N9005
Obtain advice and
guidance from appropriate
people to develop your
knowledge, skills, and
competence.
Identify accurately the
knowledge and skills you
need for your job role.
Identify accurately your
current level of
knowledge, skills and
competence and any
learning and development
needs.
Agree with appropriate
people a plan of learning
and development activities
to address your learning
needs.
Undertake learning and
development activities in
line with your plan.
Apply your new
knowledge and skills in
the workplace, under
supervision.
Obtain feedback from
appropriate people on
your knowledge and skills
and how effectively you
apply them.
Review your knowledge,
skills, and competence
Whiteboard and Markers LCD
Projector and Laptop for
presentations
Provision for online access to all
students in the lab
Questionnaire and key for Honey
and Mumford learning styles
Analyst Endpoint Security 11
Regularly and take
appropriate action.
Total Duration:
Theory Duration
170:00
Practical
Duration
330:00
Unique Equipment Required:
Whiteboard and Markers
LCD Projector and Laptop for presentations
Chart paper
Lab equipped with the following: PCs/Laptops and Internet with
WiFi (Min 2 Mbps Dedicated), provision for email, word
processor and presentation software.
CRM application, such as Siebel, Zoho, Social networking tool
/ LMS tool to enable blog posts or discussion board, Instant
messenger, chat and email tools to enable mock exercises
A sample health and safety policy document, Emergency
broadcast system and mock emergency signage in the
appropriate areas of the training institute
Grand Total Course Duration: 500 Hours, 0 Minutes
(This syllabus/ curriculum has been approved by SSC: IT-ITeS Sector Skills Council NASSCOM)
Analyst Endpoint Security 12
Trainer Prerequisite for Job role: “Analyst Endpoint Security” mapped to Qualification Pack: “SSC/Q0905 v1.0”
Sr. No.
Area
Details
1 Description To deliver accredited training service, mapping to the curriculum detailed above, in accordance with the Qualification Pack “SSC/Q0905, V1.0”.
2 Personal Attributes
Aptitude for conducting training, and pre/ post work to ensure competent, Employable candidates at the end of the training. Strong communication skills, interpersonal skills, ability to work as part of a team; a passion for quality and for developing others; well-organized and focused, eager to learn and keep oneself updated with the latest in this field.
3 Minimum Educational Qualifications
Diploma in IT/Computer
4a Domain Certification
Certified for job role “Analyst Endpoint Security” mapped to Qualification Pack “SSC/Q0905” Version 1.0. The minimum accepted score is 80%
4b Platform Certification
Recommended that the trainer is certified for the Job Role “Trainer” mapped to the Qualification Pack “MEP/Q0102”. The minimum accepted score is 80% aggregate.
5 Experience 0-2 years of work experience/internship in security.
Analyst Endpoint Security 13
Assessment Criteria
Job Role Analyst Endpoint Security
Qualification Pack SSC/Q0905, V1.0
Sector Skill Council IT-ITeS
Sr. No.
Guidelines for Assessment
1 Criteria for assessment for each Qualification Pack (QP) will be created by the Sector Skill Council (SSC). Each performance criteria (PC) will be assigned Theory and Skill/Practical marks proportional to its importance in NOS.
2 The assessment will be conducted online through assessment providers authorized by SSC.
3 Format of questions will include a variety of styles suitable to the PC being tested such as multiple-choice questions, fill in the blanks, situational judgment test, simulation and programming test.
4 To pass a QP, a trainee should pass each individual NOS. Standard passing criteria for each NOS is 70%.
5 For the latest details on the assessment criteria, please visit www.sscnasscom.com.
6 In case of successfully passing only certain number of NOS's, the trainee is eligible to take subsequent assessment on the balance NOS's to pass the Qualification Pack.
Analyst Endpoint Security 14
Assessment
Outcomes
Assessment Criteria for Outcomes
Total
Marks
(700)
Out of
Marks Allocated
Theory Skills Practical
1. SSC/N0912 PC1. Verify the scope of endpoint assets
(Troubleshoot and maintain
and components to be monitored with authorized persons.
4 1 3
endpoint security in an enterprise environment)
100
PC2. Participate in the day, evening or overnight security operations center shift schedule.
4
1
3
PC3. Receive shift handover along with
relevant information, authorities, and 4 1 3 instructions.
PC4. Verify that endpoint security client 3 1 2
are online and functional.
PC5. Obtain reports and notifications
from the endpoint security tool and respond as per laid out the process for
3 1 2
the same.
PC6. Use reports and logs to identify
security problems and monitor status and security events.
4 1 3
PC7. Interpret the results of reports and
determine the priorities and actions to take to remediate the situation.
4 2 2
PC8. Respond to endpoint security client
messages and apply a solution 4 2 2 accordingly.
PC9. Monitor and troubleshoot an
endpoint security environment, its security management tools, and client
4 1 3
content delivery.
PC10. Monitor and troubleshoot
protection and communication technologies using basic troubleshooting
4 1 3
and other monitoring tools.
PC11. Troubleshoot and remediate a
virus outbreak or client installation 4 1 3 failures.
PC12. Enable debugging and gather logs 4 1 3
for technical support use.
PC13. Identify and prevent false 4 1 3
positives.
PC14. Upgrade and maintain the
endpoint security environment and 4 1 3 clients.
PC15. Manage clients through 4 1 3
groups/locations.
Analyst Endpoint Security 15
PC16. Manage and apply policies such as virus and spyware protection policies, firewall policies, intrusion prevention policies, application and device control policies, update policies, and centralized exception policies.
5
2
3
PC17. Update products and content as per specifications received.
4 2 2
PC18. Check client status in the endpoint security manager.
4
1
3
PC19. Perform client deployment manager optimizations.
4
2
2
PC20. Create application and device control and firewall rules.
5
2
2
PC21. Use IT analytics to generate comprehensive reports from Endpoint Protection.
4
1
3
PC22. Collaborate with others to resolve information technology issues that are beyond own capabilities or job profile.
4
1
3
PC23. Report the results of the monitoring, ticket raising and ticket closure activities using standard documentation following organizational Procedures.
4
1
3
PC24. Comply with relevant legislation, standards, policies, and procedures.
4
1
3
PC25. Maintain a knowledge-base of the known problems and action taken for the same.
4
1
3
Total 100 31 69
2. SSC/N0913
(Assist in the installation of endpoint security measures)
PC1. Receive instructions from an authorized source for the task(s) to be performed for installation of endpoint security tool on the server of the client endpoint.
100
4
1
3
PC2. Install a management console on a server to help manage clients, product licenses and logs as per specifications provided.
6
2
3
PC3. Create a database containing settings, privileges, events and security policies as per specifications.
5
2
3
PC4. Integrate the tool with directory services or LDAP. 4 1 3
PC5. Manage the endpoint security tools database settings as per instructions provided.
4
1
3
Analyst Endpoint Security 16
PC6. Activate the product with the appropriate license or serial number.
4 1 3
PC7. Create and manage administrator accounts in the Endpoint Security Manager Console.
6
2
4
PC8. Install and configure Linux clients on the endpoint security manager tool.
5 2 3
PC9. Configure Endpoint security replication, load balancing, and failover as per instructions provided.
5
2
3
PC10. Configure and implement Endpoint Protection domains as per instructions provided.
5
2
3
PC11. Start and navigate the endpoint protection manager.
4
1
3
PC12. Perform endpoint security console authentication.
5 2 3
PC13. Install software on client computers and devices, either directly or across the network as per instructions provided.
5
2
3
PC14. Configure clients for client software updates (automatic or pushed from the server) and virus definition updates, at a minimum.
4
1
3
PC15. Distinguish between client-mode and user-mode.
4 1 3
PC16. Install managed clients as per instructions provided. 4 1 3
PC17. Configure an unmanaged detector as per instructions provided.
4
1
3
PC18. Configuring endpoint protection clients to use Secure Socket Layer (SSL) communication.
5
2
3
PC19. Collaborate with others to resolve information technology issues that are beyond own capabilities or job profile.
5
1
4
PC20. Report the results of the monitoring, ticket raising and ticket closure activities using standard documentation following organizational procedures.
4
1
3
PC21. Obtain help or advice from the specialist if the problem is outside his/her area of competence or experience.
4
1
3
PC22. Comply with relevant legislation, standards, policies, and procedures.
4
1
3
Total 100 31 69
Analyst Endpoint Security 17
3. SSC/N9001
(Manage your work to meet requirements)
PC1.Establish and agree your work requirements with appropriate people.
7 0 7
PC2. Keep your immediate work area clean and tidy.
12
6
6
PC3. Utilize your time effectively. 12 6 6
PC4. Use resources correctly and efficiently.
19
6
13
PC5. Treat confidential information correctly.
100
7
1
6
PC6. Work in line with your
Organization’s policies and procedures.
12
0
12
PC7. Work within the limits of your job role.
6
0
6
PC8. Obtain guidance from appropriate people, where necessary.
6
0
6
PC9. Ensure your work meets the agreed requirements.
19
6
13
Total 100 25 75
4. SSC/N9002
(Work effectively with colleagues)
PC1. Communicate with colleagues clearly, concisely and accurately.
20
0
20
PC2. Work with colleagues to integrate your work effectively with theirs.
10
0
10
PC3. Pass on essential information to colleagues in line with organizational requirements.
10
10
0
PC4. Work in ways that show respect for colleagues.
100
20 0 20
PC5. Carry out commitments you have made to colleagues. 10 0 10
PC6. Let colleagues know in good time if you cannot carry out your commitments, explaining the reasons.
10
10
0
PC7. Identify any problems you have working with colleagues and take the initiative to solve these problems.
10
0
10
PC8. Follow the organization’s policies and procedures for working with colleagues.
10
0
10
Total 100 20 80
5. SSC/N9003
(Maintain a healthy, safe
PC1. Comply with your organization’s current health, safety and security policies and procedures.
100
20
10
10
Analyst Endpoint Security 18
and secure working environment)
PC2. Report any identified breaches in health, safety, and security policies and procedures to the designated person.
10
0
10
PC3. Identify and correct any hazards that you can deal with safely, competently and within the limits of your authority.
20
10
10
PC4. Report any hazards that you are not competent to deal with to the relevant person in line with organizational procedures and warn other people who may be affected.
10
0
10
PC5. Follow your organization’s emergency procedures promptly, calmly, and efficiently.
20
10
10
PC6. Identify and recommend opportunities for improving health, safety, and security to the designated person.
10
0
10
PC7. Complete any health and safety records legibly and accurately.
10
0
10
Total 100 30 70
6. SSC/N9004
(Provide data/information in standard formats)
PC1. Establish and agree with appropriate people the data/information you need to provide, the formats in which you need to provide it, and when you need to provide it.
13
13
0
PC2. Obtain the data/information from reliable sources.
13 0 13
PC3. Check that the data/information is accurate, complete and up-to-date.
12 6 6
PC4. Obtain advice or guidance from appropriate people where there are problems with the data/information.
6
0
6
PC5. Carry out rule-based analysis of the data/information, if required.
100 25 0 25
PC6. Insert the data/information into the agreed formats.
13 0 13
PC7. Check the accuracy of your work, involving colleagues where required.
6 0 6
PC8. Report any unresolved anomalies in the data/information to appropriate people.
6
6
0
PC9.Provide complete, accurate and up-
to-date data/information to the
Appropriate people in the required formats on time.
6 0 6
Total 100 25 75
Analyst Endpoint Security 19
7. SSC/N9005
(Develop your knowledge, skills and competence)
PC1. Obtain advice and guidance from appropriate people to develop your knowledge, skills, and competence.
10
0
10
PC2. Identify accurately the knowledge and skills you need for your job role.
10
0
10
PC3. Identify accurately your current level of knowledge, skills and competence and any learning and development needs.
20
10
10
PC4. Agree with appropriate people a plan of learning and development activities to address your learning needs.
100
10
0
10
PC5. Undertake learning and development activities in line with your plan.
20
10
10
PC6. Apply your new knowledge and skills in the workplace, under supervision.
10 0 10
PC7. Obtain feedback from appropriate
people on your knowledge and skills and
How effectively you apply them.
10 0 10
PC8. Review your knowledge, skills, and
competence regularly and take
Appropriate action.
10 0 10
Total 100 20 80
Grand Total 700 700