ACS' microCredentials | Cyber Security
ACS microCredential Cyber Security has been developed to enable recognition and validation of skills and knowledge across a range of specialisms and function areas within Information/Cyber Security discipline. Each microCredential specialism and level is assessed against the ACS’ microCredential Cyber Security Framework. Five (5) levels of recognition are offered through ACS’ microCredential Cyber Security align to Skills Framework for the Information Age (SFIA) and NICE Framework at the specialism type. The five levels of recognition are:
Bronze – Apply – SFIA Level 3
Silver – Enable – SFIA Level 4
Gold – Ensure and advise – SFIA Level 5
Platinum – Initiate and influence – SFIA Level 6
Diamond – Strategize and Direct – SFIA Level 7
ACS’ microCredentials Cyber Security cover 12 specialisms at five (5) levels of recognition. When choosing the specialism, select the microCredential level of recognition from the microCredentials specialisms listed below. The descriptor for your selection will be provided based on the level of recognition chosen for the specialism. The same level of recognition will apply to the mandatory microCredential of Information security based on your specialism selection. You can proceed with your application for microCredentials Cyber Security.
Risk Management
The planning and implementation of information security risk assessment and management activities in accordance with organisational processes for information security risk assessment and risk management, including the determination of security controls.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------
Security Testing
To conduct security testing and contribute to the determination of the level of resilience of an information system to information security threats and vulnerabilities. Also includes the selection, planning and application of testing methods, including penetration testing.
Development & Architecture
Security development and architecture activities including access management and network security devices for information security architecture. To implement secure development standards and practices for secure software and technical security controls.
Intrusion Detection
Information security intrusion detection and analysis activities including to detect and analyse information security anomalies in information systems and network security systems. Escalate and communicate information security intrusions with internal and external stakeholders.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------
Digital Forensics
The collection, processing, preserving, analysis, and presentation of forensic evidence based on the totality of findings including computer-related evidence in support of security vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------