
- Lærer: Cadmus Administrator
1 Chief Information Security Officer (CISO): Nej
2. Cyber Incident Responder: Nej
3. Cyber Legal, Policy & Compliance Officer: Nej
4. Cyber Threat Intelligence Specialist: Nej
5. Cybersecurity Architect: Nej
6. Cybersecurity Auditor: Nej
Cybersecurity Educator: Nej
Cybersecurity Implementer: Nej
Cybersecurity Researcher: Nej
Cybersecurity Risk Manager: Nej
Digital Forensics Investigator: Nej
Penetration Tester: Nej
SMEs: Nej
Cybersecurity Professionals: Nej
LMS : Nej
Cyber Range : Nej
SG/TTX: Nej
Bootcamp : Nej
Hackathon : Nej
1 Analyse and comply with cybersecurity-related laws, regulations and legislations: Nej
2 Analyse and consolidate organisation’s quality and risk management practices: Nej
3 Analyse and implement cybersecurity policies, certifications, standards, methodologies and frameworks: Nej
4 Analyse business processes, assess and review software or hardware security, as well as technical and organisational controls: Nej
5 Anticipate cybersecurity threats, needs and upcoming challenges: Nej
6 Anticipate required changes to the organisation’s information security strategy and formulate new plans: Nej
7 Apply auditing tools and techniques: Nej
8 Assess and enhance an organisation’s cybersecurity posture: Nej
9 Assess the security and performance of solutions: Nej
10 Audit with integrity, being impartial and independent: Nej
11 Automate threat intelligence management procedures: Nej
12 Build a cybersecurity risk-aware environment: Nej
13 Build resilience against points of failure across the architecture: Nej
14 Carry out working-life practices of the data protection and privacy issues involved in the implementation of the organisational processes, finance and business strategy: Nej
15 Collaborate with other team members and colleagues: Nej
16 Collect information while preserving its integrity: Nej
17 Collect, analyse and correlate cyber threat information originating from multiple sources: Nej
18 Collect, evaluate, maintain and protect auditing information: Nej
19 Communicate, coordinate and cooperate with internal and external stakeholders: Nej
20 Communicate, explain and adapt legal and regulatory requirements and business needs: Nej
21 Communicate, present and report to relevant stakeholders: Nej
22 Comprehensive understanding of the business strategy, models and products and ability to factor into legal, regulatory and standards’ requirements: Nej
23 Conduct ethical hacking: Nej
24 Conduct technical analysis and reporting: Nej
25 Conduct user and business security requirements analysis: Nej
26 Conduct, monitor and review privacy impact assessments using standards, frameworks, acknowledged methodologies and tools: Nej
27 Configure solutions according to the organisation’s security policy: Nej
28 Coordinate the integration of security solutions: Nej
29 Decompose and analyse systems to develop security and privacy requirements and identify effective solutions: Nej
30 Decompose and analyse systems to identify weaknesses and ineffective controls: Nej
31 Define and apply maturity models for cybersecurity management: Nej
32 Design systems and architectures based on security and privacy by design and by defaults cybersecurity principles: Nej
33 Design, apply, monitor and review Information Security Management System (ISMS) either directly or by leading its outsourcing: Nej
34 Design, develop and deliver learning programmes to cover cybersecurity needs: Nej
35 Develop and communicate, detailed and reasoned investigation reports: Nej
36 Develop code, scripts and programmes: Nej
37 Develop codes, scripts and programmes: Nej
38 Develop cybersecurity exercises including simulations using cyber range environments: Nej
39 Develop evaluation programs for the awareness, training and education activities: Nej
40 Develop, champion and lead the execution of a cybersecurity strategy: Nej
41 Draw cybersecurity architectural and functional specifications: Nej
42 Enable business assets owners, executives and other stakeholders to make risk-informed decisions to manage and mitigate risks: Nej
43 Establish a cybersecurity plan: Nej
44 Explain and communicate data protection and privacy topics to stakeholders and users: Nej
45 Explain and present digital evidence in a simple, straightforward and easy to understand way: Nej
46 Follow and practice auditing frameworks, standards and methodologies: Nej
47 Generate new ideas and transfer theory into practice: Nej
48 Guide and communicate with implementers and IT/OT personnel: Nej
49 Identify and exploit vulnerabilities: Nej
50 Identify and select appropriate pedagogical approaches for the intended audience: Nej
51 Identify and solve cybersecurity-related issues: Nej
52 Identify needs in cybersecurity awareness, training and education: Nej
53 Identify non-cyber events with implications on cyber-related activities: Nej
54 Identify threat actors TTPs and campaigns: Nej
55 Identify, analyse and correlate cybersecurity events: Nej
56 Implement cybersecurity recommendations and best practices: Nej
57 Implement cybersecurity risk management frameworks, methodologies and guidelines and ensure compliance with regulations and standards: Nej
58 Influence an organisation’s cybersecurity culture: Nej
59 Integrate cybersecurity solutions to the organisation’s infrastructure: Nej
60 Lead the development of appropriate cybersecurity and privacy policies and procedures that complement the business needs and legal requirements; further ensure its acceptance, comprehension and implementation and communicate it between the involved parties: Nej
61 Manage and analyse log files: Nej
62 Manage cybersecurity resources: Nej
63 Model threats, actors and TTPs: Nej
64 Monitor new advancements in cybersecurity-related technologies: Nej
65 Motivate and encourage people: Nej
66 Organise and work in a systematic and deterministic way based on evidence: Nej
67 Perform social engineering: Nej
68 Practice all technical, functional and operational aspects of cybersecurity incident handling and response: Nej
69 Propose and manage risk-sharing options: Nej
70 Propose cybersecurity architectures based on stakeholder’s needs and budget: Nej
71 Provide training towards cybersecurity and data protection professional certifications: Nej
72 Review and enhance security documents, reports, SLAs and ensure the security objectives: Nej
73 Review codes assess their security: Nej
74 Select appropriate specifications, procedures and controls: Nej
75 Think creatively and outside the box: Nej
76 Understand legal framework modifications implications to the organisation’s cybersecurity and data protection strategy and policies: Nej
77 Understand, practice and adhere to ethical requirements and standards: Nej
78 Use and apply CTI platforms and tools: Nej
79 Use penetration testing tools effectively: Nej
80 Utilise existing cybersecurity-related training resources: Nej
81 Work ethically and independently; not influenced and biased by internal or external actors: Nej
82 Work on operating systems, servers, clouds and relevant infrastructures: Nej
83 Work under pressure: Nej
