| Standard / Competency | 1. | Australian Computer Society - Core Body of Knowledge: 2023 accreditation |
|
Attribute | Assessed | Level | Core ICT Knowledge | |
ICT Infrastructure
| | |
ICT hardware components and organisation: the creation, communication and processing of digital signals using sensors and activators, processors and storage
| | Yes | Intermediate | | |
Network and internetwork concepts and protocols, wireless and mobile computing, cloud and distributed systems
| | Yes | Advanced | | |
Systems software and operating systems managing the architecture
| | Yes | Advanced | |
Application Systems
| | |
Analysis of human activity systems, ontological modelling, specifying organisational and external context of computing systems, impact and user experience analysis
| | Yes | Intermediate | | |
Application context where specifically linked to ICT: Domain attributes (e-health, e-business, transport and logistics, agriculture, e-government, etc), language and cultural factors, users work practices and organisational contexts
| | Yes | Intermediate | |
Cyber Security
| | |
Nature of Cyber Security: forms of attack, prevention, detection, mitigation and repair
| | Yes | Advanced | | |
Information assets to be secured (hardware, networks, software, data) and the different means of securing them, cryptography
| | Yes | Intermediate | | |
Human security roles and behaviours, rights and obligations (privacy)
| | Yes | Intermediate | | |
Cyber Security risk assessment, policy, management and testing, forensics
| | Yes | Advanced | |
ICT Management and Governance
| | |
Fundamental governance principles (strategy development, establishment and monitoring systems for management and policy)
| | Yes | Advanced | Professionalism as it applied in ICT | |
The Professional ICT Practitioner
| | |
Domestic and international law as it applies to ICT
| | Yes | Intermediate | | |
The professional society (the ACS), certification to practise, legal liabilities and indemnity
| | Yes | Intermediate | | |
Continuing professional development, career upskilling, networking
| | Yes | Intermediate |
| 2. | Skills Framework for the Information Age (SFIA): Version 8 |
|
Attribute | Assessed | Level | Strategy and architecture | | Security and privacy | | | SCTY Information security (Levels 3 - 7) Defining and operating a framework of security controls and security management strategies. | | Yes | 2 | | | PEDP Personal data protection (Levels 5 - 6) Implementing and operating a framework of controls and management strategies to promote compliance with personal data legislation. | | Yes | 3 | | | VURE Vulnerability research (Levels 3 - 6) Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and weaknesses. | | Yes | 3 | | Governance, risk and compliance | | | GOVN Governance (Levels 6 - 7) Defining and operating a framework for making decisions, managing stakeholder relationships, and identifying legitimate authority. | | Yes | 3 | | | BURM Risk management (Levels 3 - 7) Planning and implementing organisation-wide processes and procedures for the management of risk to the success or integrity of the enterprise. | | Yes | 3 | | | AUDT Audit (Levels 3 - 7) Delivering independent, risk-based assessments of the effectiveness of processes, the controls, and the compliance environment of an organisation. | | Yes | 3 | Delivery and operation | | Technology management | | | ITOP IT infrastructure (Levels 1 - 5) Deploying, configuring and operating IT Infrastructure. | | Yes | 2 |
|
|