DACUM Panel
1. Soomaiya Hamid
Lecturer, Jinnah University
Occupational Profile
for Women, Karachi
Chart
2. Dr. Aqsa Aslam
Assistant Professor,
Computer Science, FAST-
NUCES, Karachi
Of
3. Dr. Khalid Rasheed
Assistant Professor and
Program Manager for
“Cybersecurity”
Graduate Programs,
SZABIST, Karachi
4. Qazi Nauman Mujahid
CEO, Digitech infra and
Cybersecure11,
Karachi
5. Engr. Ali Anwaar, HOD
Computer Department, GCT Date
Faisalabad
6. Hafiz Muhammad Attaullah 21st- 25th April, 2025
Team Lead Offensive
Security Department,
Nanotectx, Karachi
7. Amna Emaan
Cybersecurity Lead, MLSA
FAST-NU, Karachi
NAVTTC HQ, Islamabad, Pakistan
8. Hussein Hassanali
Managing Partner & Principal
Consultant, Strata
Consulting,
Karachi
DACUM Facilitator:
Muhammad Abdul Moeez
Civil Engineer, Lahore
National Vocational & Technical
Training Commission
OP Chart for Cybersecurity
“Cybersecurity”
DUTIES and TASKS
A. Perform Basic Communication
A1. A2. A3. A4.
Communicate in a team Follow Supervisor’s Develop interpersonal Arrange meetings at
to achieve target instructions as per Skills workplace
outcomes organizational SOPs
B. Comply Personal Health and Safety Guidelines
B1. B2. B3.
Identify hazards at Comply with Follow emergency
workplace Occupational Safety and procedures at workplace
Health (OSH)
C. Develop Logical Thinking and Problem-Solving Skills
C1. C2. C3. C4. Learn the basics of
Use logical operators Solve basic logical Write pseudocode for algorithms
puzzles basic tasks
D. Perform Basic Computer Operations
D1. D2. D3. D4.
Perform basic Perform Software Demonstrate computer Perform basic
configuration of Installation and internet use cases. documentation and
computer system presentation skills using
MS Office
D5. D6.
Manage Electronic Mail Apply Cyber Security
Best Practices
E. Perform Linux Operating System Prerequisite
E1.
E2. E3.
Install Linux Operating
Use Basic Linux E4.
Execute Linux Shell
System with post Manage Linux Storage
Operations Networking
configuration
E5. E6. E7.
Manage Linux System Implement Basic Web Manage Basic
Services using Systemd Server Databases
F. Perform Basic Computer Networking
OP Chart for Cybersecurity
F1. F2. F3. F4.
Create computer Configure IP addressing Implement TCP/IP Configure Router,
network topologies and subnetting models Switches, and end-
devices
F5. F6.
Apply computer network Perform basic network
protocols troubleshooting
G. Apply Information Security Operations
G1. G2. G3. G4.
Apply CIA Apply encryption Apply hashing Apply AAA
(Confidentiality, techniques techniques (Authentication,
Integrity, and Authorization, and
Availability) Accounting)
H. Perform Network and System Security Tasks
H1. H2. H3. H4.
Analyze network traffic Configure firewall Rules Establish VPN Apply security rules on
for vulnerability and and Policies Connections routers, switches, and
threats detection endpoints
H5.
Configure Operating
System security settings
I. Perform Secure Shell-Scripting/Programming
I1. I2. I3.
Develop scripts to Debug Scripting and Modify programming
automate cybersecurity Program Logic Flaws logics for secure
tasks operation
J. Operate Security Operation Centre (SOC)
J1. J2. J3. J4.
Monitor system logs and Investigate suspicious Implement incident Create security incidents
alerts for potential activities response procedures reports
threats
K. Perform Digital Forensics
K1. K2. K3. K4.
OP Chart for Cybersecurity
Acquire Digital Evidence Preserve the integrity of Analyze digital evidence Create document of
collected evidence using forensic tools findings from forensic
investigations
L. Evaluate Governance, Risk and Compliance (GRC)
L1. L2. L3. L4.
Apply compliance Analyze internal audits Evaluate organizational Ensure up-to-date policy
frameworks and assessments risk management documentation
initiatives
M. Perform Vulnerability Assessment Penetration Testing (VAPT)
M1. M2. M3. M4.
Perform Perform vulnerability Perform exploitation Analyze Vulnerability
Reconnaissance assessment vulnerabilities ethically Risk Impact
M5.
Create Pentest Report
N. Apply Application Security (AppSec)
N1. N2. N3. N4.
Perform Enumeration Identify Application Perform Design Review Perform Implementation
Vulnerability Review
N5.
Perform Operational
Review
O. Create Portfolios on Social Platforms
O1. O2. O3. O4.
Create a Facebook
Upload Portfolio Content Create a Facebook Join Facebook Groups
Page
on Facebook Group for Freelancers
O5. O6. O7. O8.
Create Profile on
Upload Portfolio content Create LinkedIn profile, Create LinkedIn Group
Instagram
on Instagram company page and
showcase page
O9. O10.
Join LinkedIn Groups
Create Profile on
for Freelancers
Capture the Flag (CTF)
Platforms
P. Develop Freelancing proficiency on Digital Platforms
OP Chart for Cybersecurity
P1. P2. P3. P4.
Create Profile on Fiver
Create Gigs on Fiver Create Profile on Create Project on
and Link social media &
Upwork and Link social Upwork
Portfolio to Profile
media & Portfolio to
Profile
P5. P6. P7.
Create Proposal to
Create Profile on Perform Project Hunting
Apply for Jobs
HackerOne on HackerOne
Q. On-Job-Training
OP Chart for Cybersecurity
Additional Information for Cybersecurity
Worker traits Entry Duration of training Special Requirements
Critical Thinker Requirements for required. Motivational Lectures
Devoted/motivated Trainees 42 Credit Hours Success Stories
Honest
Must have
Punctual
Secondary School Career Path
Analytical skills
Certificate or
Knowledgeable
Equivalent
Creative 1. Cybersecurity Analyst
Hard worker 2. Junior Pentester
Smart worker 3. Cybersecurity Engineer
Entry
Teamwork 4. GRC Analyst
Collaborative Requirements for
5. Information security Officer
Confident Trainer
6. Vulnerability Analyst
Competent
Innovative
7. Ethical Hacker
Bachelor’s degree
Communicative Skills
in IT or related or
International Certifications
a recognized
cybersecurity
1. CompTIA Security+ (SY0-
international
701) by CompTIA
industrial
2. Certified Ethical Hacker
certification (e.g.,
(CEH) (312-50) by EC-
Security+, CEH,
Council
ISO 27001, CCNA
3. Microsoft SC-900 (SC-900)
Sec., OSCP) field
by Microsoft
with at least 5
4. CyberOps (CBROps 200-
years of relevant
201) by Cisco
industry
5. Network Security (350-701)
experience.
by Cisco
Teaching or
6. Certified in Cybersecurity
facilitation
(CC) by ISC2
experience
preferred.
*Interview panel will
assess the candidates
on a pre-defined criteria
set by NAVTTC and
partner institutes.
OP Chart for Cybersecurity