0% found this document useful (0 votes)
44 views6 pages

OP Chart Cybersecurity

The document outlines the DACUM panel members involved in creating an occupational profile for cybersecurity training in Pakistan, detailing their roles and affiliations. It includes a comprehensive chart of duties and tasks required for cybersecurity professionals, covering areas such as communication, health and safety, computer operations, networking, and digital forensics. Additionally, it specifies entry requirements for trainees and trainers, potential career paths, and international certifications relevant to the field.

Uploaded by

Zeshan Bela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views6 pages

OP Chart Cybersecurity

The document outlines the DACUM panel members involved in creating an occupational profile for cybersecurity training in Pakistan, detailing their roles and affiliations. It includes a comprehensive chart of duties and tasks required for cybersecurity professionals, covering areas such as communication, health and safety, computer operations, networking, and digital forensics. Additionally, it specifies entry requirements for trainees and trainers, potential career paths, and international certifications relevant to the field.

Uploaded by

Zeshan Bela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

DACUM Panel

1. Soomaiya Hamid
Lecturer, Jinnah University
Occupational Profile
for Women, Karachi
Chart
2. Dr. Aqsa Aslam
Assistant Professor,
Computer Science, FAST-
NUCES, Karachi
Of
3. Dr. Khalid Rasheed
Assistant Professor and
Program Manager for
“Cybersecurity”
Graduate Programs,
SZABIST, Karachi

4. Qazi Nauman Mujahid


CEO, Digitech infra and
Cybersecure11,
Karachi

5. Engr. Ali Anwaar, HOD


Computer Department, GCT Date
Faisalabad
6. Hafiz Muhammad Attaullah 21st- 25th April, 2025
Team Lead Offensive
Security Department,
Nanotectx, Karachi

7. Amna Emaan
Cybersecurity Lead, MLSA
FAST-NU, Karachi
NAVTTC HQ, Islamabad, Pakistan

8. Hussein Hassanali
Managing Partner & Principal
Consultant, Strata
Consulting,
Karachi

DACUM Facilitator:

Muhammad Abdul Moeez


Civil Engineer, Lahore

National Vocational & Technical

Training Commission

OP Chart for Cybersecurity


“Cybersecurity”

DUTIES and TASKS

A. Perform Basic Communication


A1. A2. A3. A4.
Communicate in a team Follow Supervisor’s Develop interpersonal Arrange meetings at
to achieve target instructions as per Skills workplace
outcomes organizational SOPs

B. Comply Personal Health and Safety Guidelines


B1. B2. B3.
Identify hazards at Comply with Follow emergency
workplace Occupational Safety and procedures at workplace
Health (OSH)
C. Develop Logical Thinking and Problem-Solving Skills
C1. C2. C3. C4. Learn the basics of
Use logical operators Solve basic logical Write pseudocode for algorithms
puzzles basic tasks

D. Perform Basic Computer Operations


D1. D2. D3. D4.
Perform basic Perform Software Demonstrate computer Perform basic
configuration of Installation and internet use cases. documentation and
computer system presentation skills using
MS Office
D5. D6.
Manage Electronic Mail Apply Cyber Security
Best Practices

E. Perform Linux Operating System Prerequisite


E1.
E2. E3.
Install Linux Operating
Use Basic Linux E4.
Execute Linux Shell
System with post Manage Linux Storage
Operations Networking
configuration

E5. E6. E7.


Manage Linux System Implement Basic Web Manage Basic
Services using Systemd Server Databases

F. Perform Basic Computer Networking

OP Chart for Cybersecurity


F1. F2. F3. F4.
Create computer Configure IP addressing Implement TCP/IP Configure Router,
network topologies and subnetting models Switches, and end-
devices
F5. F6.
Apply computer network Perform basic network
protocols troubleshooting

G. Apply Information Security Operations


G1. G2. G3. G4.
Apply CIA Apply encryption Apply hashing Apply AAA
(Confidentiality, techniques techniques (Authentication,
Integrity, and Authorization, and
Availability) Accounting)

H. Perform Network and System Security Tasks

H1. H2. H3. H4.


Analyze network traffic Configure firewall Rules Establish VPN Apply security rules on
for vulnerability and and Policies Connections routers, switches, and
threats detection endpoints

H5.
Configure Operating
System security settings

I. Perform Secure Shell-Scripting/Programming


I1. I2. I3.
Develop scripts to Debug Scripting and Modify programming
automate cybersecurity Program Logic Flaws logics for secure
tasks operation

J. Operate Security Operation Centre (SOC)


J1. J2. J3. J4.
Monitor system logs and Investigate suspicious Implement incident Create security incidents
alerts for potential activities response procedures reports
threats

K. Perform Digital Forensics


K1. K2. K3. K4.

OP Chart for Cybersecurity


Acquire Digital Evidence Preserve the integrity of Analyze digital evidence Create document of
collected evidence using forensic tools findings from forensic
investigations

L. Evaluate Governance, Risk and Compliance (GRC)


L1. L2. L3. L4.
Apply compliance Analyze internal audits Evaluate organizational Ensure up-to-date policy
frameworks and assessments risk management documentation
initiatives
M. Perform Vulnerability Assessment Penetration Testing (VAPT)
M1. M2. M3. M4.
Perform Perform vulnerability Perform exploitation Analyze Vulnerability
Reconnaissance assessment vulnerabilities ethically Risk Impact

M5.
Create Pentest Report

N. Apply Application Security (AppSec)

N1. N2. N3. N4.


Perform Enumeration Identify Application Perform Design Review Perform Implementation
Vulnerability Review

N5.
Perform Operational
Review
O. Create Portfolios on Social Platforms
O1. O2. O3. O4.
Create a Facebook
Upload Portfolio Content Create a Facebook Join Facebook Groups
Page
on Facebook Group for Freelancers
O5. O6. O7. O8.
Create Profile on
Upload Portfolio content Create LinkedIn profile, Create LinkedIn Group
Instagram
on Instagram company page and
showcase page

O9. O10.
Join LinkedIn Groups
Create Profile on
for Freelancers
Capture the Flag (CTF)
Platforms

P. Develop Freelancing proficiency on Digital Platforms

OP Chart for Cybersecurity


P1. P2. P3. P4.
Create Profile on Fiver
Create Gigs on Fiver Create Profile on Create Project on
and Link social media &
Upwork and Link social Upwork
Portfolio to Profile
media & Portfolio to
Profile
P5. P6. P7.
Create Proposal to
Create Profile on Perform Project Hunting
Apply for Jobs
HackerOne on HackerOne
Q. On-Job-Training

OP Chart for Cybersecurity


Additional Information for Cybersecurity
Worker traits Entry Duration of training Special Requirements
 Critical Thinker Requirements for required.  Motivational Lectures
 Devoted/motivated Trainees 42 Credit Hours  Success Stories
 Honest
 Must have
 Punctual
Secondary School Career Path
 Analytical skills
Certificate or
 Knowledgeable
Equivalent
 Creative 1. Cybersecurity Analyst
 Hard worker 2. Junior Pentester
 Smart worker 3. Cybersecurity Engineer
Entry
 Teamwork 4. GRC Analyst
 Collaborative Requirements for
5. Information security Officer
 Confident Trainer
6. Vulnerability Analyst
 Competent
 Innovative
7. Ethical Hacker
 Bachelor’s degree
 Communicative Skills
in IT or related or
International Certifications
a recognized
cybersecurity
1. CompTIA Security+ (SY0-
international
701) by CompTIA
industrial
2. Certified Ethical Hacker
certification (e.g.,
(CEH) (312-50) by EC-
Security+, CEH,
Council
ISO 27001, CCNA
3. Microsoft SC-900 (SC-900)
Sec., OSCP) field
by Microsoft
with at least 5
4. CyberOps (CBROps 200-
years of relevant
201) by Cisco
industry
5. Network Security (350-701)
experience.
by Cisco
Teaching or
6. Certified in Cybersecurity
facilitation
(CC) by ISC2
experience
preferred.

*Interview panel will


assess the candidates
on a pre-defined criteria
set by NAVTTC and
partner institutes.

OP Chart for Cybersecurity

You might also like