INFORMATION TECHNOLOGY PROGRAMS
Level 4 Diploma in Cyber Security
Course Overview
Level 4 Diploma in Cyber Security equips learners with critical knowledge and skills for identifying, managing, and responding to cyber threats and risks. Designed for those already in business or IT-related roles, this qualification blends cyber-technical and cyber-physical topics to build holistic understanding. It prepares learners to secure networks, systems, and data while navigating legal, strategic, and organisational dimensions of cybersecurity. The course is particularly well-suited for professionals responsible for data, risk, and security management across international or complex digital environments.
Entry Requirements
This course is suitable for:
Learners with relevant Level 3 qualifications
Those with professional experience in IT, business, or security roles who demonstrate ambition and clear career goals
Individuals aiming to build a structured foundation in cyber security and risk management
Learners with no technical background are encouraged to first complete the QUALIFI Level 3 Diploma in Cyber Security Management and Operations.
Qualification Structure
Learners must complete six units to achieve the full qualification – five mandatory units and one elective unit.
Each Level 4 unit is worth 20 credits; Level 5 electives (for advanced learners) are worth 30 credits.
The full diploma totals 120 credits.
Mandatory Units (Level 4):
Cyber Security Threat and Risk
-What are ‘threat’ and ‘risk’ in a computer security environment?
-Cyber security, current attack trends, methods and terminology
-Case studies in ‘mega breaches’, malware and ransomware attacks: what can we learn?
-Security and risk assessment: models and how to conduct analysis, including those recommended
by ISO and NIST
-Cyber Threat Intelligence: Directing, Analysing, Disseminating, Action-On
-Business Impact Analysis
Network Security and Data Communications
-Network principles and protocols, security and systems resilience tools
-Security Engineering: Access controls, the CIA triad, systems hardening
-Software development and how it relates to cyber security risks
-Web applications and how they relate to risk
-Other key methods of malicious network attack
-Preventing and mitigating network attacks
-Cyber Resilience: Change Management and Configuration Management
Database Security and Computer Programming
-Database security breach types
-How various types of databases organise data, including the Grandfather-Father-Son model of
Disaster Recovery
-Categories of control and the Anderson Rule
-Case studies in big data organisation and breach incidents
-Impact and utility of Cloud-based approaches
-Differences between compiled and interpreted programming languages
-Symbiotic relationship between developments in computer programming skills and hacking
-Introduction to understanding a popular programming language (Python)
Incident Response, Investigations and Forensics
-CERTS: how to build the right teams to respond
-Incident Response: structure, people, scope
-Reporting and recording IR activity
-Aligned disciplines: Business Continuity Management, Disaster Recovery and Crisis Management
-Legal and ethical principles and computer network investigations
-Principles of forensic science and digital forensics
-Evidence handling: concepts, protocols and tools
Security Strategy: Laws, Policies and Implementation
-Strategic management, and how it applies to cyber security environments
-Cyber security policies and planning
-Legal, regulatory and standards bodies
-Training and further development – standards and training
-Future legal and technical environment and a range of national and international approaches
-Design a security audit
Elective Units (choose one):
Level 4 Electives
Cyber Security Threats and Risk: Banking and Finance
-Threats and risks to Banking and Finance institutions and processes
-Case studies in banking and finance cyber-crime: TinyBanker Trojan (tinba), Zeus, Carbanak, inter
alia
-Legal, regulatory requirements and standards
-The Payment Card Industry Data Security Standards suite
-Cyber security and cryptocurrencies
Cyber Wars
-What do we mean by cyber or information ‘warfare’ and where might such heightened risks exist?
-Strategy, methods and motivations behind state-sponsored/encouraged cyber conflict/war
-Concepts and approaches to geopolitics
-Case studies in business communities and private sector responses
-Case studies in CNI and sector responses
-Remediation and DR strategies for mass-disruption scenarios
Key Outcomes
Upon completing the course, learners will:
Understand and analyse cyber threats across technical and physical domains
Apply risk management frameworks to real-world scenarios
Conduct digital investigations and respond to incidents
Build secure network systems and safeguard data assets
Develop and implement effective security strategies aligned with legal and organisational standards
Demonstrate communication, leadership, and project management skills in a cyber security context
Appreciate global cyber risks and diverse business environments.
Duration and Delivery
Duration: Typically completed in 6 to 12 months
Delivery: Online or blended learning, including interactive lectures, case studies, workshops, and practical exercises
Assessment and Verification
Each unit is assessed through work-based assignments, reflective exercises, and project-based tasks
Learners must demonstrate practical understanding, critical thinking, and application of theory to real organisations
Assignments address all learning outcomes and assessment criteria
Internal assessment and moderation by centres; external quality assurance by QUALIFI ensures consistency and rigour.
Progression Opportunities
Learners who complete the Level 4 Diploma in Cyber Security can:
Progress to the QUALIFI Level 5 Extended Diploma in Cyber Security
Enter into relevant undergraduate degree programmes with advanced standing
Advance in careers such as IT Security Analyst, Risk Officer, Security Consultant, or Cyber Security Specialist
Pursue further professional development or certifications in cyber security and risk management