CompTIA
CompTIA is known worldwide as a leading provider of vendor-neutral IT certifications.
CompTIA certifications identify IT professionals who prove their aptitude in various fields, including cyber security, network engineering, systems administration, technical training, project management, infrastructure support and cloud computing. The certifications focus on the skills associated with a candidate’s job role encompassing a wide range of technologies from different vendors which reflects the diverse IT environment of today.
See full definitions of the SFIA skills and levels, click here.
Generic levels of responsibility
SFIA first defines seven generic levels of responsibility, with 5 characteristics (Autonomy, Influence, Complexity, Knowledge and Business Skills) defined at each of the 7 levels within the SFIA structure, with level 1 being the lowest level.
Specific professional skills
On top of the foundation of the generic levels of responsibility characteristics, SFIA also provides definitions for 102 specific professional skills, with each skill being described at one or more of the 7 levels, reflecting the different levels of these skills that are found practiced in the working environment.
For each skill there is an overall definition, supported by differential definitions for each of the levels at which the skill can be recognised.
Mapping between SFIA and CompTIA
For each of the SFIA skills attributed to a CompTIA certification, this document shows the overall skill definition and the differential definition for the appropriate level(s). CompTIA certifications are based upon job roles. Individuals who obtain the CompTIA A+ will have SFIA skills at Level 2 as a minimum, and might be well on the way to Level 3. Other CompTIA certifications are placed higher and in the case of some skills, Level 3 is shown as the probable minimum.
Full definitions of all the levels at which these skills are recognised can be found on the SFIA web site: https://www.sfia-online.org
Mapping of CompTIA qualifications and SFIA skills
The certifications covered below are:
Core: ITF+ A+ Network+ Security+
Infrastructure: Cloud+ Linux+ Server+
Cybersecurity: CySA+ PenTest+ CASP+
Data and Analytics: Data+
Additional Professional: CTT+ Cloud Essentials+ Project+
CompTIA Tech+ (FCO-U71)
Code/level |
Skill name |
Overall description, and Description at the specified level(s) |
ITOP
|
Infrastructure operations Overall definition
Level 1
Level 2 |
Provisioning, deploying, configuring, operating, and optimising technology infrastructure across physical, virtual, and cloud-based environments.
Executes operational procedures, runs automation scripts and performs routine maintenance, installation and monitoring of infrastructure components. |
DBAD |
Database administration Overall definition
Level 2 |
Installing, configuring, monitoring, maintaining databases and data stores, ensuring performance and security while adapting to evolving technologies. |
PROG |
Programming / software development Overall definition
Level 2 |
Developing software components to deliver value to stakeholders. |
HSIN |
Systems installation and removal Overall definition
Level 1
Level 2 |
Installing and testing, or decommissioning and removing, systems or system components.
|
NTAS |
Network support Overall definition
Level 1 Level 2
|
Providing maintenance and support services for communications networks.
|
SCAD |
Security operations Overall definition
Level 1
Level 2
|
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.
|
USUP |
Incident management Overall definition
Level 1
|
Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services. |
PBMG |
Problem management Overall definition
Level 2 Level 3
|
Managing the lifecycle of all problems that have occurred or could occur in delivering a service. |
ASUP |
Application Support Overall Description
Level 2 |
Delivering management, technical and administrative services to support and maintain live applications. Assists with specified maintenance procedures. |
DBDS |
Database Design Overall Description
Level 2 |
Specifying, designing and maintaining mechanisms for storing and accessing data across various environments and
|
A+ Core Series (220-1201 & 1202)
Code/level |
Skill name |
Overall description, and Description at the specified level |
ITOP
|
Infrastructure operations Overall definition
Level 1 Level 2
Level 3 |
Provisioning, deploying, configuring, operating, and optimising technology infrastructure across physical, virtual, and cloud-based environments.
|
NTDS |
Network design Level 2 Level 3 |
Designing communication networks to meet business requirements, ensuring scalability, reliability, security and alignment with strategic objectives. |
HSIN |
Systems installation and removal Overall definition
Level 1 Level 2 Level 3 |
Installing and testing, or decommissioning and removing, systems or system components. |
USUP |
Incident management Level 1 Level 2 Level 3 |
Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services. Prioritises and diagnoses incidents applying agreed procedures and tools. |
NTAS |
Network support Overall definition
Level 1 Level 2 Level 3 |
Providing maintenance and support services for communications networks. |
PBMG |
Problem management Overall definition
Level 2 Level 3 |
Managing the lifecycle of all problems that have occurred or could occur in delivering a service. |
SCAD |
Security operations Overall definition
Level 1 Level 2 |
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity. |
PROG |
Programming/software Overall description Level 2 |
Developing software components to deliver value to stakeholders. |
RFEN |
Radio frequency Level 2 Level 3 |
Designing, installing and maintaining radio frequency based devices and software. |
ASUP |
Application support Level 2 |
Delivering management, technical and administrative services to support and maintain live applications. |
SYSP |
System software administration Overall description Level 2 Level 3 |
Installing, managing and maintaining operating systems, data management, office automation and utility software across various infrastructure environments. |
STMG |
Storage management Overall description Level 2 Level 3 |
Provisioning, configuring and optimising on-premises and cloud-based storage solutions, ensuring data availability, security and alignment with business objectives. |
CIPM |
Organisational change Overall description Level 2 Level 3 |
Planning, designing and implementing activities to transition the organisation and people to the required future |
CHMG |
Change control Level 2 |
Assessing risks associated with proposed changes and ensuring changes to products, services or systems are |
CSMG |
Customer service support Level 1 Level 2 |
Managing and operating customer service or service desk functions. |
DEPL |
Deployment |
Transitioning software from development to live usage, managing risks and ensuring it works as intended. |
IAMT |
Identity and Access Level 1 |
Manages identity verification and access permissions within organisational systems and environments. |
Network+ (N10-009)
Code/level |
Skill name |
Overall description, and Description at the specified level |
NTDS |
Network design Level 2 Level 3 |
Designing communication networks to meet business requirements, ensuring scalability, reliability, security and |
ITOP
|
Infrastructure operations Overall definition
Level 1 Level 2 Level 3 |
Provisioning, deploying, configuring, operating and optimising technology infrastructure across physical, virtual and cloud-based environments.
|
NTAS |
Network support Overall definition
Level 1 Level 2 Level 3 Level 4 |
Providing maintenance and support services for communications networks. |
SCAD |
Security administration Overall definition
Level 1 Level 2 Level 3
|
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity. |
USUP |
Incident management Overall definition
Level 1 Level 2 Level 3 |
Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services.
|
PBMG |
Problem management Level 2 Level 3 |
Managing the lifecycle of all problems that have occurred or could occur in delivering a service. |
HSIN |
Systems installation and removal Level 1 Level 2 Level 3 |
Installing and testing, or decommissioning and removing, systems or system components. Installs or removes system components using supplied installation instructions and tools. |
RFEN |
Radio frequency engineering Overall definition
Level 2
Level 3 |
Designing, installing and maintaining radio frequency based devices and software. Incorporates hardware/firmware modifications. Interprets automatic fault/performance indications and resolves faults down to discrete component level or escalates according to given procedures. |
CHMG |
Change control Level 2
|
Assessing risks associated with proposed changes and ensuring changes to products, services or systems are |
BURM |
Risk management
Level 3 |
Planning and implementing processes for managing risk across the enterprise, aligned with organisational strategy and governance frameworks. |
CIPM |
Organisational change Level 2 Level 3 |
Planning, designing and implementing activities to transition the organisation and people to the required future |
Security+ (SY0-701)
Code/level |
Skill name |
Overall description, and Description at the specified level |
SCTY
|
Information security Overall definition
Level 2
Level 3 |
Defining and operating a framework of security controls and security management strategies.
|
SCAD |
Security operations Overall definition
Level 1 Level 2 Level 3
|
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity. |
VURE |
Vulnerability research Overall definition
Level 2 Level 3 |
Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and weaknesses. |
NTAS |
Network support Overall definition
Level 1 Level 2 Level 3 |
Providing maintenance and support services for communications networks.
|
DGFS |
Digital forensics Overall definition
Level 2 Level 3 Level 4 |
Recovering and investigating material found in digital devices. |
USUP |
Incident management Overall definition
Level 1 Level 2 Level 3 |
Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services. |
THIN |
Threat intelligence Overall description Level 2 |
Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation. |
BURM |
Risk management Level 2 Level 4 |
Planning and implementing processes for managing risk across the enterprise, aligned with organisational strategy and governance frameworks. |
AUDT |
Audit Level 2 |
Delivering independent, risk-based assessments of the effectiveness of processes, the controls and the compliance environment of an organisation. |
NTDS |
Network design Level 2
|
Designing communication networks to meet business requirements, ensuring scalability, reliability, security and |
RFEN | Radio frequency engineering Overall description Level 2 |
Designing, installing and maintaining radio frequency based devices and software. |
HSIN |
Systems installation and Level 2
|
Installing and testing, or decommissioning and removing, systems or system components. Follows agreed procedures to perform simple installations, replace consumable items and check the correct working of installations. Documents and reports on work done. |
PENT | Penetration testing Overall description Level 2 |
Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers. |
PEDP |
Information and Data
|
Implementing and promoting compliance with information and data management legislation. |
CHMG | Change control Overall description Level 2 Level 3 |
Assessing risks associated with proposed changes and ensuring changes to products, services or systems are controlled and coordinated. |
CIPM |
Organisational change
|
Planning, designing and implementing activities to transition the organisation and people to the required future |
IAMT |
Identity and access Level 1
|
Manages identity verification and access permissions within organisational systems and environments. |
IFDN |
Infrastructure design |
Designing technology infrastructure to meet business requirements, ensuring scalability, reliability, security and alignment with strategic objectives. |
INAS |
Information assurance |
Protecting against and managing risks related to the use, storage and transmission of data and information systems. |
Cloud+ (CV0-004)
Code/level |
Skill name |
Overall description, and Description at the specified level |
ITOP
|
Infrastructure operations
Level 1 |
Provisioning, deploying, configuring, operating, and optimising technology infrastructure across physical, virtual and cloud-based environments.
|
STMG |
Storage management Overall definition
Level 2 Level 3 |
Provisioning, configuring and optimising on-premises and cloud-based storage solutions, ensuring data availability, security and alignment with business objectives.
|
SINT |
Systems integration and build
|
Planning, implementing and controlling activities to integrate system elements, subsystems and interfaces to create operational systems, products or services. |
AVMT |
Availability management Overall description
Level 3
Level 4
|
Ensuring services deliver agreed levels of availability to meet the current and future needs of the business.
|
HSIN |
Systems installation/ decommissioning Overall definition
Level 1 Level 2 Level 3 |
Installing and testing, or decommissioning and removing, systems or system components. Records details of all components that have been installed and removed. Assists users and follows agreed procedures for further help or escalation.
|
DESN |
Systems design Level 2 Level 3 |
Designing systems to meet specified requirements and agreed systems architectures. |
SCAD |
Security administration Overall definition
Level 1 Level 2 |
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity. |
NTAS |
Network support |
Providing maintenance and support services for communications networks. |
ARCH |
Solution architecture Level 4 |
Developing and communicating a multi-dimensional solution architecture to deliver agreed business outcomes. |
PEDP |
Personal data protection Level 4 |
Implementing and promoting compliance with information and data management legislation. |
DEPL |
Deployment |
Transitioning software from development to live usage, managing risks and ensuring it works as intended. |
IAMT |
Identity and access |
Manages identity verification and access permissions within organisational systems and environments. |
CFMG |
Change control
|
Planning, identifying, controlling, accounting for and auditing of configuration items (CIs) and their |
Linux+ (XK0-005)
Code/level |
Skill name |
Overall description, and Description at the specified level |
SYSP |
Organisational change Level 2 Level 3 |
Installing, managing and maintaining operating systems, data management, office automation and utility software across various infrastructure environments. |
HSIN |
Systems installation and |
Installing and testing, or decommissioning and removing, systems or system components. Contributes to the development of installation procedures and standards. |
ITOP
|
Infrastructure operations Level 1 Level 2
|
Provisioning, deploying, configuring, operating, and optimising technology infrastructure across physical, virtual, and cloud-based environments. |
SCAD |
Security operations Overall definition
Level 1 Level 2 |
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity. |
PROG |
Programming/software development Overall definition
Level 2 |
Developing software components to deliver value to stakeholders.
|
IAMT |
Identity and access
|
Manages identity verification and access permissions within organisational systems and environments. |
DEPL |
Deployment Overall description |
Transitioning software from development to live usage, managing risks and ensuring it works as intended. |
Server+ (SK0-005)
Code/level |
Skill name |
Overall description, and Description at the specified level |
HSIN |
Systems installation/ decommissioning Overall definition
Level 3 |
Installing and testing, or decommissioning and removing, systems or system components.
|
AVMT |
Availability management Overall definition
Level 4
|
Ensuring that services deliver agreed levels of availability to meet the current and future needs of the business.
|
SCAD |
Security operations Level 3 |
Delivering management, technical and administrative services to implement security controls and security management strategies. Investigates minor security breaches in accordance with established procedures. Assists users in defining their access rights and privileges. Performs non-standard operational security tasks. Resolves security events and operational security issues. |
STMG |
Storage management Overall definition
Level 3 |
Planning, implementing and optimising the technologies and processes used for data storage.
|
SYSP |
System software Overall definition
Level 3 Level 4 |
Installing, managing, controlling, deploying and maintaining infrastructure systems software, to meet operational needs and service levels.
|
ITOP |
Security administration Overall definition
Level 3
|
Deploying, configuring and operating IT Infrastructure.
|
PBMG |
Problem management Overall definition
Level 4 |
Managing the life cycle of all problems that have occurred or could occur in delivering a service.
|
COPL |
L Continuity management Level 2
|
Developing, implementing and testing a business continuity framework.
|
PEDP |
Personal data protection Level 5 |
Implementing and operating a framework of controls and management strategies to promote compliance with personal data legislation. Contributes to the development of policy, standards and guidelines related to personal data legislation. Provides expert advice and guidance on implementing personal data legislation controls in products, services and systems. Investigates major data breaches and recommends appropriate control improvements. Creates and maintains an inventory of data that are subject to personal data legislation. Conducts risk assessments, business impact analysis for complex information systems and specifies any required changes. Ensures that formal requests and complaints are dealt with according to approved procedures. Prepares and submits reports and registrations to relevant authorities. |
CHMG |
Change control Overall description Level 2
|
Assessing risks associated with proposed changes and ensuring changes to products, services or systems are controlled and coordinated.
Develops, documents and implements changes based on requests for change. Applies change control procedures. Applies tools, techniques and processes to manage and report on change requests. |
BURM |
Risk management Level 3 |
Planning and implementing organisation-wide processes and procedures for the management of risk to the success or integrity of the enterprise.
|
CIPM |
Organisational change
|
Planning, designing and implementing activities to transition the organisation and people to the required future state.
|
CySA+ Cybersecurity Analyst (CS0-003)
Code/level |
Skill name |
Overall description, and Description at the specified level |
SCTY |
Information security Overall definition
Level 2 Level 3
|
Defining and operating a framework of security controls and security management strategies. |
THIN |
Threat intelligence Level 2 Level 3 Level 4 |
Developing and sharing actionable insights on current and potential security threats to the success or integrity of an |
VURE |
Vulnerability research Level 3 Level 4 Level 5 |
Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and weaknesses.
|
TECH |
Specialist advice Overall definition
Level 4 |
Providing authoritative, professional advice and direction in a specialist area. |
SCAD |
Security administration Overall definition
Level 1
Level 2 Level 3 Level 4 |
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity. |
USUP |
Incident management Overall definition
Level 1 Level 2 Level 3 Level 4 |
Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services. Monitors and manages incident queues to ensure incidents are handled according to procedures and service levels. |
DGFS |
Digital forensics Overall definition
Level 2 Level 3 |
Recovering and investigating material found in digital devices. Assists with digital forensic investigations under routine supervision. |
BURM |
Risk management Level 2 Level 3 |
Planning and implementing processes for managing risk across the enterprise, aligned with organisational strategy and governance frameworks. |
ITOP |
IT infrastructure Level 1 Level 2 Level 3 Level 4 |
Provisioning, deploying, configuring, operating, and optimising technology infrastructure across physical, virtual, and cloud-based environments. Executes standard operational procedures, including backups and restorations. Carries out agreed system software maintenance tasks. Automates routine system administration tasks to specifications using standard tools and basic scripting. |
VUAS |
Vulnerability assessment Level 2 Level 3
|
Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or |
PEDP |
Personal data protection
|
Implementing and promoting compliance with information and data management legislation. |
PenTest+ (PT0-003)
Code/level |
Skill name |
Overall description, and Description at the specified level |
PENT |
Penetration testing Overall definition
Level 2
Level 3
Level 4
Level 5 |
Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers. |
TECH |
Specialist advice Overall definition
Level 4 |
Providing authoritative, professional advice and direction in a specialist area.
|
OCOP |
Offensive cyber operations |
Plans, executes and manages offensive cybersecurity operations, including target selection, electronic target folders and post-operation analysis. |
VURE |
Vulnerability research Level 2 Level 3 |
Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and |
BURM |
Risk management Overall description Level 2 Level 3 |
Planning and implementing processes for managing risk across the enterprise, aligned with organisational strategy |
VUAS |
Vulnerability assessment
|
Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or |
SecurityX (CAS-005)
Code/level |
Skill name |
Overall description, and Description at the specified level |
SCTY
|
Security operations
Level 3
|
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and Performs simple security administration tasks. Ensures the integrity and completeness of security records, ensuring timely support and adherence to established |
SCAD |
Security operations
|
Delivering management, technical and administrative services to implement security controls and security management strategies.
|
AUDT |
Audit
|
Delivering independent, risk-based assessments of the effectiveness of processes, the controls, and the compliance environment of an organisation.
|
SCTY |
Information security |
Defining and operating a framework of security controls and security management strategies. Assists with implementing and monitoring security policies and protocols across different systems. |
DGFS |
Digital forensics Overall definition
Level 5 |
Recovering and investigating material found in digital devices.
|
USUP |
Incident management Overall definition
Level 4 |
Coordinating responses to incident reports, minimising negative impacts and restoring service as quickly as possible.
|
BURM |
Business risk management
|
Planning and implementing processes for managing risk across the enterprise, aligned with organisational strategy and governance frameworks. |
NTDS |
Network design Overall definition
Level 2 Level 3 Level 4
|
Designing communication networks to meet business requirements, ensuring scalability, reliability, security and |
VUAS |
Vulnerability assessment
Level 4
|
Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or |
PEDP |
Information and data compliance |
Implementing and promoting compliance with information and data management legislation. |
THIN |
Threat intelligence Level 2 Level 3 Level 4 |
|
AIDE |
Personal data protection Level 3 |
Implementing and promoting ethical practices in the design, development, deployment and use of AI and data |
DAAN |
Data analytics
|
Enabling data-driven decision making by extracting, analysing and communicating insights from structured and |
IAMT |
Identity and access |
Manages identity verification and access permissions within organisational systems and environments. |
IRMG |
Information management |
Enabling the effective management and use of information assets. |
DATM |
Data management |
Developing and implementing plans, policies and practices that control, protect and optimise the value and |
CFMG |
Configuration management |
Planning, identifying, controlling, accounting for and auditing of configuration items (CIs) and their |
DESN |
Systems design |
Designing systems to meet specified requirements and agreed systems architectures. |
GOVN |
Governance |
|
CIPM |
Organisational change |
Planning, designing and implementing activities to transition the organisation and people to the required future |
INAS |
Information assurance |
|
Data+ (DA0-001)
Code/level |
Skill name |
Overall description, and Description at the specified level |
DENG |
Data engineering
Level 3 Level 4 |
Designing, building, operationalising, securing and monitoring data pipelines and data stores.
|
STPL |
Enterprise and business architecture
|
Aligning an organisation's technology strategy with its business mission, strategy, and processes and documenting this using architectural models.
|
DATS |
Data science
Level 3 Level 4 |
Applying mathematics, statistics, data mining and predictive modelling techniques to gain insights, predict behaviours and generate value from data. Under guidance, applies given data science techniques to data. Analyses and reports findings and
|
NUAN |
Numerical analysis
|
Creating, analysing, implementing, testing and improving algorithms for numerically solving mathematical problems.
|
INAS |
Information assurance
Level 4 |
Protecting against and managing risks related to the use, storage and transmission of data and information systems.
|
PEDP |
Personal data protection
|
Implementing and operating a framework of controls and management strategies to promote compliance with personal data legislation.
|
DATM |
Data management
|
Developing and implementing plans, policies, and practices that control, protect and optimise the value of data assets.
|
DTAN |
Data modelling and design Overall description
Level 3 Level 4 |
Developing models and diagrams to represent and communicate data requirements and data assets.
|
BINT |
Business intelligence
|
Developing, producing and delivering regular and one-off management information to provide insights and aid decision-making.
|
VISL |
Data visualisation
Level 4 |
Facilitating understanding of data by displaying concepts, ideas, and facts using graphical representations.
|
DataSys+ (DS0-001)
Code/level |
Skill name |
Overall description, and Description at the specified level |
DBAD |
Database administration
|
Installing, configuring, monitoring, maintaining databases and data stores, ensuring performance and security while adapting to evolving technologies. |
DBDS |
Database design
|
Specifying, designing and maintaining mechanisms for storing and accessing data across various environments and |
COPL |
Continuity management
|
Developing, implementing and testing a business continuity framework. |
DATM |
Data management Overall description Level 2 Level 3 |
Developing and implementing plans, policies and practices that control, protect and optimise the value and |
IAMT |
Organisational facilitation
|
Manages identity verification and access permissions within organisational systems and environments. |
DTAN |
Data modelling and design |
Developing models and diagrams to represent, communicate and manage data requirements and data assets. |
SCTY |
Information security |
Defining and operating a framework of security controls and security management strategies. |
PROG |
Programming/software |
|
SCAD |
Security operations |
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and |
STMG |
Storage management |
Provisioning, configuring and optimising on-premises and cloud-based storage solutions, ensuring data availability, security and alignment with business objectives. |
DataX (DY0-001)
Code/level |
Skill name |
Overall description, and Description at the specified level |
DANN |
Data Analytics Overall definition Level 1 Level 2 Level 3 Level 4 |
Enabling data-driven decision making by extracting, analysing and communicating insights from structured and
|
DATM |
Data Management Overall definition
Level 2 Level 3 Level 4 Level 5 |
Developing and implementing plans, policies and practices that control, protect and optimise the value and |
BURM |
Risk management
|
Planning and implementing organisation-wide processes and procedures for the management of risk to the success or integrity of the enterprise.
|
FEAS |
Feasibility assessment Level 3
|
Defining, evaluating and describing business change options for financial, technical and business feasibility, and strategic alignment.
|
DESN |
Systems design
|
Designing systems to meet specified requirements and agreed systems architectures.
|
CHMG |
Change control
Level 3 |
Assessing risks associated with proposed changes and ensuring changes to products, services or systems are controlled and coordinated.
|
CloudNetX (CNX-001)
CIPM |
Organisational change |
Planning, designing and implementing activities to transition the organisation and people to the required future |
CFMG |
Configuration management |
Planning, identifying, controlling, accounting for and auditing of configuration items (CIs) and their |
IAMT |
Identity and access |
Manages identity verification and access permissions within organisational systems and environments. Performs basic identity and access management tasks, including user account lifecycle management, under |
NTDS |
Network design Level 3
|
Designing communication networks to meet business requirements, ensuring scalability, reliability, security and Assists with defining configurations for networks and network components under routine supervision. |
NTAS |
Network support |
Providing maintenance and support services for communications networks. |
ITOP |
Infrastructure operations |
|
SINT |
Systems integration and build |
|
AVMT |
Availability management |
Ensuring services deliver agreed levels of availability to meet the current and future needs of the business. |
HSIN |
Systems installation and |
Installing and testing, or decommissioning and removing, systems or system components. |
DESN |
Systems design |
|
BURM |
Risk management |
Planning and implementing processes for managing risk across the enterprise, aligned with organisational strategy |
ARCH |
Solution architecture |
|
IFDN |
Infrastructure design |
Designing technology infrastructure to meet business requirements, ensuring scalability, reliability, security and |
SCAD |
Security operations |
|
Cloud Essentials+ (CLO-002)
Code/level |
Skill name |
Overall description, and Description at the specified level |
BUSA |
Business situation analysis |
|
BURM |
Risk management |
Planning and implementing organisation-wide processes and procedures for the management of risk to the success or integrity of the enterprise. |
SORC |
Sourcing |
Managing, or providing advice on, the procurement or commissioning of products and services. |
FEAS |
Feasibility assessment |
Defining, evaluating and describing business change options for financial, technical and business feasibility and strategic alignment. |
DESN |
Systems design
|
|
CHMG |
Change control |
|
INAS |
Information assurance |
|
BUDF |
Budgeting and forecasting |
|
Project+ (PK0-005)
Code/level |
Skill name |
Overall description, and Description at the specified level |
PRMG |
Project management Overall definition
Level 4 Level 5 |
Delivering agreed outcomes from projects using appropriate management techniques, collaboration, leadership and governance. Defines, documents and executes small projects or sub-projects. Works alone or with a small team actively participating in all phases of the project. Applies appropriate project management methods and tools. Identifies, assesses and manages risks effectively. Agrees project approach with stakeholders and prepares realistic project plans (including scope, schedule, quality, risk and communication plans). Tracks activities against the project schedule, managing stakeholder involvement as appropriate. Monitors costs, times, quality and resources used takes action where these exceed agreed tolerances.
|
PROF |
Portfolio, programme and project support Overall definition
Level 2
Level 3 |
Providing support and guidance on portfolio, programme and project management processes, procedures, tools and techniques.
|
BUSA |
Business situation analysis
|
Investigating business situations to define recommendations for improvement action.
|
RLMT |
Stakeholder relationship Overall description
|
Influencing stakeholder attitudes, decisions, and actions for mutual benefit.
|
CIPM |
Organisational change
|
Planning, designing and implementing activities to transition the organisation and people to the required future state.
|