People related Frameworks

This section summarises content from QCI and other frameworks that are related to individual and organisational competencies. Readers must consult the authoritative sources for the actual guidelines.

25 Sep 2025

Subsections of People

Workforce Competencies

The digital ecosystems of modern enterprises are large and complex, usually spread geographically across the country and the world. The ecosystems encompass a large number and variety of technologies, products, platforms, systems, networks, applications, databases and services, which may be deployed on-premises, on cloud (IaaS, PaaS, SaaS) or in hybrid mode.

Enterprises usually have multiple teams of IT, OT, IIoT, information security and cybersecurity professionals and managers, who are responsible to carry out the organisations’ functions, activities and tasks related to the digital ecosystem of the organisation. CSEs and other organisations would derive significant benefits by establishing a strategic program and structured approach to ensure that their workforce and teams managing the digital ecosystem have the requisite cybersecurity competence (knowledge, skills and levels of expertise) to be effective in handling the entire gamut of work and responsibilities of IT, OT, IIoT, information security and cybersecurity.

Workforce Composition

Given the size and complexity of digital ecosystem, it may be impractical for most CSEs and other organisations to depend solely upon their internal workforce to acquire, implement, engineer, operate, manage and sustain the ecosystem. In practice, the organisations have a composite workforce that has a mix of own employees, hired manpower, specialist (OEM, ISV, SI, SaaS) teams and resources of managed services providers (MSPs), who work together to carry out the functions, activities and tasks related to the digital ecosystem.

Workforce Hierarchy

At an organisational level the digital ecosystem workforce can be divided into multiple levels of hierarchy, as given below. Typical job titles in each level indicate the associated job functions, tasks, and responsibilities.

  • Senior management level – Vice Presidents, CTO, CIO, CISO, CSO, Heads of Business Units, Divisions, Departments.

  • Middle and lower management level – Project Managers, Technology Managers, Operations Managers, Security Managers, Cyber Defence Team Leads, NOC and SOC Team Leads, GRC Managers, Workforce Development Managers etc.

  • Individual Contributor level – Operators, Analysts, Administrators, Engineers, Specialists, Technicians, Architects, Developers, Testers, Quality Testers, Apprentices, Associates, Interns.

Senior and middle level managerial roles are always assigned to employees of the organisations. Technical work and its deliverables could be assigned to external teams from OEMs, SIs, MSPs and other service providers, as long as the overall supervision and oversight is handled by designated senior and middle level managers of the organisation. The middle and lower management levels, and individual contributors, are accountable and responsible for day-to-day operational activities and tasks.

Note

The concept of “virtual managers” or “external advisors with C-level access” is gaining acceptance amongst many organisations, who need such services in a more flexible, scalable and cost-effective manner. The virtual manager, for example, a virtual chief information security officer (vCISO) performs most of the core functions as a traditional, full-time manager. They just differ in terms of their engagement model (part time) and presence (non-physical) in the organisation.

Workforce Specialisations

The sheer breadth and variety of the digital ecosystem technologies, products, deployment models, processes and practices in an organisation makes it impossible for any professional to develop competency in every area. Organisations therefore require professionals with different specialisations to work together in teams. An illustrative list of knowledge and skill specialisation areas for the composite workforce is given below. Source: NCIIPC-QCI Scheme for Cybersecurity Professionals.

.Knowledge and Skills Specialisation Areas
Knowledge Area
1Network Infrastructure & Network Security
2Systems (HW, VM, Firmware, OS) Security
3Software and Platform Operations Security
4Secure Systems Engineering
5Secure Software Design & Development
6Enterprise Governance, Risk and Compliance
7Enterprise Supply Chain
8Enterprise IT and Information Security
9Enterprise Cyber Defence and Security Operations
10Data Analytics
11Cyber Forensics
12Cyber Security Training & Awareness
13ICS Cyber Security
Skills
1Programming & Scripting
2Managing and Securing Systems, Networks, Applications
3Managing and Securing Information, Data And Identities
4Custom Software Development and Management
5Cyber Defence and Security Operations
6Others (OEM/ ISV Technologies and Products)

Each knowledge and skill area also has an expertise level (basic, intermediate, expert) associated with it. The expertise levels should generally be mapped to the workforce hierarchy, keeping in view the functions executed by a particular hierarchy of the workforce, the size of organisation and the complexity of their digital ecosystem. For example, junior levels are expected to acquire at least the basic level of expertise, while middle and senior levels are expected to acquire intermediate or expert level of expertise. Professionals working with the OEMs, ISVs, SIs, MSPs and other service providers are expected to have intermediate or expert level of expertise in their respective areas of specialisation.

Tip

CSEs are advised to refer Appendix 1A of NCIIPC-QCI Scheme for Cybersecurity Professionals, which has a comprehensive and detailed table of knowledge, skills and expertise for each specialisation area of an organisation.

Functions

The composite workforce of CSEs and other organisations carry out the five technical and five management functions on a daily or periodic basis. In practice, to enable proper distribution of work and responsibilities, the ten functions are sub-divided into different domains.

Domains

A domain in the context of workforce specialisations is a distinct technical/ organisational capability of processes, people and technology that a CSE must have to meet its IT and cyber security objectives successfully. Each domain typically has an organisational hierarchy associated with it that is designed to handle different levels of work and responsibilities. An illustrative diagram of IT and cybersecurity domains mapped to organisational teams is given below.

IT and Cybersecurity domains in an organistion IT and Cybersecurity domains in an organistion

Job Roles and associated Competencies

An illustrative list of IT and cybersecurity job roles and job descriptions in an entity is given below. The knowledge, skills and expertise level required for each of the job roles is mentioned against each role in the form of codes that are taken from Appendix 1A of NCIIPC-QCI Scheme for Cybersecurity Professionals.

.Organisation Job Role (Job Title)Work, activities and tasks required to be done as part of the Job Role (Job Description)Knowledge, Skills & Expertise
1Information Security SpecialistConduct risk assessment to help identify cybersecurity risks and determine appropriate controls to ensure that IT and ICS systems perform within acceptable limits of risks. Monitor, track and manage risk mitigations and exceptions to ensure compliance with cybersecurity standards and policies.KM-0601F

SM-0602F
2Information Security Officer (ISO)

Chief Info Security Officer (CISO)
Drive cybersecurity policies, standards and guidelines aligned to the organisation’s risk management framework, legislation and regulation. Responsible for establishing and approving ISMS policies, standards and guidelines to effectively manage cybersecurity risks, integrate and align the cyber risk management framework in the organisation’s context.KM-0601A, KM-0701F

SM-0602A, SM-0603A
3IT GRC StrategistStrategise, design IT GRC framework and ISMS for organisations and drive projects and investments for cybersecurity of the organisation.KM-0601M, KM-0701A

SM-0602A, SM-0603A
4Field Security EngineerProvide engineering support in the field for security and security management of in-production/ in-use IT and ICS systems of both on-premises and cloud infrastructure of organisations.KM-0401F, KM-0801F, KM-0802F, KM-0803F

SM-0301F, SM-0602F
5Technology & Systems Security Team Leader

Chief Technology Officer (CTO)

Chief IT Officer (CIO)
Conceptualise, design, engineer, integrate and implement the security and security management aspects in IT and ICS systems of both on-premises and cloud infrastructure of organisations.KM-0401A, KM-0801A, KM-0802A, KM-0803A

SM-0301A, SM-0602A
6Technology &System Security Architect

Technology Strategist
Strategise, conceptualise, design, engineer, integrate the security and security management aspects of large, complex IT and ICS systems of both on-premises and cloud infrastructure of organisations.

Identify IT and ICS cybersecurity needs of the organisation and translate them into security designs and principles. Recommend and lead the adoption of new technological advances and best practices in IT and ICS systems to mitigate security risks.
KM-0401A, KM-0801A, KM-0802A, KM-0803A

SM-0301A, SM-0602A, SM-0603A
7Apps & Data Security EngineerConfigure, operate, administer the day to day security aspects of both on-premises and cloud software platforms (including SaaS) of organisations.

Provide security engineering support for development of secure software (Dev-Sec-Ops, secure CI/CD and AI/ML pipelines).

Work to be done using enterprise platforms for identity, role-based access management, LDAP, zero-trust infrastructure, IT and ICS asset management, EMS (application management), ITSM and ISMS platforms for patch management, configuration management (CMDB), ticketing and incident management, compliance management, reporting.
KM-0301F, KM-0302F, KM-0501F

SM-0101F, SM-0301F, SM-0401F
8Apps & Data Security AdministratorDesign, oversee and manage secure software design and engineering, including secure software supply chain management.

Plan, design, engineer, analyse, oversee the security and security management aspects of software platforms of both on-premises and cloud infrastructure (including SaaS) of organisations.
KM-0301A, KM-0302A, KM-0401A, KM-0501A

SM-0301A
9Software Security TesterSecurity testing of software platforms and applications prior to use in production environment and prior to upgrades.KM-0502F

SM-0401F
10Software Security Analyst/ AdministratorOversee and manage the security testing of software platforms and applications.KM-0502A

SM-0401A
11Product Security TesterSecurity testing of hardware, devices and appliances prior to use in production environment and prior to upgrades.KM-0201F, KM-0202F

SM-0401F
12Product Security Analyst/ AdministratorOversee and manage the security testing of hardware, devices and appliances.KM-0201A, KM-0202A

SM-0401A
13Network Security EngineerConfigure, operate, administer the day to day security aspects of telecom, IT and ICS networks of organisations.

Work to be done using enterprise platforms for patch management, configuration management (CMDB), ticketing and incident management, NMS (network management), reporting.
KM-0101F, KM-0102F

SM-0101F, SM-0201F, SM-0601F
14Network Security AdministratorPlan, design, engineer, analyse, oversee the security and security management aspects of telecom, IT and ICS networks of organisations.KM-0101A, KM-0102A, KM-0201F, KM-0202F

SM-0201A, SM-0601F
15System Security EngineerConfigure, operate, administer the day to day security aspects of systems of both on-premises and cloud infrastructure of organisations.

Work to be done using enterprise platforms for patch management, configuration management (CMDB), ticketing and incident management, EMS (systems management), reporting.
KM-0201F, KM-0202F

SM-0101F, SM-0201F, SM-0601F
16System Security AdministratorPlan, design, engineer, analyse, oversee the security and security management aspects of systems of both on-premises and cloud infrastructure of organisations.KM-0101F, KM-0102F, KM-0201A, KM-0202A

SM-0201A, SM-0601F
17Security Support OperatorOperate and support the day to day security issues of end user systems and devices.KM-0201F, KM-0202F, KM-0803F

SM-0101F
18System Security AdministratorPlan, design, engineer, analyse, oversee the security and security management aspects of end user systems and devices.KM-0201A, KM-0202A, KM-0803A

SM-0101F
19Security Performance Junior AnalystCollect, collate, normalise, analyse cybersecurity related data for assessing performance of cybersecurity functionsKM-1001F

SM-0101F
20Security Performance Senior AnalystPlan, design, engineer, oversee the cybersecurity performance analysis to derive insights and identify areas of improvement.KM-0101F, KM-0102F, KM-0201F, KM-0202F, KM-1001A

SM-0101F
21ICS Cybersecurity OperatorOperate, administer the day to day security aspects of ICS environment of organisations.KM-1301F
22ICS Cybersecurity Analyst

ICS Security Manager
Plan, design, engineer, analyse, oversee the security and security management aspects of ICS environment of organisations.KM-1301A
23ICS Cyber Defence StrategistDevelop frameworks, strategies and processes for vulnerability management, protection, cyber incident detection, response, recovery, investigation and cyber forensics in the ICS environment.KM-1301M

SM-0602F, SM-0602A, SM-0603A
24IT Cyber Defence OperatorOperate, carry out the day to day cyber defence functions like rogue asset discovery, vulnerability tracking, cyber threat intelligence (CTI) analysis.KM-0804F, KM-0901F

SM-0101F, SM-0501F
25IT Cyber Defence Analyst

Cyber Defence Manager
Plan, design, engineer, analyse, oversee the security and security management aspects of cyber defence. May include cybersecurity management of outsourced and third-party service providers like MSPs and MSSPs.KM-0804A, KM-0901A

SM-0101F, SM-0501F, SM-0501A
26IT Cyber Defence StrategistDevelop frameworks, strategies and processes for protection, threat and cyber incident detection, response, recovery in the IT environment.KM-0804A, KM-0901M

SM-0101F, SM-0501A, SM-0601F, SM-0603A
27Vulnerability, Threat, Risk OperatorCarry out the day to day vulnerability and risk assessment, threat hunting activities, technical audits.

Proactively scan logs, network traffic, SIEMs and other channels for suspicious behaviours and indicators of compromise. Identify IT and ICS assets prone to cyber threats and attacks, monitor for potential threats actors/ groups/ individuals attempting cyber-attacks.
KM-0804F

SM-0602F
28Vulnerability, Threat, Risk Analyst

Risk Manager
Plan, design, engineer, oversee, manage the vulnerability and risk assessment, threat hunting activities, technical audits. Derive deep insights for providing strategic direction and investments.KM-0804A

SM-0602A, SM-0603A
29Security Operations OperatorCarry out the day to day security operations activities in the SOC, like surveillance and monitoring of IT and ICS systems and assets, support the identification of threats and vulnerabilities, provide incident response and remediation support.KM-0201F, KM-0803F

SM-0101F
30Security Operations Analyst

Security Operations Manager
Plan, design, engineer, oversee, manage the security operations in the SOC. Respond to cyber incidents, coordinate for containment and mitigation of incidents and recovery.KM-0201A, KM-0803A

SM-0101F
31Cyber Forensics Junior Analyst

Incident Response Operator
Analyse and investigate cyber incidents to identify breaches, loopholes, process deviations, failures.KM-1101F

SM-0101F, SM-0501F
32Cyber Forensics Senior Analyst

Incident Response Manager
Plan, direct, oversee, monitor and manage the cyber forensic analysis and investigation activities into the cause and impact of incidents, develop detailed reports on incident timeline, evidence, findings, conclusions and recommendations.KM-1101A

SM-0101F, SM-0501A
33Cyber Defence Architect

Incident Response Strategist
Strategise, design, engineer, integrate cyber forensics and investigation processes into the security management of large, complex IT and ICS systems of both on-premises and cloud infrastructure of organisations.KM-1101M

SM-0101F, SM-0501A
34Cyber Training & Awareness AssistantOperate the routine cybersecurity training and awareness programmes.KM-1201F

SM-0601F, SM-0602F
35Cyber Training & Curriculum ManagerDesign and manage cybersecurity curriculum for end users, IT and ICS specialists and managers.KM-1201A

SM-0601A, SM-0602F

An illustrative reporting hierarchy for different job roles is given in the diagram below.

Workforce reporting hierarchy Workforce reporting hierarchy

The generic top-most positions for different reporting hierarchies are described as under:

  • Chief Technology Officer (CTO) – Oversees the overall technology strategy, large project implementations and engineering functions.
  • Chief Information Officer (CIO) – Oversees the IT operations and IT security functions.
  • Chief Operations Officer (COO) - Many organisations with large OT/ ICS segments typically have separate COOs for overseeing the OT operations and OT security functions.
  • Chief Information Security Officer (CISO) – Oversees the IT Governance (Policies), Risk & Compliance (GRC) functions and information security (IS) operations.

Highly specialised job roles like IT/ ICS GRC Strategist, Technology & System Security Architect, ICS Cyber Security Architect, Cyber Defence Strategist and Cyber Defence Architect are typically required in very large entities and consultancy organisations. Mid-sized and smaller CSEs may choose to contract their services on need- basis from consultancy organisations.

Competency Profiles and Certifications

The Government has embarked upon capacity building of cybersecurity workforce through mechanisms such as academic and education programs and certification of competency profiles by internationally recognised accreditation and certification bodies. A number of academic programs for cybersecurity are already being conducted by leading universities. In addition, there are many global and national level certification programs that are run by different private bodies.

An indicative list of major international certifications is collated here. The list has been prepared, based on publicly available information, and has not been vetted for correctness and completeness. Suggestions for improvements and rectification of errors are welcome.

Guidance on Workforce Capabilities

Organisations are advised to adopt the following steps to align workforce competencies and certifications to different IT and cyberseecurity job roles:

  1. Categorise the organisation’s cyber security workforce requirements for different IT and cybersecurity domains and job roles, using the information of the work, activities and tasks that are listed against the job roles.

  2. Map the knowledge and skills specialisation areas and expertise levels that are considered essential for the job roles. Identify the appropriate set of competency certifications and/ or academic programs that cover the knowledge, skills and expertise requirements for the job roles.

  3. Choose a workforce composition mix that is most appropriate to achieve the IT and cybersecurity objectives of the organisation. The small and medium sized CSEs can club some of the job roles within Technical (Cybersecurity) vertical and the Technical (IT & ICS Security) vertical and assign it to one person with appropriate knowledge and skillsets. The clubbing of job roles across the above mentioned two verticals shall not be done.

  4. Use the job roles, job descriptions, knowledge and skills specialisation areas, expertise levels, competency certifications and academic programs to create appropriate job profiles for internal and/ or external hiring and/or for sourcing of competent workforce from service providers and consultancy organisations.

  5. Use the competency profiles (knowledge, skills and expertise levels) for different job roles to design training programs and if required for hiring training bodies to train the workforce in different cyber security domains, as part of capability and capacity development programs.

  6. Use the competency profile certifications provided by accredited bodies recommended by the government/national nodal agencies as a basis for selection. 

  7. Use the competency profile certifications to demonstrate to the regulators and national agencies that cyber security personnel employed in critical IT & ICS domains have the required competence to carry out the respective job role responsibilities.

25 Sep 2025

Consultancy Organisations

The NCIIPC-QCI Scheme for accreditation of IT and ICS Consultancy Organisations (COs) is an initiative of the Government to develop a pool of specialist organisations that can help CSEs in handling the different dimensions of work related to the digital ecosystem.

‘Consultancy’ is the act of providing technical expertise, by an individual or an organisation deemed competent in delivering services as per the defined scope in exchange for a fee. The nature of such expertise may be technical, thematical, procedural or managerial.

Domains

Organisations can usually group their work of handling their digital infrastructure into multiple domains as given here and also tabulated below. Each of these domains are inherently complex and dynamic and require a substantial depth and breadth of knowledge, expertise and skills to do the work.

.Domain TypeDomain Title
1OrganisationalGovernance, Risk and Compliance
2TechnicalTechnology & System Security Architecture
3TechnicalSecure Software Development
4TechnicalApplication Security Testing
5TechnicalSecurity Product Testing
6TechnicalNetwork Security Administration
7TechnicalSystem Security Administration
8TechnicalApplications & Data Security Administration
9TechnicalSecurity Support Services
10TechnicalSecurity Performance Management
11TechnicalICS Cyber Security
12TechnicalICS Cyber Risk Assessor
13TechnicalICS Cybersecurity Design, & Implementation
14TechnicalICS Cybersecurity Operations & Maintenance
15TechnicalCyber Defence
16TechnicalCyber Vulnerability, Threat & Risk Management
17TechnicalSecurity Operations
18TechnicalCyber Forensics & Investigation
19OrganisationalCyber Training & Awareness

Typical domain ownership and responsibility is described below.

  • Domain 1 is related to IT/ ICS GRC under the CISO.

  • Domains 2 to 5 & 13 are related to design, engineering and implementation of IT/ ICS systems by project engineering teams, under the project management organisation.

  • Domains 6 to 11 & 14 are related to cyber security aspects for consideration by the IT & ICS teams under the CIO/ OT Head.

  • Domains 12, 15 to 18 are exclusively related to cyber security functions by the IS & SOC teams under the IT / OT CISO.

  • Domain 19 is related to training under Head HR.

Work Heads

CSEs find it a challenge to hire sufficient in-house resources for all the domains and functions. Hence, they look for competent, capable and trustworthy Consultancy Organisations, who can do some of the work for them.

The Scheme has defined 11 Work Heads for COs, which are aligned to the work domains within organisations as shown in the table below.

WH-IdTitle of Consultancy Service (Work Head)Related Domain (indicative)
WH-1Designing and facilitation of implementation of CSMS (L1/L2/L3) with focus on Governance, Risk and Compliance RequirementsDomain 1 (Governance, Risk and Compliance)
WH-2IT Cyber Security, Architecture, Design, Engineering and ImplementationDomain 2 (Technology & System Security Architecture)

Domain 3 (Secure Software Development)

Domain 4 (Application Security Testing)

Domain 5 (Product Security Testing)
WH-3IT Cyber Security Administration and ManagementDomain 6 (Network Security Administration)

Domain 7 (System Security Administration)

Domain 8 (Applications & Data Security Administration)

Domain 9 (Security Support Services)

Domain 10 (Security Performance Management)
WH-4ICS Cybersecurity Risk AssessmentDomain 12 (ICS Cyber Risk Assessor)
WH-5ICS Cybersecurity Architecture, Design, Engineering and ImplementationDomain 13 (ICS Cybersecurity Design, & Implementation)
WH-6ICS Cybersecurity Operations & MaintenanceDomain 14 (ICS Cybersecurity Operations & Maintenance)
WH-7Cyber DefenceDomain 15 (Cyber Defence)
WH-8Cyber Security Monitoring and AssessmentDomain 16 (Cyber Vulnerability, Threat & Risk Management)
WH-9Cyber Security OperationsDomain 17 (Security Operations)
WH-10Cyber Security Forensics & InvestigationDomain 18 (Cyber Forensics & Investigation)
WH-11Cyber Training & Skill Gap AssessmentsDomain 19 (Cyber Training & Awareness)

CXOs can use the mapping of domains to each WH Id to identify who can do what work.

The detailed scope of consultancy work/ services is described in a separate table in the Scheme. This table can be used by the stakeholders in the manner given below:

  • CSEs can use the table to describe the work/ services sought from the consultancy organisations in different domains. Contents of the table can be suitably adapted for inclusion in the RFPs.
  • COs can use the table to identify what work/ services they can do/ want to do. This activity will be done at the time of applying for accreditation and during the accreditation process.
  • ABs can use the table to validate that the COs have the capability to deliver all of the work/ service described under the Work Heads for which they have sougt accreditation.
  • Regulators and nodal agencies can use the table to review the capability of COs hired by the regulated entities. This activity is usually required when there are serious lapses in the quality of work done by the COs for the entities.
Note

Lapses in the quality of work/ services of COs is often due to lack of competence in the professionals provided by the COs to the entities. It may also be due to gaps in the work package given to the COs.

The Scheme has a well-defined redressal process to address the issues related to capabilities and competencies of COs.

Accreditation of COs

Accreditation Bodies (AB) are responsible for accreditation of COs under the Scheme. During the accreditation process, the CO shall be attested for their capability, competence and level of expertise to provide consultancy service as per the detailed scope of work/ services tabulated above.

The accreditation process requires the CO to demonstrate to the AB that their consultants/ professionals have the required competency (knowledge, skills and advanced/ master level expertise) to deliver the services. The Scheme tabulates the knowledge and skill requirements for the consultants/ professionals, which is derived from the Scheme for Cybersecurity Professionals.

The evidence of competency is usually demonstrated through global certifications and documented work experience of the professionals.

Once accredited, the CO can offer their services as a whole package or parts of it, depending on the scope chosen and the services sought by the client.

Guidance

CSEs must leverage the robust mechanism of the NCIIPC-QCI Scheme to accredit skilled consultancy organisations. The CSEs can hire COs to become a part of their composite workforce and handle portions of the work of conceptualisation, design, engineering, acquisition, operation and management of their digital infrastructure.


25 Sep 2025

Training Bodies

The NCIIPC-QCI Scheme for accreditation of IT and ICS Training Bodies (TBs) is an initiative of the Government to develop a pool of specialist organisations that can help CSEs in training their workforce to handle the different dimensions of work related to the digital ecosystem. The TBs can also offer training services to individual professionals, who are desirous of enhancing their competencies and obtaining certifications.

The core objective of the Scheme is to put in place a robust system of oversight and due diligence to accredit bonafide TBs, with an assurance that they can impart high quality training to the organisation’s workforce and individual professionals.

Alignment with Domains

Training offered by the TBs to CSEs and individuals are aligned to the 19 domains of the CSEs that are defined under the Scheme and tabulated below. This alignment will help the CSEs to easily map the training objectives and outcomes to their domain requirements.

.Domain TypeDomain Title
1OrganisationalGovernance, Risk and Compliance
2TechnicalTechnology & System Security Architecture
3TechnicalSecure Software Development
4TechnicalApplication Security Testing
5TechnicalSecurity Product Testing
6TechnicalNetwork Security Administration
7TechnicalSystem Security Administration
8TechnicalApplications & Data Security Administration
9TechnicalSecurity Support Services
10TechnicalSecurity Performance Management
11TechnicalICS Cyber Security
12TechnicalICS Cyber Risk Assessor
13TechnicalICS Cybersecurity Design, & Implementation
14TechnicalICS Cybersecurity Operations & Maintenance
15TechnicalCyber Defence
16TechnicalCyber Vulnerability, Threat & Risk Management
17TechnicalSecurity Operations
18TechnicalCyber Forensics & Investigation
19OrganisationalCyber Training & Awareness

Scope of Training

Annexures 1A, 1B and 1C of the Scheme document provides a detailed view of the expected offering from the TBs. The details are given under the following heads:

  • Domain
  • Knowledge and Skill modules
  • Number of days for training
  • Training objectives
  • Training outcomes
  • Mode of delivery (online/ face-to-face/ hybrid)

Readers are advised to consult the Scheme documents for further details.

Accreditation of TBs

Accreditation Bodies (AB) are responsible for accreditation of TBs under the Scheme. During the accreditation process, the TB shall be attested for their capability, competence and level of expertise to provide training service as per the detailed scope of work/ services tabulated in the Scheme document.

The accreditation process requires the TB to demonstrate to the AB that their trainers have the required competency (knowledge, skills and advanced/ master level expertise) to deliver the training. The Scheme tabulates the knowledge and skill requirements for the trainers, which is derived from the Scheme for Cybersecurity Professionals.

The evidence of competency is usually demonstrated through global certifications and documented work experience of the trainers.

Once accredited, the TB can offer their training services as a whole package or parts of it, depending on the scope chosen and the services sought by the client.

Guidance

CSEs must leverage the robust mechanism of the NCIIPC-QCI Scheme to accredit skilled training bodies. The CSEs can hire TBs to train their composite workforce to handle portions of the work of conceptualisation, design, engineering, acquisition, operation and management of their digital infrastructure.

The Scheme documentation will also be useful to the internal training teams of organsiations. They can use the structure and content to devise their training packages just like the accredited TBs.


25 Sep 2025

Global Certifications

NCIIPC-QCI Conformity Assessment Framework for Cybersecurity of CSEs

The implementation, operation and management of cyber security in CSEs requires to be assessed by independent accredited Certification Bodies (CBs) and Inspection Bodies (IBs) for compliance with prescribed standards for the sectors. Further, the CSEs require competent cyber security professionals, who are assessed and certified by independent accredited Personnel Certification Bodies (PrCBs). The CSEs also require competent consultancy organisations (COs) and training bodies (TBs), whose expertise and competence is assessed and certified by independent Accreditation Bodies (ABs).

NCIIPC and Quality Council of India (QCI) have formulated and designed a comprehensive Scheme for “Conformity Assessment Framework for Cybersecurity of Critical Sector Entities”. The objective of the Scheme is to establish robust cybersecurity accreditation, certification and inspection processes for

  • critical sector entities (CSEs)
  • cybersecurity professionals
  • consulting organisations (COs)
  • training bodies (TBs)

The Scheme incorporates the international framework for accreditation of conformity assessment bodies, viz,  CBs, IBs and PrCBs, which is the most appropriate mechanism to ensure quality, integrity, consistency and standardisation.

The CAF for cyber security of CSEs comprises of the following Schemes:

  • Certification Scheme for Cyber Security Management System (CSMS) at Levels 1,2 and 3.
  • Inspection Scheme for Information Technology and Industrial Control Systems (IT/ICS).
  • Personnel Certification Scheme for Cyber Security Professionals.
  • Accreditation Scheme for IT/ICS Consultancy Organisations (COs).
  • Accreditation Scheme for IT/ICS Training Bodies (TBs).

Details of the Scheme are available on NCIIPC and QCI websites.

The outcomes delivered by the Schemes are as under:

  • Pool of accredited CBs & IBs: The Government, Regulators, NCIIPC, CSEs and other organisations will have a pool of accredited CBs and IBs for carrying out conformity assessment and/ or inspection of an organisation’s information infrastructure and information security/ cybersecurity management system (ISMS/ CSMS).

  • Pool of accredited PrCBs and certified Cyber Security Professionals: All organisations will have an indigenous pool of certified cybersecurity professionals, who are assessed and certified by accredited PrCBs for their competence (knowledge, skills, expertise) to implement and ensure IT and OT cyber resilience. The competency certification of cybersecurity professionals is closely aligned with the workforce competency described here.

  • Pool of accredited COs and TBs: All organisations will have an indigenous pool of accredited COs and TBs with independently certified expertise and competence, to provide them cybersecurity consultancy services and train their workforce. The COs and TBs themselves will leverage the established pool of CSPs for delivering their services.

The Scheme as a whole is adapted to the cybersecurity requirements of CSEs and other organisations of the Indian ecosystem. It is expected to contribute to building national capacity in the cybersecurity domain.

Global Certifications

An illustrative list of cybersecurity certifications offered by global certifying bodies has been compiled from publicly available information and is given below. It also gives a generic mapping of the certifications to the domains defined here. The list has not been vetted for correctness and completeness. Suggestions for improvements and rectification of errors are welcome.

.Issuing BodyCertificationDescriptionIndicative Domain(s)
1ISACACISACertified Information Security AuditorGovernance, Risk and Compliance
2ISACACRISCCertified in Risk and Information Systems ControlGovernance, Risk and Compliance
3ISACACISMCertified Information Security ManagerCyber Defence
4ISACACGEITCertified in the Governance of Enterprise ITGovernance, Risk and Compliance
5ISACACSX–PCybersecurity Practitioner CertificationCyber Defence
6ISACACDPSECertified Data Privacy Solutions EngineerApplications & Data Security Administration
7ISACAITCAInformation Technology Certified AssociateCyber Defence
8ISACACETCertified in Emerging Technology CertificationTechnology & System Security Architecture
9ISACACOBIT FoundationCOBIT Foundation CertificatesGovernance, Risk and Compliance
10ISACACOBIT DesignCOBIT Design and ImplementationGovernance, Risk and Compliance
11ISACACOBIT and NISTImplementing the NIST Cybersecurity Framework Using COBIT 2019Governance, Risk and Compliance
12ISACAIT RISKIT Risk Fundamentals CertificateGovernance, Risk and Compliance
13ISACACCAKCertificate in Cloud Auditing KnowledgeGovernance, Risk and Compliance
14ISACACSX NEXUSCSX Nexus Cybersecurity CertificatesGovernance, Risk and Compliance
15ISACACYBERSECURITY AUDITCybersecurity Audit Certificate ProgramGovernance, Risk and Compliance
16ISACACOMPUTINGComputing Fundamentals CertificateSecurity Support Services
17ISACANETWORKS AND INFRANetworks and Infrastructure Fundamentals CertificateNetwork & Systems Security Administration
18ISACACYBERSECURITYCybersecurity Fundamentals CertificateSecurity Support Services
19ISACAS/W DEVELOPMENTSoftware Development Fundamentals CertificateSecure Software Development
20ISACACLOUDCloud Fundamentals CertificateTechnology & System Security Architecture
21ISACABLOCKCHAINBlockchain Fundamentals CertificateTechnology & System Security Architecture
22ISACAIOTIoT Fundamentals CertificateICS Cybersecurity
23ISACAAIArtificial Intelligence Fundamentals CertificateTechnology & System Security Architecture
24ISC2CISSPCertified Information Systems Security ProfessionalCyber Defence
25ISC2SSCPSystem Security Certified PractitionerSystem Security Administration
26ISC2CCSPCertified Cloud Security ProfessionalSystem Security Administration
27ISC2CAPCertified Authorisation ProfessionalGovernance, Risk and Compliance
28ISC2CSSLPCertified Secure Software Lifecycle ProfessionalSecure Software Development
29ISC2HCISSPHealthcare Information Systems Security ProfessionalCyber Defence
30ISC2CISSP ISAPInformation System Security Engineering ProfessionalTechnology & System Security Architecture
31ISC2CISSP ISEPInformation System Security Management ProfessionalSystem Security Administration
32ISC2CISSP ISMPInformation System Security Architecture ProfessionalTechnology and System Security Architecture
33GIACGSECGIAC Security Essentials (GSEC)Cyber Defence
34GIACGCIAGIAC Certified Intrusion Analyst (GCIA)Cyber Defence
35GIACGMONGIAC Continuous Monitoring Certification (GMON)Cyber Defence
36GIACGCPMGIAC Certified Project Manager (GCPM)Cybersecurity Training & Awareness
37GIACGPENGIAC Penetration Tester (GPEN)Cyber Defence
38GIACGSOMGIAC Security Operations Manager (GSOM)Security Operations
39GIACGOSIGIAC Open Source Intelligence (GOSI)Cyber Vulnerability, Threat and Risk Management
40GIACGNFAGIAC Network Forensic Analyst (GNFA)Cyber Defence
41GIACGXPNGIAC Exploit Researcher and Advanced Penetration Tester (GXPN)Cyber Defence
42GIACGWAPTGIAC Web Application Penetration Tester (GWAPT)Cyber Defence
43GIACGREMGIAC Reverse Engineering Malware (GREM)Cyber Defence
44GIACGCIHGIAC Certified Incident Handler (GCIH)Cyber Vulnerability, Threat and Risk Management
45GIACGCCCGIAC Critical Controls Certification (GCCC)Cyber Vulnerability, Threat and Risk Management
46GIACGCFAGIAC Certified Forensic Analyst (GCFA)Cyber Forensics and Investigation
47GIACGCFSGIAC Certified Forensic Examiner (GCFE)Cyber Forensics and Investigation
48GIACGSTRTGIAC Strategic Planning, Policy, and Leadership (GSTRT)Governance, Risk and Compliance
49GIACGISPGIAC Information Security Professional (GISP) 
50GIACGLEGGIAC Law of Data Security & Investigations (GLEG)Governance, Risk and Compliance
51GIACGWEBGIAC Certified Web Application Defender (GWEB)Applications and Data Security Administration
52GIACGSOCGIAC Security Operations Certified (GSOC)Security Operations
53GIACGSNAGIAC Systems and Network Auditor (GSNA)System Security Administration, Network Security Administration
54GIACGSLCGIAC Security Leadership (GSLC)Governance, Risk & Compliance
55GIACGRIDGIAC Response and Industrial Defence (GRID)Cyber Vulnerability, Threat and Risk Management
56GIACGPYCGIAC Python Coder (GPYC)Multiple domains
57GIACGPCSGIAC Public Cloud Security (GPCS)System Security Administration
58GIACGMOBGIAC Mobile Device Security Analyst (GMOB)System Security Administration
59GIACGISFGIAC Information Security Fundamentals (GISF)Cyber Defence
60GIACGICSPGlobal Industrial CSP (GICSP)Cyber Vulnerability, Threat and Risk Management
61GIACGFACTGIAC Foundational Cybersecurity Technologies (GFACT)Cyber Vulnerability, Threat and Risk Management
62GIACGEVAGIAC Enterprise Vulnerability Assessor (GEVA)Cyber Defence
63GIACGDSAGIAC Defensible Security Architecture (GDSA)Cyber Defence
64GIACGDATGIAC Defending Advanced Threats (GDAT)Cyber Defence
65GIACGCWNGIAC Certified Windows Security Administrator (GCWN)System Security Administration
66GIACGCTIGIAC Cyber Threat Intelligence (GCTI)Cyber Vulnerability, Threat and Risk Management
67GIACGCSAGIAC Cloud Security Automation (GCSA)Cyber Vulnerability, Threat and Risk Management
68GIACGCPNGIAC Cloud Penetration Tester (GCPN)Cyber Defence
69GIACGCLDGIAC Cloud Security Essentials (GCLD)Cyber Vulnerability, Threat and Risk Management
70GIACGCIPGIAC Critical Infrastructure Protection (GCIP)Cyber Defence
71GIACGCEDGIAC Certified Enterprise Defender (GCED)Cyber Vulnerability, Threat and Risk Management
72GIACGCDAGIAC Certified Detection Analyst (GCDA)Cyber Forensics and Investigation
73GIACGAWNGIAC Assessing and Auditing Wireless Networks (GAWN)Governance, Risk & Compliance
74GIACGBFAGIAC Battlefield Forensics and Acquisition (GBFA)Cyber Forensics and Investigation
75GIACGASFGIAC Advanced Smartphone Forensics (GASF)Cyber Forensics and Investigation
76GIACGIMEGIAC iOS and MacOS Examiner (GIME)Cyber Forensics and Investigation
77CompTIA N/ACompTIA IT FundamentalsCyber Defence
78CompTIA N/ACompTIA A+Cyber Defence
79CompTIA N/ACompTIA Network+Network Security Administration
80CompTIA N/ACompTIA Security+System Security Administration
81CompTIA N/ACompTIA Cloud+System Security Administration
82CompTIA N/ACompTIA Linux+System Security Administration
83CompTIA N/ACompTIA Server+System Security Administration
84CompTIA N/ACompTIA CySA+Cyber Vulnerability, Threat and Risk Management
85CompTIA N/ACompTIA CASP+Cyber Vulnerability, Threat and Risk Management
86CompTIA N/ACompTIA Pen Test+Cyber Defence
87CompTIA N/ACompTIA Data+Cyber Defence
88CompTIA N/ACompTIA Project+Cyber Defence
89CompTIA N/ACompTIA CTT+Cyber Defence
90CompTIA N/ACompTIA Cloud Essentials+Cyber Defence
91AccreditedBodiesN/ABusiness Continuity Professional CertificationCyber Defence
92AccreditedBodiesN/ALead Auditor in ISO 27001Governance, Risk & Compliance
93AccreditedBodiesN/ALead Implementor in ISO 27001Governance, Risk & Compliance