week 10
Cyber security protection plan
C1 Assessment of computer system vulnerabilities
Understand that:
• the types and uses of tools and methods to assess the vulnerabilities in computer systems,
including port scanners, registry checker, website vulnerability scanners, vulnerability
detection and management software, and assessing user vulnerabilities
• the purpose of independent third-party review of a system and network designs before
implementation
• the applications and features of penetration testing for common threats, those in the
Open Web Application Security Project (OWASP) top 10.
Last Updated
2018-08-29 14:21:05
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Files that support this week
Week 9←
PrevWeek 10←
PrevWeek 11←
Prev→
Next