Understand that:
• the types and uses of tools and methods to assess the vulnerabilities in computer systems,
including port scanners, registry checker, website vulnerability scanners, vulnerability
detection and management software, and assessing user vulnerabilities
• the purpose of independent third-party review of a system and network designs before
implementation
• the applications and features of penetration testing for common threats, those in the
Open Web Application Security Project (OWASP) top 10.
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.