week 10

Cyber security protection plan

 

C1 Assessment of computer system vulnerabilities

Understand that:

• the types and uses of tools and methods to assess the vulnerabilities in computer systems,

including port scanners, registry checker, website vulnerability scanners, vulnerability

detection and management software, and assessing user vulnerabilities

• the purpose of independent third-party review of a system and network designs before

implementation

• the applications and features of penetration testing for common threats, those in the

Open Web Application Security Project (OWASP) top 10.


Last Updated
2018-08-29 14:21:05

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.

Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 9
Prev
Week 10
Prev
Week 11
Prev

Next