week 10

Cyber security protection plan

 

C1 Assessment of computer system vulnerabilities

Understand that:

• the types and uses of tools and methods to assess the vulnerabilities in computer systems,

including port scanners, registry checker, website vulnerability scanners, vulnerability

detection and management software, and assessing user vulnerabilities

• the purpose of independent third-party review of a system and network designs before

implementation

• the applications and features of penetration testing for common threats, those in the

Open Web Application Security Project (OWASP) top 10.


Last Updated
2018-08-29 14:21:05

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.

Files that support this week


| | | | |
Week 9
Prev
Week 10
Prev
Week 11
Prev

Next

Next
Webmaster Spelling Notifications