Description:
A pre-course interview is required for this course, please contact 0161 253 5772 to arrange.
This qualification is designed for learners to advance their knowledge about cybersecurity. They will understand the theory behind types of cyber threats and the measures taken to protect IT systems and data. The learner will also use practical methods to demonstrate ethical hacking including vulnerability scanning, penetration testing and user access control.
By the end of Level 2, I will be able to:
Describe types of threat to IT systems and data.
Explain the factors that can affect the vulnerability of IT systems and data.
Explain measures to protect IT systems and data from current and evolving threats.
Compare different physical security measures used to protect IT systems and data.
Create a user access control system to restrict unauthorised access.
Demonstrate how ethical hacking can be used to protect IT systems and data.
Summarise the legal requirements and IT security policies and procedures that exist to protect IT systems and data.
Course information sheet