GCSE – Lesson 6 – Where is the danger?
This lesson builds on the previous ones about the different types of automated and non-automated cybercrime. Learners will begin to understand how companies can and do test their own vulnerability to cybercrime.
- Describe different methods of identifying cybersecurity vulnerabilities, such as: penetration testing, ethical hacking, network forensics, commercial analysis tools, review of network and user policies
- Lesson plans
- Slide decks
- Learner resources
Don't have an account?
Enjoyed teaching these lessons? Found a mistake?
Fill in a short form to give feedback on these resources.