Aims & Outcomes

By the end you should be able to:-


  1. Describe current tools and techniques used by ethical and malicious hackers to compromise security systems.
  2. Explain current legislation relating to computer crime and hacking.
  3. Perform a routine penetration test on a computer system within a controlled environment.
something

For each outcome, course participants should be able to:-

security fundementals

Outcome 1

Describe current tools and techniques used by ethical and malicious hackers to compromise security systems.

  1. Describe the phases of an ethical hack and a malicious cyber-attack.
  2. Describe different computer tools and techniques that can be used to compromise computer systems.
  3. Describe different social engineering tools and techniques that could be used to compromise computer systems.
data security

Outcome 2

Explain current legislation relating to computer crime and hacking.

  1. Explain current legislation relating to computer crime and hacking.
  2. Explain the use of a simple framework for engaging in penetration testing activities that protects organisations and individuals from prosecution.
  3. Explain the use of a simple framework for engaging in penetration testing activities that protects organisations and individuals from loss of confidentiality, integrity and availability of computer systems.
digital forensics

Outcome 3

Perform a routine penetration test on a computer system within a controlled environment.

  1. Identify the scope of a routine penetration test on a computer system.
  2. Perform reconnaissance on a penetration test scenario's footprint.
  3. Perform scanning and enumeration on a penetration test.
  4. Perform vulnerability and scanning on a penetration test.
  5. Identify the risks, threats and vulnerabilities that have been exposed by the penetration test.
  6. Communicate the results of a penetration test.
  7. Maintain a professional and ethical standing throughout all phases of a penetration test.

Careers & the future


Cybersecurity is one of the 'hottest' employment areas. Hardly a month goes by without some security scare being reported in the news. Government and business are all demanding experts in this area, so if you want to get an exciting and challenging career stopping and catching the bad guys; then this is the course for you.

As the need for cybersecurity specialists develops, more and more universities and colleges are beginning courses. So there will be plenty of opportunity to pursue your interests further and get a good start in a rapidly developing field.

Rounded Image
Tasks
Content for Accordion Panel 1
Placeholder image
Content for Accordion Panel 2
Content for Accordion Panel 3
You should be able to:-
  • Make the distinction between Data and Information.
  • Provide examples of where data becomes information.
  • Provide examples of personal data.

If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.

Cyber Security

  • Security Fundamentals
  • Data Security
  • Digital Forensics
  • Ethical Hacking
Supporting courses by the SQA Logo
css badge
html badgee