Ethical Hacking

Framework for Protection Against Prosecution

Tasks
Content for Accordion Panel 1
Placeholder image
Content for Accordion Panel 2
Content for Accordion Panel 3
You should be able to:-
  • Make the distinction between Data and Information.
  • Provide examples of where data becomes information.
  • Provide examples of personal data.

If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.

Cyber Security

  • Security Fundamentals
  • Data Security
  • Digital Forensics
  • Ethical Hacking
Supporting courses by the SQA Logo
css badge
html badgee