In this module you will learn about:
forms of attack
• threats posed to networks: malware, phishing, people as the ‘weak point’ in secure systems (social engineering) , brute force attacks, denial of service attacks, data interception and theft, the concept of SQL injection, poor network policy,
• identifying and preventing vulnerabilities: penetration testing, network forensics, network policies, anti-malware software, firewalls, user access levels, passwords, encryption.
• threats posed to networks: malware, phishing, people as the ‘weak point’ in secure systems (social engineering) , brute force attacks, denial of service attacks, data interception and theft, the concept of SQL injection, poor network policy,
• identifying and preventing vulnerabilities: penetration testing, network forensics, network policies, anti-malware software, firewalls, user access levels, passwords, encryption.
Lesson 1:
Lesson 2: Forms of Attack |
Resources |
Starter:
10 mins: research a news story related to network security. Share with the class what happened and the consequences of incident.
|
|
Lesson 3: Types of Attack |
Resources |
Starter:
Recap activity from last lesson.
|
|
Lesson 4: Network Vulnerabilities |
Resources |
Starter:
Recap activity from last lesson. |
|
Lesson 5: Keeping Networks Secure |
Resources |
|
|
|
|
End of Unit Test
End of Unit Test | |
File Size: | 146 kb |
File Type: | docx |