Unit Name: Implementing and Managing Cyber Security
Unit Code: K/618/7845
Level: 7
Credit: 20
GLH: 100
Unit Aims:
This unit aims to provide learners with the necessary knowledge and understanding of securing computing systems and how to implement and manage cyber security in an enterprise environment. The unit will focus on the core principles to consider in order to secure systems appropriately. Learners will develop the knowledge and skills relating to security, detection, information and attack management in order to protect an organization in the event of a cyber security attack.
Specifications for Level 7 Computing:
ATHE Level 7 Diploma in Computing Technologies Specification Final v1
Please click the link below to view the guidelines:
ATHE-Definition-of-GLH-TQT-and-Credits
Video Link 1:
Course Curriculum
1. Understand the principles of cyber security | |||
1.1 Explore the types of cyber-attacks that exist Details | 00:00:00 | ||
1.2 Analyze the implications to an organization of having a cyber attack Details | 00:00:00 | ||
1.3 Explain the organisational policies and procedures which need to be in place to protect against cyber security attacks Details | 00:00:00 | ||
1.4 Explore the benefit of monitoring users, devices, and activity on a network Details | 00:00:00 | ||
1M1 Examine the process of creating a cyber security culture in an organization Details | 00:00:00 | ||
1D1 Analyze how home working can increase the risks of a cyber security attack Details | 00:00:00 | ||
2. Understand the importance of user awareness | |||
2.1 Analyze the importance of training staff on cyber security Details | 00:00:00 | ||
2.2 Examine methods and content needed for training staff on cyber awareness Details | 00:00:00 | ||
2.3 Evaluate the processes used to keep up to date with emerging cyber trends Details | 00:00:00 | ||
2M1 Analyze how users contribute to cyber security risks Details | 00:00:00 | ||
2D1 Create a sample user information document on the current threats and protection methods to organizations Details | 00:00:00 | ||
3. Understand cyber security protection methods | |||
3.1 Analyze the purpose of implementing cyber security measures across an organization Details | 00:00:00 | ||
3.2 Evaluate the methods used to protect systems Details | 00:00:00 | ||
3.3 Analyse how to deploy security protection methods Details | 00:00:00 | ||
3.4 Analyse how to configure system settings to increase security Details | 00:00:00 | ||
3.5 Analyse the considerations to make when recommending cyber security protection methods Details | 00:00:00 | ||
4. Understand cyber security testing | |||
4.1 Evaluate the importance of completing vulnerability testing on a network Details | 00:00:00 | ||
4.2 Evaluate the importance of scheduling simulated attacks on a network Details | 00:00:00 | ||
4.3 Explain how to configure and test application and network security Details | 00:00:00 | ||
4M1 Analyse the impact cyber security testing has on an organization’s cyber security rating Details | 00:00:00 | ||
5. Understand how to manage a cyber-attack | |||
5.1 Analyse the steps to take when there are indicators of a cyber attack Details | 00:00:00 | ||
5.2 Explain the communication methods used to inform stakeholders of a potential or actual cyber attack Details | 00:00:00 | ||
5.3 Examine the process of completing a root cause analysis Details | 00:00:00 | ||
5.4 Evaluate changes in cyber security working practices as a result of findings Details | 00:00:00 | ||
6. Be able to manage cyber security in an organization | |||
6.1 Install protection methods on end point devices Details | 00:00:00 | ||
6.2 Setup and configure group policies on software Details | 00:00:00 | ||
6.3 Setup and configure monitoring software on a network Details | 00:00:00 | ||
6D1 Create a documented plan on how to manage a cyber-attack in an enterprise environment Details | 00:00:00 | ||
Slides for Implementing and Managing Cyber Security | |||
Implementing and Managing Cyber Security Lecture 1 Slides Details | 00:00:00 | ||
Implementing and Managing Cyber Security Lecture 2 Slides Details | 00:00:00 | ||
Implementing and Managing Cyber Security Lecture 3 Slides Details | Unlimited | ||
Implementing and Managing Cyber Security Lecture 4 Slides Details | Unlimited | ||
Implementing and Managing Cyber Security Lecture 5 Slides Details | Unlimited | ||
Implementing and Managing Cyber Security Lecture 6 Slides Details | 00:00:00 | ||
Implementing and Managing Cyber Security Lecture 7 Slide Details | 00:00:00 | ||
Recorded Lectures for Implementing and Managing Cyber Security | |||
Lecture 1 Implementing and Managing Cyber Security Details | 00:00:00 | ||
Lecture 2 Implementing and Managing Cyber Security Details | 00:00:00 | ||
Lecture 3 Implementing and Managing Cyber Security Details | 00:00:00 | ||
Lecture 4 Implementing and Managing Cyber Security Details | 00:00:00 | ||
Lecture 5 Implementing and Managing Cyber Security Details | 00:00:00 | ||
Lecture 6 Implementing and Managing Cyber Security Details | 00:00:00 | ||
Assignment Brief for Implementing and Managing Cyber Security | |||
Assignment Brief for Implementing and Managing Cyber Security Details | 00:00:00 |
Course Reviews
No Reviews found for this course.