Unit Name: Introduction to Cyber Security
Unit Code: J/618/4175
Level: 3 Â Â
Credit: 10Â Â Â Â
GLH: 60
 Â
Please click the link below to view guidelines:
ATHE Definition of GLH, TQT, and Credits
Please click the following link to view the ATHE Specifications for Level 3 Computing (Diploma and Information and Digital Technologies):
ATHE Level 3 Diploma in Information and Digital Technologies
 Unit Aims:
This unit aims to provide an overview of cyber security and the importance of keeping yourself and systems safe when online. Learners will develop an understanding of the basics of security and the appropriate measures to take to reduce security risks..
 Introductory Video:
Course Curriculum
1. Understand the basics of cyber security | |||
1.1 Explain the importance of understanding cyber security Details | 00:00:00 | ||
1.2 Describe how to keep up to date with new security attacks Details | 00:00:00 | ||
1.3 Describe the typical mind-sets of hackers Details | 00:00:00 | ||
1.4 Outline the different types of malware that exist Details | 00:00:00 | ||
1.5 Describe the different types of cyber-attacks that exist Details | 00:00:00 | ||
1M1 Explain the advantages of understanding hacker’s mind-sets Details | 00:00:00 | ||
1D1 Evaluate a range of security attacks and identify areas for improvement Details | 00:00:00 | ||
2. Understand how to keep yourself and others safe when working online | |||
2.1 Explain methods of keeping safe when using social networks Details | 00:00:00 | ||
2.2 Describe how social networks create your personal brand Details | 00:00:00 | ||
2.3 Explain how to protect your reputation online Details | 00:00:00 | ||
2.4 Explain methods of keeping safe when working online Details | 00:00:00 | ||
3. Understand appropriate security measures to implement | |||
3.1 Explain the types of cyber-attacks to look out for Details | 00:00:00 | ||
3.2 Identify legislation relating to cyber security Details | 00:00:00 | ||
3.3 Outline policies that could be implemented in a chosen work environment Details | 00:00:00 | ||
3.4 Explain effective prevention methods Details | 00:00:00 | ||
3.5 Describe how to protect systems, people and processes Details | 00:00:00 | ||
4. Understand how to manage cyber security risks | |||
 4.1 Identify risk management techniques Details | 00:00:00 | ||
4.2 Create a cyber security risk register Details | 00:00:00 | ||
 4.3 Explain how to monitor cyber security risks Details | 00:00:00 | ||
4.4 Create a risk response plan Details | 00:00:00 | ||
4.5 Describe the importance of cyber security when designing a new system Details | 00:00:00 | ||
4.6 Create a disaster recovery plan Details | 00:00:00 | ||
4M1 Explain the benefits of having a risk register Details | 00:00:00 | ||
4D1 Evaluate the impact that a preventive measure would have on a potential risk Details | 00:00:00 | ||
5. Implement security measures on a range of devices | |||
5.1 Install and configure security measures on mobile devices Details | 00:00:00 | ||
5.2 Install and configure security measures on desktop based devices Details | 00:00:00 | ||
5.3 Install and configure security measures on cloud based systems Details | 00:00:00 | ||
 5M1 Configure security policies to protect devices Details | 00:00:00 | ||
5D1 Assess the benefits of centrally managing and controlling devices for an organization Details | 00:00:00 | ||
Slides for Introduction to Cyber Security | |||
Introduction to Cyber Security Lecture 1 Slides Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 2 Slides Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 3 Slides Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 4 Slides Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 5 Slides Details | 00:00:00 | ||
Slides for Introduction to Cyber Security Batch 2 | |||
Introduction to Cyber Security Lecture 1 Slides B2 Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 2 Slides B2 Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 4 Slides B2 Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 5 Slides B2 Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 6 Slides B2 Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 7 Slides B2 Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 8 Slides B2 Details | 00:00:00 | ||
Introduction to Cyber Security Lecture 10 Slides B2 Details | 00:00:00 | ||
Recorded Lectures for Introduction to Cyber Security | |||
Lecture 1 Introduction to Cyber Security Details | 00:00:00 | ||
Lecture 2 Introduction to Cyber Security Details | 00:00:00 | ||
Lecture 3 Introduction to Cyber Security Details | 00:00:00 | ||
Lecture 4 Introduction to Cyber Security Details | 00:00:00 | ||
Lecture 5 Introduction to Cyber Security Details | 00:00:00 | ||
Lecture 6 Introduction to Cyber Security Assignment Brief Details | 00:00:00 | ||
Recorded Lectures for Introduction to Cyber Security Batch 2 | |||
Lecture 1 Introduction to Cyber Security B2 Details | 00:00:00 | ||
Lecture 2 Introduction to Cyber Security B2 Details | 00:00:00 | ||
Lecture 3 Introduction to Cyber Security B2 Details | 00:00:00 | ||
Lecture 4 Introduction to Cyber Security B2 Details | 00:00:00 | ||
Lecture 5 Introduction to Cyber Security Task 2 B2 Details | 00:00:00 | ||
Lecture 7 Introduction to Cyber Security B2 Details | 00:00:00 | ||
Lecture 8 Introduction to Cyber Security Task 3 B2 Details | 00:00:00 | ||
Lecture 9 Introduction to Cyber Security B2 Details | 00:00:00 | ||
Lecture 10 Introduction to Cyber Security B2 Details | 00:00:00 | ||
Lecture 11 Introduction to Cyber Security B2 Details | 00:00:00 | ||
Assignment Brief for Introduction to Cyber Security | |||
Assignment Brief of Introduction to Cyber Security Details | 00:00:00 |
Course Reviews
No Reviews found for this course.
34 STUDENTS ENROLLED