Skip to main content

GCSE

Lesson 6 Where is the danger?

Curriculum > KS4 > Unit > Lesson

This lesson builds on the previous ones about the different types of automated and non-automated cybercrime. Learners will begin to understand how companies can and do test their own vulnerability to cybercrime.

Learning objectives

  • Describe different methods of identifying cybersecurity vulnerabilities, such as: penetration testing, ethical hacking, network forensics, commercial analysis tools, review of network and user policies

Package contents

  • Lesson plans
  • Learning graphs
  • Unit overviews
  • Activities
Log in to download

Not registered yet?

Create an account and get access to over 500 hours of free teaching resources.

Help us make these resources better

Provide your feedback

Or email us at info@teachcomputing.org