GCSE – Lesson 6 – Where is the danger?
This lesson builds on the previous ones about the different types of automated and non-automated cybercrime. Learners will begin to understand how companies can and do test their own vulnerability to cybercrime.
Learning objectives
- Describe different methods of identifying cybersecurity vulnerabilities, such as: penetration testing, ethical hacking, network forensics, commercial analysis tools, review of network and user policies
Package contents
- Lesson plans
- Slide decks
- Learner resources
- Homework
Don't have an account?
GCSE revision
A comprehensive range of content and helpful practice questions are also available for this topic.
View on Ada Computer ScienceEnjoyed teaching these lessons? Found a mistake?
Fill in a short form to give feedback on these resources.