Cyber security and incident management

By AadamH
  • Introduction

    In this unit there will be different variants of the cyber security attacks, however, there is different techniques and systems that can be used in order to protect the organizations network systems. You will also be looking into and asses the risks such as preparing to deal with cyber security results and to help use protection and carry out the risk assessments. you could also use these incidents as evidence in order to make recommendations so security can be improved.
  • Assessment outcomes - AO1

    Display your knowledge and understand of the threats such as security threats, system vulnerabilities , technical language as well as security methods to avoid successful threats.
  • Assessment outcomes - AO2

    Use the mastery and understanding of the threats and use protection methods to stop risk assessments and select appropriate tools and fix them.
  • Assessment outcomes - AO3

    Examine forensic evidence in order to use and identify breaches and control the security incidents.
  • Assessment outcomes - AO4

    Judge security methods and protection documents to get a good sense in order to draw conclusions for their effectiveness.
  • Assessment outcomes - AO5

    Be able to defend using methods learnt to secure computer network to control and manage the justification.