When & Where

Quick Facts

  • Availability Late starts accepted
  • Tutor Athos Pellapaisiotou
  • Course Code K23ITCA02A
  • Suitable For 19 year olds and up are permitted on this course

What you will learn

This single unit qualification is designed for learners to learn about cybercrime. They will understand routine protective methods used to maintain cybersecurity including the principles of vulnerability and penetration testing and user access control. While they can easily be offered as stand-alone bite-sized awards, the new qualifications could also be usefully combined with other units or qualifications into meaningful packages of learning.

Learning Outcomes

By the end of this course, you will be able to:

  • Accidental damage to physical equipment caused by employee/user
  • Accidental loss of data/power, unintentional disclosure of data, authorised user action
  • Physical damage, destruction by fire, flood or other disaster
  • Risk of bring your own device (BYOD)
  • Unsafe practices
  • The use of external storage devices/media
  • Visiting untrusted websites
  • Downloading/uploading files to/from the internet
  • File-sharing applications.

On successful completion of the course, you will achieve the following qualification: Award in Cybersecurity [GATEWAY]

Class format and activities

This course will allow students to learn about cybercrime. Learners will investigate the accidental and malicious security threats that exist to IT systems and data. They will learn about system vulnerabilities and the tools and techniques used to protect users from risks and potential damage, including loss of data, loss of data integrity and unauthorised access to data. Looking at the following assessment criteria: 1.1 Describe the types of threat to IT systems and data. 1.2 Explain the factors that affect the vulnerability of IT systems and data. 2.1 Explain measures to protect IT systems and data from current and evolving threats. 2.2 Compare different physical security measures used to protect IT systems and data. 3.1 Create a user access control system to restrict unauthorised access. 3.2 Demonstrate how ethical hacking can be used to protect IT systems and data. 4.1 Summarise the legal requirements and IT security policies and procedures that exist to protect IT systems and data. 4.2 Explain ethical and unethical conduct when using IT systems.

Entry requirements

Level 1 Cybersecurity and at least Entry 3 English & maths.

What you need to know before you enrol

You must make sure you can commit for the whole duration of the course. We expect you to commit to the course by having 90% or above in attendance. You are more likely to be successful if you attend all your lessons. The sessions are face to face at the North Kensington centre. From time to time we reserve the right to have an online lesson.

What you need

You will need a USB/Memory stick and a folder. Pens and paper will be required. You will need an access to a computer at home and do some independent studying.

What you can do next

Progress to a Level 3 qualification