This course will allow students to learn about cybercrime. Learners will investigate the accidental and malicious security threats that exist to IT systems and data. They will learn about system vulnerabilities and the tools and techniques used to protect users from risks and potential damage, including loss of data, loss of data integrity and unauthorised access to data. Looking at the following assessment criteria: 1.1 Describe the types of threat to IT systems and data. 1.2 Explain the factors that affect the vulnerability of IT systems and data. 2.1 Explain measures to protect IT systems and data from current and evolving threats. 2.2 Compare different physical security measures used to protect IT systems and data. 3.1 Create a user access control system to restrict unauthorised access. 3.2 Demonstrate how ethical hacking can be used to protect IT systems and data. 4.1 Summarise the legal requirements and IT security policies and procedures that exist to protect IT systems and data. 4.2 Explain ethical and unethical conduct when using IT systems.