Listing all results (14182)

Lesson 7 - Being part of the solution: End-of-unit test and careers in cybersecurity

This lesson enables the learners to engage in a comprehensive end-of-unit assessment covering aspects from each of the preceding six lessons. In addition, it provides some inspiration for the learners to get involved with cybersecurity for themselves, for the benefit of their...

Lesson 6 - Where is the danger? How companies can test their own vulnerability

This lesson builds on the previous ones about the different types of automated and non-automated cybercrime. Learners will begin to understand how companies can and do test their own vulnerability to cybercrime.

This lesson is the sixth in a seven session teaching unit...

Lesson 5 - Fighting fire with fire: Network design as defence

This lesson builds on the previous one, which taught learners about the ways in which companies design software that discourages cybercrime and how they use software to avoid cybercrime. In this lesson, the learners will find out about ways to protect network systems from cybercrime. It leads on to...

Lesson 4 - Fighting fire with fire: Software design as defence

This lesson builds on the previous lesson, which taught learners about the ways in which companies test their own vulnerability. In this lesson, the learners discover ways to protect software systems all the way from design to access. It leads on to Lesson 5, in which the learner discovers how...

Lesson 3 - Be suspicious: Automated cybercrime

This lesson builds on the previous one, which was about non-automated cybercrime, to enable learners to distinguish between non-automated and automated cybercrime. Learners will begin to understand terms and techniques related to automated cybercrime and the vulnerabilities of a network or software that...

Lesson 2 - Be suspicious: Non-automated cybercrime

This lesson enables the learners to distinguish between non-automated and automated cybercrime. Most of the lesson focuses on social engineering and introduces the idea that humans are the weakest link in the security chain. The learners will learn how to recognise and categorise different types of...

Lesson 1 - The cost of cybercrime and hacker motivation

This lesson introduces the subject of cybersecurity to your learners. They will begin to understand the difference between cybersecurity and network security and understand that although networks are wonderful inventions, they can make an organisation vulnerable to attack. They will get a sense of the...

Security - Overview

This resource provides a unit overview for the Years 10 and 11 'Security’ unit of work. It gives a clear overview of objectives to be covered within each session and a learning graph to show the range of skills being developed through this computing unit.

Lesson 6 - Remote working

Well-being is an integral part of society nowadays and will continue to be so. This lesson will encourage learners to consider the benefits and drawbacks of working remotely to their physical and mental well-being. It will also allow them to consider the well-being of those close to them. ...

Lesson 5 - Creating personal networks

The purpose of this lesson is to instruct learners about methods of constructing personal networks, which is an essential skill if they are to continue into the workforce as remote workers. The ability to create a personal network will also be useful in many other scenarios. ...

Pages

View all publishers