Skip to main content

GCSE

Lesson 6 Where is the danger?

Curriculum > KS4 > Unit > Lesson

This lesson builds on the previous ones about the different types of automated and non-automated cybercrime. Learners will begin to understand how companies can and do test their own vulnerability to cybercrime.

Learning objectives

  • Describe different methods of identifying cybersecurity vulnerabilities, such as: penetration testing, ethical hacking, network forensics, commercial analysis tools, review of network and user policies

Package contents

  • Lesson plans
  • Learning graphs
  • Unit overviews
  • Activities
Log in to download

Not registered yet?

Create an account and get access to over 500 hours of free teaching resources.

GCSE revision

A comprehensive range of content and helpful practice questions are also available for this topic.

Help us make these resources better

Provide your feedback

Or email us at [email protected]