Skip to content
NPA Cyber Security Contents
Identify current legislation relating to computer crime.
Describe the basic methods that ethical and malicious hackers use to compromise computer systems.
Apply basic hacking methods to compromise computer systems in a controlled environment.
Describe current tools and techniques used by ethical and malicious hackers to compromise computer systems.
Explain current legislation relating to computer crime and hacking
Perform a routine penetration test on a computer system within a controlled environment.
Analyse current trends in cybercrime.
Evaluate contemporary legislation relating to cybercrime.
Perform a complex penetration test on a computer system in controlled environment.
There are no rows in this table
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (