Skip to content

outcomes

ethical hacking
ID
outcome
level
theme
1
4.1
Identify current legislation relating to computer crime.
legal aspects
2
4.2
Describe the basic methods that ethical and malicious hackers use to compromise computer systems.
hacking techniques
3
4.3
Apply basic hacking methods to compromise computer systems in a controlled environment.
practical hacking
4
5.1
Describe current tools and techniques used by ethical and malicious hackers to compromise computer systems.
personal data
5
5.2
Explain current legislation relating to computer crime and hacking
legal aspects
6
5.3
Perform a routine penetration test on a computer system within a controlled environment.
practical hacking
7
6.1
Analyse current trends in cybercrime.
hacking techniques
8
6.2
Evaluate contemporary legislation relating to cybercrime.
legal aspects
9
6.3
Perform a complex penetration test on a computer system in controlled environment.
practical hacking
There are no rows in this table
9
Count

virus

other malware

legislation
penetration testing
trends in cybercrime
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.