outcomes

ethical hacking
ID
outcome
level
theme
4.1
Identify current legislation relating to computer crime.
legal aspects
4.2
Describe the basic methods that ethical and malicious hackers use to compromise computer systems.
hacking techniques
4.3
Apply basic hacking methods to compromise computer systems in a controlled environment.
practical hacking
5.1
Describe current tools and techniques used by ethical and malicious hackers to compromise computer systems.
personal data
5.2
Explain current legislation relating to computer crime and hacking
legal aspects
5.3
Perform a routine penetration test on a computer system within a controlled environment.
practical hacking
6.1
Analyse current trends in cybercrime.
hacking techniques
6.2
Evaluate contemporary legislation relating to cybercrime.
legal aspects
6.3
Perform a complex penetration test on a computer system in controlled environment.
practical hacking
There are no rows in this table
9
Count

virus

other malware

legislation
penetration testing
trends in cybercrime
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.