4.1
Identify current legislation relating to computer crime.
legal aspects
4.2
Describe the basic methods that ethical and malicious hackers use to compromise computer systems.
hacking techniques
4.3
Apply basic hacking methods to compromise computer systems in a controlled environment.
practical hacking
5.1
Describe current tools and techniques used by ethical and malicious hackers to compromise computer systems.
personal data
5.2
Explain current legislation relating to computer crime and hacking
legal aspects
5.3
Perform a routine penetration test on a computer system within a controlled environment.
practical hacking
6.1
Analyse current trends in cybercrime.
hacking techniques
6.2
Evaluate contemporary legislation relating to cybercrime.
legal aspects
6.3
Perform a complex penetration test on a computer system in controlled environment.
practical hacking