JavaScript Required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
NPA Cyber Security Contents
Data Security
Ethical Hacking
Digital Forensics
formative assessment
More
Share
Explore
Ethical Hacking
Outcomes and performance criteria
outcomes
ethical hacking
ethical hacking
0
Search
ID
outcome
level
theme
1
4.1
Identify current legislation relating to computer crime.
legal aspects
2
4.2
Describe the basic methods that ethical and malicious hackers use to compromise computer systems.
hacking techniques
3
4.3
Apply basic hacking methods to compromise computer systems in a controlled environment.
practical hacking
4
5.1
Describe current tools and techniques used by ethical and malicious hackers to compromise computer systems.
personal data
5
5.2
Explain current legislation relating to computer crime and hacking
legal aspects
6
5.3
Perform a routine penetration test on a computer system within a controlled environment.
practical hacking
7
6.1
Analyse current trends in cybercrime.
hacking techniques
8
6.2
Evaluate contemporary legislation relating to cybercrime.
legal aspects
9
6.3
Perform a complex penetration test on a computer system in controlled environment.
practical hacking
There are no rows in this table
9
Count
virus
virus
0
other malware
other malware
0
legislation
legislation
0
penetration testing
penetration testing
0
trends in cybercrime
trends in cybercrime
0
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.