Search this site
Embedded Files
Skip to main content
Skip to navigation
Cybersecurity - Thomas Curwen
Home
Unit 1
1.1 The concepts of cyber security
1.2 The importance of cyber security
1.3 The consequences and implications of inadequate cyber security
2.1 Define core terminology used in cyber security
2.2 Explain the terms good actors and bad actors
2.3 Distinguish typical behaviours of good actors and bad actors
2.4 Explain the motivations of good actors and bad actors
2.5 Identify key sectors that are most vulnerable to a cyber attack
2.6 Compare the motivations for a cyber attack in key sectors
2.7 Consider how an actor may carry out a cyber attack
3.1 Describe the term security by design
3.2 Explore the principles of security by design
3.3 The consequences of not considering cyber security during the design p
3.4 The advantages and disadvantages of security by design
Unit 2
1.1 Key concepts of cyber threat intelligence
1.2 Terms related to cyber security
1.3 The threat intelligence lifecycle
1.4 How to find out about emerging attack techniques and how to recognise
1.5 What could be included in open source intelligence data sets
1.6 Why it is important to use only reliable and valid sources of Open Sou
1.7 The importance of using reliable sources of information in relation to
1.8 Current threat status and making possible recommendations based on cyb
1.9 Relevant cyber threat intelligence information requirements for an org
2.1 Some different threat models
2.2 The steps within a threat model
2.3 Evaluate a threat model
3.1 Types of malicious software
3.2 The effects of different types of malicious software on an infected sy
3.3 The motives for using specific malicious software attacks
3.4 Specific malicious software attacks can be made more effective due to
4.1 The term ‘social engineering'
4.2 How open source intelligence can be used in social engineering
4.3 Ways a social engineering attack could take place
Unit 3
1.1 Different types of cyber security testing
1.2 Why is cyber security testing important?
1.3 Compare types of cyber security testing
1.4 Consider mitigations following cyber security testing
1.5 Why it is important to retest following any changes made
1.6 How the outcomes of cyber security testing can be reported
1.7 Why the outcomes of cyber security testing must be reported
2.1 Identify cyber security vulnerabilities
2.2 The steps to be taken when a vulnerability has been identified
2.3 Apply the correct response to the vulnerability
2.4 Develop an appropriate communication to mitigate future vulnerabilitie
3.1 Identify cyber security controls
3.2 Explain a basic cyber security framework
3.3 Evaluate a cyber security framework
4.1 How to apply controls
4.2 Implement a basic cyber security control
4.3 Justify the implementation of the chosen cyber security contro
4.4 Explain why a control might not be applied
Unit 4
1.1 Describe what a cyber security incident response plan is used for
1.2 Explain when a cyber security incident response plan is used
1.3 Describe the stages of a cyber security incident response lifecycle
2.1 Explain why it is important to maintain an up-to-date cyber security in
2.2 Explain the steps to be included in a cyber security incident response
2.3 Why it is important to have a cyber security incident response plan
2.4 Develop a cyber security incident response plan for an organisation
3.1 What is meant by an incident post-mortem
3.2 The structure of an incident post-mortem
The importance of intensity, rigour and discipline when carrying out an i
3.4 Create a post-mortem report of an incident
3.5 Reflect on the report and make recommendations based on the findings
Unit 5
1.1 How legislation impacts on cyber security
1.2 Trends in international law for cyberspace
2.1 ISO standards related to cyber security
2.2 How ISO standards are used to support cyber security
3.1 Ethical conduct within cyber security
3.2 Unethical conduct within cyber security
Unit 6
1.1 The importance of managing and promoting a positive digital identity
1.2 Possible employee screening checks that an employer might carry out
1.3 Potential consequences of unsatisfactory findings as a result of emplo
1.4 Levels of security clearance
1.5 How bias can influence cyber security
1.6 The benefits of a security-by-design mindset
2.1 Skills required for a career in cyber security
2.2 A personal skills analysis
2.3 Assess your skills against those required for a career in cyber securit
2.4 Create a personal development plan
3.1 Continuous professional development
3.2 Methods for keeping up to date with industry knowledge
Cybersecurity - Thomas Curwen
Home
Unit 1
1.1 The concepts of cyber security
1.2 The importance of cyber security
1.3 The consequences and implications of inadequate cyber security
2.1 Define core terminology used in cyber security
2.2 Explain the terms good actors and bad actors
2.3 Distinguish typical behaviours of good actors and bad actors
2.4 Explain the motivations of good actors and bad actors
2.5 Identify key sectors that are most vulnerable to a cyber attack
2.6 Compare the motivations for a cyber attack in key sectors
2.7 Consider how an actor may carry out a cyber attack
3.1 Describe the term security by design
3.2 Explore the principles of security by design
3.3 The consequences of not considering cyber security during the design p
3.4 The advantages and disadvantages of security by design
Unit 2
1.1 Key concepts of cyber threat intelligence
1.2 Terms related to cyber security
1.3 The threat intelligence lifecycle
1.4 How to find out about emerging attack techniques and how to recognise
1.5 What could be included in open source intelligence data sets
1.6 Why it is important to use only reliable and valid sources of Open Sou
1.7 The importance of using reliable sources of information in relation to
1.8 Current threat status and making possible recommendations based on cyb
1.9 Relevant cyber threat intelligence information requirements for an org
2.1 Some different threat models
2.2 The steps within a threat model
2.3 Evaluate a threat model
3.1 Types of malicious software
3.2 The effects of different types of malicious software on an infected sy
3.3 The motives for using specific malicious software attacks
3.4 Specific malicious software attacks can be made more effective due to
4.1 The term ‘social engineering'
4.2 How open source intelligence can be used in social engineering
4.3 Ways a social engineering attack could take place
Unit 3
1.1 Different types of cyber security testing
1.2 Why is cyber security testing important?
1.3 Compare types of cyber security testing
1.4 Consider mitigations following cyber security testing
1.5 Why it is important to retest following any changes made
1.6 How the outcomes of cyber security testing can be reported
1.7 Why the outcomes of cyber security testing must be reported
2.1 Identify cyber security vulnerabilities
2.2 The steps to be taken when a vulnerability has been identified
2.3 Apply the correct response to the vulnerability
2.4 Develop an appropriate communication to mitigate future vulnerabilitie
3.1 Identify cyber security controls
3.2 Explain a basic cyber security framework
3.3 Evaluate a cyber security framework
4.1 How to apply controls
4.2 Implement a basic cyber security control
4.3 Justify the implementation of the chosen cyber security contro
4.4 Explain why a control might not be applied
Unit 4
1.1 Describe what a cyber security incident response plan is used for
1.2 Explain when a cyber security incident response plan is used
1.3 Describe the stages of a cyber security incident response lifecycle
2.1 Explain why it is important to maintain an up-to-date cyber security in
2.2 Explain the steps to be included in a cyber security incident response
2.3 Why it is important to have a cyber security incident response plan
2.4 Develop a cyber security incident response plan for an organisation
3.1 What is meant by an incident post-mortem
3.2 The structure of an incident post-mortem
The importance of intensity, rigour and discipline when carrying out an i
3.4 Create a post-mortem report of an incident
3.5 Reflect on the report and make recommendations based on the findings
Unit 5
1.1 How legislation impacts on cyber security
1.2 Trends in international law for cyberspace
2.1 ISO standards related to cyber security
2.2 How ISO standards are used to support cyber security
3.1 Ethical conduct within cyber security
3.2 Unethical conduct within cyber security
Unit 6
1.1 The importance of managing and promoting a positive digital identity
1.2 Possible employee screening checks that an employer might carry out
1.3 Potential consequences of unsatisfactory findings as a result of emplo
1.4 Levels of security clearance
1.5 How bias can influence cyber security
1.6 The benefits of a security-by-design mindset
2.1 Skills required for a career in cyber security
2.2 A personal skills analysis
2.3 Assess your skills against those required for a career in cyber securit
2.4 Create a personal development plan
3.1 Continuous professional development
3.2 Methods for keeping up to date with industry knowledge
More
Home
Unit 1
1.1 The concepts of cyber security
1.2 The importance of cyber security
1.3 The consequences and implications of inadequate cyber security
2.1 Define core terminology used in cyber security
2.2 Explain the terms good actors and bad actors
2.3 Distinguish typical behaviours of good actors and bad actors
2.4 Explain the motivations of good actors and bad actors
2.5 Identify key sectors that are most vulnerable to a cyber attack
2.6 Compare the motivations for a cyber attack in key sectors
2.7 Consider how an actor may carry out a cyber attack
3.1 Describe the term security by design
3.2 Explore the principles of security by design
3.3 The consequences of not considering cyber security during the design p
3.4 The advantages and disadvantages of security by design
Unit 2
1.1 Key concepts of cyber threat intelligence
1.2 Terms related to cyber security
1.3 The threat intelligence lifecycle
1.4 How to find out about emerging attack techniques and how to recognise
1.5 What could be included in open source intelligence data sets
1.6 Why it is important to use only reliable and valid sources of Open Sou
1.7 The importance of using reliable sources of information in relation to
1.8 Current threat status and making possible recommendations based on cyb
1.9 Relevant cyber threat intelligence information requirements for an org
2.1 Some different threat models
2.2 The steps within a threat model
2.3 Evaluate a threat model
3.1 Types of malicious software
3.2 The effects of different types of malicious software on an infected sy
3.3 The motives for using specific malicious software attacks
3.4 Specific malicious software attacks can be made more effective due to
4.1 The term ‘social engineering'
4.2 How open source intelligence can be used in social engineering
4.3 Ways a social engineering attack could take place
Unit 3
1.1 Different types of cyber security testing
1.2 Why is cyber security testing important?
1.3 Compare types of cyber security testing
1.4 Consider mitigations following cyber security testing
1.5 Why it is important to retest following any changes made
1.6 How the outcomes of cyber security testing can be reported
1.7 Why the outcomes of cyber security testing must be reported
2.1 Identify cyber security vulnerabilities
2.2 The steps to be taken when a vulnerability has been identified
2.3 Apply the correct response to the vulnerability
2.4 Develop an appropriate communication to mitigate future vulnerabilitie
3.1 Identify cyber security controls
3.2 Explain a basic cyber security framework
3.3 Evaluate a cyber security framework
4.1 How to apply controls
4.2 Implement a basic cyber security control
4.3 Justify the implementation of the chosen cyber security contro
4.4 Explain why a control might not be applied
Unit 4
1.1 Describe what a cyber security incident response plan is used for
1.2 Explain when a cyber security incident response plan is used
1.3 Describe the stages of a cyber security incident response lifecycle
2.1 Explain why it is important to maintain an up-to-date cyber security in
2.2 Explain the steps to be included in a cyber security incident response
2.3 Why it is important to have a cyber security incident response plan
2.4 Develop a cyber security incident response plan for an organisation
3.1 What is meant by an incident post-mortem
3.2 The structure of an incident post-mortem
The importance of intensity, rigour and discipline when carrying out an i
3.4 Create a post-mortem report of an incident
3.5 Reflect on the report and make recommendations based on the findings
Unit 5
1.1 How legislation impacts on cyber security
1.2 Trends in international law for cyberspace
2.1 ISO standards related to cyber security
2.2 How ISO standards are used to support cyber security
3.1 Ethical conduct within cyber security
3.2 Unethical conduct within cyber security
Unit 6
1.1 The importance of managing and promoting a positive digital identity
1.2 Possible employee screening checks that an employer might carry out
1.3 Potential consequences of unsatisfactory findings as a result of emplo
1.4 Levels of security clearance
1.5 How bias can influence cyber security
1.6 The benefits of a security-by-design mindset
2.1 Skills required for a career in cyber security
2.2 A personal skills analysis
2.3 Assess your skills against those required for a career in cyber securit
2.4 Create a personal development plan
3.1 Continuous professional development
3.2 Methods for keeping up to date with industry knowledge
Unit 5
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse