Unit code: F/617/1165
RQF level: 3
Aim
In this unit the learner will look at IT networks and the various components and architecture as they relate to the topic of ‘cyber security’. This unit will break down the processes involved in IT networkbased communications and protocols and introduce and explain the OSI Model of computer communication and interoperability. One dedicated lesson will address: ‘How does the internet work?’ The learner will develop an understanding of the more popular and destructive methods used to carry out attacks including case studies in Botnets, Trojans and other Malware. Key information security principles – including the ‘CIA Triad’ and ‘Access Controls’ – are introduced and explained within a business organisational context. This unit prepares learners to participate in the often-technical aspects of change management and configuration management committees and task groups that might be responsible for aspects of organisational cyber security. A range of industry case studies will be used throughout this unit in order to upskill the learner and provide an ‘helicopter’ view of network architecture, communications and underpinning protocols.
Learning Outcomes and Assessment Criteria
Learning Outcomes. To achieve this unit a learner must be able to: | Assessment Criteria: Assessment of these outcomes demonstrates a learner can: |
1 Understand computer networking environments and ICT operate at a strategic level within a business organisation |
1.1 Explain direct risks and threats to different types of network configurations within business organisations 1.2 Describe the OSI Model layers and 1.3 Apply these within your formal risk assessment summative assessment |
2 Understand the threats and risks posed to LANs and WANs within a business organisation |
2.1 Assess defensive and offensive cyber security strategies and frameworks to protect LANs and WANs from threats and risks 2.2 Explain how the internet works and why it is nonhierarchical 2.3 Explain how computer programming works and why it is a fundamental issue to consider within an information security plan |
3 Understand the importance of identifying and prioritising risk treatments |
3.1 Calculate cyber threats and risks by way of a formal Risk Assessment for an organisation 3.2 Recommend remediation (treatments) within part of a formal Risk Assessment process for an organisation |