IT Security

This module allows candidates to understand the main concepts underlying the secure use of ICT in daily life and to use relevant techniques and applications to maintain a secure network connection, use the Internet safely and securely, and manage data and information appropriately.


On completion of this module the candidate will be able to:

  • Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft.
  • Protect a computer, device, or network from malware and unauthorised access.
  • Understand the types of networks, connection types, and network specific issues, including firewalls.
  • Browse the World Wide Web; communicate on the Internet securely.
  • Understand security issues related to communications, including e-mail and instant messaging.
  • Back up and restore data appropriately and safely; securely dispose of data and devices.

What are the benefits of this module?

  • Covers the key skills and main concepts relating to ICT, computers, devices, and software.
  • Certifies best practice in IT security.
  • Developed with input from computer users, subject matter experts, and practising computer professionals from all over the world. This process ensures the relevance and range of module content.

Syllabus

The Syllabus sets out the specific knowledge and skills that make up this module, as informed by input from subject matter experts from a wide range of computer societies and organisations.

Download the IT Security Module Syllabus (PDF)

Syllabus Overview:

CATEGORY SKILLSET

 

Security Concepts

  • Data Threats
  • Value of Information
  • Personal Security
  • File Security

 

Malware

  • Definition and Function
  • Types
  • Protection

 

 

Network Security

  • Networks
  • Network Connections
  • Wireless Security
  • Access Control

 

Secure Web Use

  • Web Browsing
  • Social Networking
  • Storage and Compression

 

Communications

  • E-mail
  • Instant Messaging

 

Secure Data Management

  • Securing and Backing up
  • Secure Destruction