Unit 11 Cyber Security and Incident Management
BTEC Information Technology
Learning Aim A
Cyber Security Threats
Why is identifying vulnerabilities just as important as defending against attacks?
Start Here: 1 Video Explainer
Understand the different types of vulnerabilities in systems
Resource 1: System Vulnerabilities Video Explainer, Produced by NotebookLM (Length 6:51)
2 Key Knowledge Points
Connect main ideas and concepts
Resource 2: System Vulnerabilities Infographic by NotebookLM
3 Knowledge Questions
Task: Complete Topic 4 in Workbook 1 - use the slide deck below to help you.