Unit 11 Cyber Security and Incident Management 
BTEC Information Technology
Learning Aim A
Cyber Security Threats
What matters more for security: proving who you are, or controlling what you can do?
Start Here: 1 Video Explainer
Understand how authentication and access controls are used to secure systems
Resource 1: Authentication and Access Control Video Explainer, Produced by NotebookLM (Length 6:56)​​​​​​​
2 Key Knowledge Points
Connect main ideas and concepts
Resource 2: Authentication and Access Control Infographic by NotebookLM​​​​​​​
3 Knowledge Questions
Task: Complete Topic 8 in Workbook 1 - use the slide deck below to help you.
Resource 3: Slide Deck Produced by Gamma
Back to Top