Unit 11 Cyber Security and Incident Management
BTEC Information Technology
Learning Aim C
Cyber Security Protection Plan
How do organisations identify and prioritise vulnerabilities before they can be exploited by attackers?
1 Video Explainer
Understand how different tools are used to assess vulnerabilities
Resource 1: Finding System Weak Spots Video Explainer by Notebook LM
2 Key Knowledge Points
Proactive Cyber Security: Assessing System Vulnerabilities
Resource 2: Assessing System Vulnerabilities Infographic by NotebookLM
3 Knowledge Questions
Task: Complete Topic 1 in Workbook 3
The answers can be found in the slide deck below. You should answer each question in your own words to develop your understanding.