
During this course, you will investigate the accidental and malicious security threats that exist to IT systems and data. You will learn about system vulnerabilities and the tools and techniques used to protect users from risks and potential damage, including loss of data, loss of data integrity and unauthorised access to data.
You will learn:
All applicants must have an initial assessment and interview to confirm that the course is suitable for them.
The method of assessment for the qualifications is through a portfolio of evidence.
This course may be free for you if you meet certain conditions:
Check here which documents you need to show us, and which visa types are allowed.
If you do not meet the residency rules, you can still enrol on the course but you may have to pay some fees. All applicants are fee-assessed during enrolment.
If you are not eligible for a free or reduced-cost course, you need to pay the full fee.
Some courses have additional costs, such as for specialist materials and trips.
Many of our students are eligible for financial support. See here for details.
Prepare learners for employment in the sector or a related sector.