This website will be undergoing scheduled maintenance at 6:30pm on Monday 13th Febuary. The website may be unaccessible momentarily during this time.

IT Security

IT Security Module Banner

This module allows candidates to understand the main concepts underlying the secure use of ICT in daily life and to use relevant techniques and applications to maintain a secure network connection, use the Internet safely and securely, and manage data and information appropriately.

On completion of this module the candidate will be able to:

  • Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft.
  • Protect a computer, device, or network from malware and unauthorised access.
  • Understand the types of networks, connection types, and network specific issues, including firewalls.
  • Browse the World Wide Web; communicate on the Internet securely.
  • Understand security issues related to communications, including e-mail and instant messaging.
  • Back up and restore data appropriately and safely; securely dispose of data and devices.

What are the benefits of this module?

  • Covers the skills needed to understand the key concepts relating to the importance of secure information and data, physical security, privacy, and identity theft.
  • Certifies best practice in IT security.
  • Developed with input from computer users, subject matter experts, and practising computer professionals from all over the world. This process ensures the relevance and range of module content.


The Syllabus sets out the specific knowledge and skills that make up this module, as informed by input from subject matter experts from a wide range of computer societies and organisations.

Download the IT Security Module Syllabus (PDF)

IT Security Syllabus Overview:

Security Concepts
  • Data Threats
  • Value of Information
  • Personal Security
  • File Security
  • Definition and Function
  • Types
  • Protection
Network Security
  • Networks
    Network Connections
    Wireless Security
    Access Control
Secure Web Use
  • Web Browsing
  • Social Networking
  • E-mail
  • Instant Messaging
Secure Data Management
  • Securing and Backing Up Data
  • Secure Destruction