Course curriculum

  • 1
    NCFE Level 2 Certificate in Understanding Data Protection and Data Security
    • COURSE CONTENT
  • 2
    Welcome to the course!
    • How to use this course
    • Before we begin...
    • Student handbook_NESCOT
  • 3
    UNIT 1
    • How to use your learning materials
    • Overview
    • WHAT IS GDPR ? WHY DO WE NEED TO KNOW OR LEARN ABOUT THIS NEW LEGISLATION ? by- WSJ, 2019 (Courtesy)
    • Section 1: Understand current data protection legislation (Part 1)
    • Section 1: Understand current data protection legislation (Part 2)
    • Knowledge Activity 1:
    • Section 1: Understand current data protection legislation (Part 3)
    • Example / Case Study
    • Section 1: Understand current data protection legislation (Part 4)
    • Examples/ Case Studies
    • Knowledge Activity 2:
    • Section 1: Understand current data protection legislation (Part 5)
    • Section 1: Understand current data protection legislation (Part 6)
    • Knowledge Activity 3:
    • Section 1: Understand current data protection legislation (Part 7)
    • Knowledge Activity 4
    • Unit 1: Summary
  • 4
    Chapter 1
    • Section 2: Understand organisational procedures concerning data (Part 1 )
    • Section 2: Understand organisational procedures concerning data (Part 2 )
    • Section 2: Understand organisational procedures concerning data ( Part 3 )
    • Section 2: Understand organisational procedures concerning data ( Part 4 )
    • Section 2: Understand organisational procedures concerning data ( Part 5 )
    • Section 2: Understand organisational procedures concerning data ( Part 6 )
    • Section 2: Understand organisational procedures concerning data ( Part 7 )
    • Section 2: Understand organisational procedures concerning data ( Part 8 )
    • Section 2: Understand organisational procedures concerning data ( Part 9 )
    • Knowledge Activity 5
  • 5
    Chapter 2
    • Section 3: Extension activities ( Part 1 )
    • Section 3: Extension activities ( Part 2 )
    • Section 3: Extension activities ( Part 3 )
    • Section 3: Extension activities ( Part 4 )
    • Section 3: Extension activities ( Part 5 )
    • Well Done! Half way there!
  • 6
    Unit 1 Assignment to be submitted
    • Work Book 1 Assessment Questions to be submitted
  • 7
    Unit 2
    • How to use your learning materials for Unit 2
    • Introduction & Contents
  • 8
    Chapter 1
    • Section 1: Understand threats to ICT systems and data ( Part 1 )
    • Section 1: Understand threats to ICT systems and data ( Part 2 )
    • Section 1: Understand threats to ICT systems and data ( Part 3 )
    • Section 1: Understand threats to ICT systems and data ( Part 4 )
    • Section 1: Understand threats to ICT systems and data ( Part 5 )
    • Section 1: Understand threats to ICT systems and data ( Part 6 )
    • Section 1: Understand threats to ICT systems and data ( Part 7 )
    • Section 1: Understand threats to ICT systems and data ( Part 8 )
    • Section 1: Understand threats to ICT systems and data ( Part 9 )
    • Section 1: Understand threats to ICT systems and data ( Part 10 )
    • Section 1: Understand threats to ICT systems and data ( Part 11 )
    • Section 1: Understand threats to ICT systems and data ( Part 12 )
    • Section 1: Understand threats to ICT systems and data ( Part 13 )
    • Section 1: Understand threats to ICT systems and data ( Part 14 )
    • Section 1: Understand threats to ICT systems and data ( Part 15 )
    • Section 1: Understand threats to ICT systems and data ( Part 16 )
    • Section 1: Understand threats to ICT systems and data ( Part 17 )
    • Section 1: Understand threats to ICT systems and data ( Part 18 )
  • 9
    Chapter 2
    • Section 2: Understand the consequences of not protecting data ( Part 1 )
    • Section 2: Understand the consequences of not protecting data ( Part 2 )
    • Section 2: Understand the consequences of not protecting data ( Part 3 )
    • Section 2: Understand the consequences of not protecting data ( Part 4 )
    • Section 2: Understand the consequences of not protecting data ( Part 5 )
    • Section 2: Understand the consequences of not protecting data ( Part 6 )
    • Knowledge check
    • Section 2: Understand the consequences of not protecting data ( Part 7 )
    • Section 2: Understand the consequences of not protecting data ( Part 8 )
  • 10
    Chapter 3
    • Section 3: Extension activities ( Part 1, 2 and 3 )
    • WELL DONE!
  • 11
    Unit 2: Assignment to be submitted
    • Work Book 2 Assessment Questions to be submitted