Teach Computing

Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.

What's New

UK Computing Laws

This video from Computer Science Tutor covers the main UK computing laws re...

Wireless Networking (Wi-Fi, Security, and Hardware)

This video about wireless networking includes everything that is needed for...

Network topology videos

These four excellent videos from Computer Science tutor cover the four ma...

Network protocols

These four videos explain the main networking protocols that students are l...

Embedded Systems video

This short video is a good over of embedded systems, covering the main poin...

Representing Text in Binary

This video clearly explains the two main ways of representing text in binar...

Types of Malware

This video explains the various types of malware including viruses and troj...

Protecting against Malware

Following on from the Types of Malware video, this video explains technique...

Video: Network Security #1

This video gives an overview of the threats to networked computer systems, ...

Resources discount offer

5.2 Network Security

Lesson resources

Networks Banned Words game
Networks revision game
Recommended GCSE Computer Science textbooks
Edexcel Computer Science textbooks
Communications & the Internet keyword bingo game
Communications & the Internet keyword bingo game

5.2.1 Validation and Authentication techniques

5.2.2 Cloud storage security

5.2.3 Types of Cyberattack

Types of malware

Types of Malware

This video explains the various types of malware including viruses and trojans, as well as explaining related terminology such as vector and payload.


Updated: 2018-12-08
Network security

Video: Network Security #1

This video gives an overview of the threats to networked computer systems, including a huge range of vectors from software exploits and code injections to malware to social engineering and misconfigured software.


Updated: 2018-12-08

5.2.4 Identifying Vulnerabilities

Network security

Video: Network Security #2

The second video in this series covers Identifying Vulnerabilities & Security Measures. This covers the techniques used to identify weaknesses in computer security before potential malefactors do: penetration testing and ethical hacking.


Updated: 2018-12-08

5.2.5 Protecting systems from cyberattack

Malware protection

Protecting against Malware

Following on from the Types of Malware video, this video explains techniques for preventing and removing malware - both technological and human based solutions.


Updated: 2018-12-08