Teach Computing

Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.

What's New

Emergency Management System Explainer Video

This short video gives an overview of some EMIS features. It includes many ...

Geographic Information Systems (GIS)

For some functionality, an EMIS may also be connected to a GIS (Geographic ...

Programming languages - from Scratch to machine code

The CS Field Guide has a very comprehensive guide to different types of pro...

Assembly language simulators

There are several assembly language simulators available for use online. Si...

Little Man Computer (LMC)

The Little Man Computer (LMC) is a software simulator of a simple computer ...

Lesson - Data representation - sound

This download contains all lesson resources necessary to teach students how...

Predictive placement

Predictive placement is a feature of some CAD systems that enables more e...

AI to help emergency dispatch phone operators

The Singapore Civil Defence Force (SCDF) may trial an AI system to help tra...

Mobile Data Terminals (MDT)

MDT technology is referenced in the case study booklet, with such systems b...

Resources discount offer

5.2 Network Security

Lesson resources

Networks Banned Words game
Networks revision game
Recommended GCSE Computer Science textbooks
Edexcel Computer Science textbooks
Communications & the Internet keyword bingo game
Communications & the Internet keyword bingo game

5.2.1 Validation and Authentication techniques

5.2.2 Cloud storage security

5.2.3 Types of Cyberattack

Types of malware

Types of Malware

This video explains the various types of malware including viruses and trojans, as well as explaining related terminology such as vector and payload.


Updated: 2018-12-08
Network security

Video: Network Security #1

This video gives an overview of the threats to networked computer systems, including a huge range of vectors from software exploits and code injections to malware to social engineering and misconfigured software.


Updated: 2018-12-08

5.2.4 Identifying Vulnerabilities

Network security

Video: Network Security #2

The second video in this series covers Identifying Vulnerabilities & Security Measures. This covers the techniques used to identify weaknesses in computer security before potential malefactors do: penetration testing and ethical hacking.


Updated: 2018-12-08

5.2.5 Protecting systems from cyberattack

Malware protection

Protecting against Malware

Following on from the Types of Malware video, this video explains techniques for preventing and removing malware - both technological and human based solutions.


Updated: 2018-12-08