| T Level Technical Qualification in Digital Support and Security (Level 3) |
Unit 6 Digital environments PowerPoints
- 7-1-1 Understand the features and characteristics of different types of physical computer system
- 7-1-2 Understand the features and use of different types of hardware devices
- 7-2-1 Understand the features and use of operating systems
- 7-2-2 Understand the features and use of common utilities
- 7-2-3 Understand the features and use of common code development tools
- 7-2-4 Understand the features and use of common application software
- 7-3-1 Understand the benefits and drawbacks of connecting devices to form networks
- 7-3-2 Understand the features of different types of networks
- 7-3-3 Understand the features, characteristics, benefits and drawbacks of connectivity methods
- 7-3-4 Understand the features, benefits and drawbacks of the common network topologies
- 7-3-5 Understand the features, benefits and drawbacks of different network models
- 7-3-6 Understand the role of common components of a network
- 7-3-7 Understand the seven-layer OSI (open systems interconnection) model, including the function and related protocols of each layer
- 7-3-8 Understand the four-layer TCPIP (transmission control protocol internet protocol) model, including the function and related protoc
- 7-3-9 Understand the role of data packets in transmitting over a network
- 7-3-10 Understand the role of common network protocols
- 7-3-11 Understand the concepts of bandwidth and latency, and their effect on the performance of networks and connected systems
- 7-4-1 Understand the role and characteristics of common virtual environment components
- 7-4-2 Understand the key features of virtual environments
- 7-4-3 Understand the benefits of the use of virtual environments
- 7-4-4 Understand the drawbacks of the use of virtual environments
- 7-5-1 Understand different types of cloud [Autosaved]
- 7-5-2 Understand the benefits of the use of cloud
- 7-5-3 Understand common cloud delivery models
- 7-6-1 Understand the benefits of resilient environments and the impact on organisations and clients
- 7-6-2 Understand methods used to improve the resilience of digital environments
8 Unit Security
- 8 8-1-ALL Know the type of confidential information held by organisations
- 8 8-2-1 threats and vulnerabilities
- 8-2-2 to 5 potential technical vulnerabilities to systems and data


