This lesson covers the following from specification 1.6 System Security: Forms of attack, Threats posed to networks, Malware, Phishing, People as the weak point in secure systems (social engineering), Brute force attacks, DDOS, Data interception and theft, SQL injection, Poor network policy, Identifying and preventing vulnerabilities, Penetration testing, Network forensics, Network policies, Anti-malware software, Firewalls, User access levels, Passwords, Encryption