SJL Sixth Form Prospectus 2025 - 2026 (5) - Flipbook - Page 54
Sir John Lawes School
52
BTEC Extended Certificate in IT
(AAQ)
Board: Pearson
INTRODUCTION
The Pearson Level 3 BTEC National (Alternative Academic Qualification) in Information Technology
(Extended Certificate) allows students to study the fundamental knowledge of Information Technology
covering the role and implications of using Information Technology systems and cyber-security threats
and how to manage attacks. Students will also develop important skills for creating websites to meet a
specific purpose and to manage data through the development of a relational database solution.
ENTRY REQUIREMENTS
Grade 4 or above in GCSE Maths and English Language as well as an APS of 4.0 or above combined
with other BTEC courses, or an APS of 4.5 or above if combined with A Level courses. It is not a
requirement to have studied Level 2 BTEC DIT, although if taken a Pass L2 or above must be achieved.
COURSE CONTENT
Theobjective of this qualification is to give learners the opportunity to develop their knowledge and skills in
IT systems, Cyber Security and Incident Management, Website Development and Relational Database
Development. This will enable students to progress into higher education as a pathway to employment.
Learners will study four mandatory units:
Unit 1: Information Technology Systems
External unit assessed by a 2-hour exam with 90 marks available
You will explore the relationships between the hardware and software that form an IT system, how
systems work individually and together, and the relationship between the user and the system. You will
examine issues related to the use of IT systems and the impact that they have on organisations and
individuals. This unit will give you a fundamental understanding of all areas of IT, supporting your
progression to an IT-related higher education course.
Unit 2: Cyber Security and Incident Management
External unit assessed by a 2-hour exam with 90 marks available
In this unit, you will examine the many types of cyber security attacks, the vulnerabilities in networked
systems and the techniques that can be used to defend an organisation’s networked systems. You will
examine scenarios and explain appropriate protection measures for networked systems. You will also look
at the forensic methods used to investigate cyber security incidents and analyse the suitability of those
methods for a given scenario.