information security online learning web

Information Security Suite – Online Learning

This online course will equip individuals with the knowledge and skills necessary to recognise and defend against cyber threats, helping to safeguard an organisation’s data and technology infrastructure. With this e-learning course:

  • Explore the challenges of ensuring confidentiality, integrity and availability
  • Identify the wide range of potential physical, digital, and human threats to information security
  • Describe the regulatory, physical, procedural, and technical controls aimed at safeguarding sensitive information and critical systems

Course Introduction

Employees can be the biggest information security weakness to an organisation. It’s critical that employees are educated in the risks that cyber security threats pose to them and their business and that they know how to safely use the tools and information that is available to them.

This e-learning aims to raise awareness of information security, providing guidance and information that will help ensure your organisation and its employees avoid the potential pitfalls of poor cyber security practices.

This e-learning would be a great addition to Induction processes and where you need to provide policy understanding and sign-off throughout the business.

Course Content

Module 1 – Introduction to Information Security
  • Explain why information security is important
  • Explore your own experience of information security incidents
  • Review a case study on information security to embed learning
Module 2 – What needs safeguarding?
  • Identify the key aspects of what needs safeguarding
  • Explore what sensitive information is and how it is classified
  • Examine the three pillars of information security – Confidentiality, Integrity and Availability
  • Explain how to identify compromised pillars of information security
  • Review a case study to embed learning
Module 3 – Overview of Threats to Information Security
  • Explore the potential threats in your organisation
  • Identify the different physical, digital, and human threats
  • Describe overlapping and multiple threats
  • Establish different types of threat and particular threats of USB’s
  • Review a case study to embed learning
Module 4 – Physical Threats
  • Examples of physical threats
  • Identify unauthorised access to the workplace
  • Establish the threat of inadequately supervised visitors
  • Define workstation and physical storage insecurity
  • Raise awareness of insecurity in shared spaces
  • Effective disposal of sensitive information
  • Examine the dangers of eavesdropping
  • The risks with loss or theft of documents or devices
  • Making portable devices less vulnerable
  • Review a case study to embed learning
Module 5 – Digital Threats
  • Explore examples of digital threats
  • Examine the techniques used for hacking and unauthorised access
  • Describe Malware, the different types and how they work
  • Identify the deceptive tactics used by cyber criminals
  • Explain the risks of data interception
  • Describe the risks with public wi-fi and Bluetooth
  • Follow tips for safer use of public wi-fi
  • Examine the added risks with remote working
  • Review a case study to embed learning
Module 6 – Human Threats
  • Examine examples of human threats
  • Identify the vulnerability of passwords and security questions
  • Describe brute force attacks and how they work
  • Establish how strong your passwords are
  • Explore tips for creating a password
  • Identifying and applying robust security questions
  • Establish the risk to yourself and your organisation when using internet browsers and surfing the web
  • Evaluate the safety of websites you visit
  • Describe the risk of website popups
  • Explore social engineering and how it exploits human nature
  • Review several case study scenarios to spot common social engineering techniques
  • Identify and nullify phishing attacks
  • Safeguard the information you share with others
  • Establish how cyber criminals use social media to gather information on their victims
  • Identify how cyber criminals use email to exploit individuals and organisations
  • Describe ‘insider threats’ and how they pose a potential risk to an organisation’s data, systems, or sensitive information, whether malicious or due to negligence or lack of awareness
  • Recognising and using your instincts for all human threats
  • Review a case study to embed learning
Module 7 – New and Emerging Technologies and Threats
  • Examining the different emerging technologies, including IoT, AI, Machine Learning, Deepfakes, Cloud Services and Quantum Computing
  • Review a case study to embed learning
Module 8 – Controlling the Threats to Information Security
  • Review an overview of the controls available
  • Describe the regulatory controls and how they apply to your work
  • Establish the physical controls available
  • Explain access control systems
  • Define secure storage systems and what they are used for
  • Investigate procedural controls and how they mitigate threats
  • Recognise technical controls and how they can be used for information security
  • Using authentication and authorisation systems such as 2FA and MFA
  • Applying Multi-Factor Authentication
  • Using encryption for security
  • Deploying cybersecurity software to protect devices, systems, and networks from potential threats
  • Review a case study to embed learning
Module 9 – Responding to Information Security Incidents
  • Knowing how to respond to information security incidents
  • Follow a step process for responding to incidents
  • Identify what needs to be reported
  • Review a case study to embed learning
Module 10 – Responsibilities
  • Establish the role we all play in information security
  • Revisiting tailgating
  • Implementing a security culture
  • Define the common information security responsibilities you have
  • Identify the information security responsibilities of a manager
  • Review a case study to embed learning
  • Making an action plan for information security
Module 11 - Assessment and CPD certificate
  • A chance to test your knowledge of the topic with scoring
  • The e-learning course comes with free CPD certificates for the learners​

Customisable

All content can be adapted and altered to suit your needs. Courses are white-label as standard, but can include logos and branding where required. We can also provide AI generated language translations on demand.

Updates

All content is regularly reviewed and updated to ensure technical accuracy, best practice and legal compliance for your learners. Updates are all automatically made to content.

Certification

Your employees will receive personalised and dated certificates upon successful completion of our CPD certified e-learning courses. All courses have relevant accreditations.

Integration

Deliver e-learning courses via your own branded learning portal provided by us or upload our regularly updated courses to your own LMS if you would prefer.

Ready to give us a try?

Trusted by organisations all around the world, our online learning and compliance will help reduce your people risks and drive capability – Get started now…