A range of high quality E-Courses at great prices

Information Security

£19.99 + VATView PricesHide Prices View PricesHide Prices

Prices exclude VAT - price reduction includes multiple users across multiple courses.

1-56-1011-2021-3031-4041-5051-7576-100101-150151-200201-250
£19.9917.9916.9915.9914.9913.9912.9911.9910.999.997.99

Prices excludes VAT - price reduction includes multiple users across multiple courses.

£
1-519.99
6-1017.99
11-2016.99
21-3015.99
31-4014.99
41-5013.99
51-7512.99
76-10011.99
101-15010.99
151-2009.99
201-2507.99

Information security training is vital for all employees who deal with personal records and databases and how the Data Protection act relates to them and the work they do. The course provides awareness training on the dangers of poor information security and how to defend against it. It offers guidance on the use of different devices, how to spot malware and the creation of strong passwords.

  Enter the amount of users
Add to Cart Checkout


Learning outcomes

By the end of the course you will have learned about:

  • What information security is.
  • What cybersecurity is.
  • Why information security is important in your work life.
  • Why information security is important in your personal life.
  • The dangers and costs of poor information security.
  • What malware is.
  • How to spot and defend against malware.
  • Information security and mobile devices.
  • Information security and mobile working.
  • How to create strong passwords and avoid weak ones.
  • Perimeter security.
  • Network security.
  • Social engineering threats and how to avoid them.
  • The Data Protection Act and information security.
  • Information security and portable memory devices.
  • Information security and social media.

Preloaded HTML module (content fully editable)
  • Welcome
  • Section 1
  • What is information security?
  • What is cybersecurity?
  • Who wants your information?
  • Why information security matters to you
  • Information security breaches: the cost
  • Section 2
  • What is malware?
  • Why malware is a threat
  • Spotting and defending against malware
  • Section 3
  • Information security and mobile devices
  • Mobile working
  • Section 4
  • Strong and weak passwords
  • Perimeter security
  • Network security
  • Social engineering threats
  • Section 5
  • Information, risk assessment, classification and access
  • The Data Protection Act
  • Section 6
  • Other information security risks: USB sticks and portable memory
  • Other information security risks: social media

Who should complete this course?

The course is designed for all employees with little or no knowledge of Information security issues, so is ideal for induction and refresher training.

  • Prior Learning? - None required
  • Pre Course learning? - None required
  • Certification - All learners who successfully complete the module will be issued with a certificate of learning
  • Duration - Approximately 30 minutes