Information Security Online Training

Information Security Online Training

Information security training is an essential part of your risk management training program to help ensure data is handled and kept securely.

Whilst many companies have dedicated information security professionals, it is important that all employees are adequately trained to safeguard data in their day-to-day work.

From using secure passwords to moving data securely between databases, there are many areas where awareness of information security is essential.

Using real-world examples, our information security training teaches employees all they need to know to prevent data breaches and adhere to legislation surrounding data security.

Who should take the Information Security online training?

This training is recommended for all employees.

This course contains the following modules:

Video: Information Security is the art and science of preventing data from being lost or misused. Types of information that need protecting: risks; natural events; technical failures; human error; hacking; malicious attacks.
Interactive Screen: Types of information: public, internal, confidential, restricted use.
Scenario: Identify the items in a stolen handbag that presents an information security risk to the company.
Key Learning: Losing a company tablet and ID card present an information security risk for our company.
Scenario: First action to take to prevent an information security breach.
Key Learning: Actions that will minimize the damage the thieves can do should be taken immediately.
Assessment: Five-question quiz on the content presented in this topic.

Interactive Screen: Real-life examples of the consequences of a data breach.
Scenario: Clicking on a link in a suspicious email.
Key Learning: Phishing attacks attempt to gain sensitive information by pretending to be from a friendly source. Official sources will never email or text you looking for login or account details.
Scenario: Consequences of installing malware by mistake.
Key Learning: Introducing malware to your network would have huge repercussions. Malware may steal workplace login details and place your company and your clients’ data at risk.
Assessment: Five-question quiz on the content presented in this topic.

Interactive Screen: Staying secure. Taking care when sending emails. Always considering a more secure method. Encryption. Spam. Malware. Risks of text messaging.
Scenario: What action to take when you mistakenly use “Reply All.”
Key Learning: Recognize the risks of restricted data falling into the wrong hands. Take responsibility for the safe dissemination of company information. Understand that you must escalate incidents through the correct channels immediately.
Assessment: Five-question quiz on the content presented in this topic.

Interactive Screen: Protecting your accounts. Strong passwords. Choosing a password. Password management.
Scenario: Identifying IT security red flags.
Key Learning: There are many strategies used for cracking passwords. The most common is “brute force,” a method that checks every combination of letters and common words. Ensure that you use a combination of uppercase and lowercase letters, numbers, and symbols.
Assessment: Five-question quiz on the content presented in this topic.

Video: How do you harness the power of social media? Your social media interactions could impact your reputation. Think before you post!
Interactive Screen: Safe practices when using social media. Conducting business communications. Privacy is not guaranteed. Accuracy of online profiles. Adopting safe practices.
Scenario: Including job details in a LinkedIn profile.
Key Learning: Most people post job titles and employer names in their social media profile. But job descriptions, colleague names, and locations should not be shared without first checking company policy.
Scenario: Social media contact with a journalist.
Key Learning: Engaging with the media regarding company business is dangerous. Always receive advice and authorization before speaking to journalists.
Assessment: Five-question quiz on the content presented in this topic.

Interactive Screen: Security is everyone’s responsibility. Guidelines on how to keep your equipment and the office secure.
Scenario: Leaving a laptop unlocked.
Key Learning: If you think your device has been breached, the first thing you need to do is contact IT Security. It takes just a minute for your computer to be breached. You must never leave your computer unlocked and unattended.
Scenario: Keeping the workplace secure.
Key Learning: Vary your routine, ensure the screen is locked when you leave your computer, use secure passwords, and be aware of your surroundings when entering through the security doors.
Assessment: Five-question quiz on the content presented in this topic.

Interactive Screen: Working remotely. Loss and theft. Data breaches. Malware threats. Storing devices and data.
Scenario: Getting online when traveling.
Key Learning: Connecting by Ethernet from a hotel room allows you to use your company laptop more securely, and using the VPN software should ensure the security of the connection. Don’t take chances though.
Scenario: Sending an important document when on the road.
Key Learning: The ideal solution is to transfer files over a secure VPN connection. If you must use email, ensure that any confidential information is properly encrypted.
Assessment: Five-question quiz on the content presented in this topic.

Interactive Screen: Email threats. Scams and manipulation. Cyber criminals. Social engineering.
Interactive Screen: Types of deception; physical, virtual, baiting, quid pro quo, watering hole attacks. Best practices for staying secure.
Scenario: Fake charity site.
Key Learning: It’s important to verify sites to avoid malware. Often, real charity events are referenced; therefore, research on the donation site should be conducted thoroughly.
Scenario: Consequences of entering credit card details on a professionally cloned site.
Key Learning: Professional cloning of websites is known as pharming and is often used in conjunction with phishing.
Assessment: Five-question quiz on the content presented in this topic.

Summary screen that wraps up the module, and attestation screen where learners attest that they are ready to help keep our information secure.

Join This Course

Category: Courses
* Desktop Version