<img src="https://certify.alexametrics.com/atrk.gif?account=b2hlr1ah9W20em" style="display:none" height="1" width="1" alt="">
    Login
    Find a course
    AdobeStock_208489736_1800x100

    Information Security

    Welcome to this module on Information Security. Here you'll learn about information classification, data and network security, and access control to our offices. You'll also look at what information security means to us and what you should do to prevent information loss or theft. The security of client and internal information is absolutely critical for our business, and the consequences of information being lost or stolen are severe. Learn what steps you should take for the safe use of our information, systems and networks. [Duration: 35 min]

    Learning Objectives

    • Recognise why information security is critical to our business
    • Know how and why information is classified
    • Use email and the internet correctly
    • Follow network access procedures
    • Use portable media and portable devices correctly
    • Be aware of physical security procedures
    • Recognise how and when to report actual or suspected data breaches
    Tick

    Free Trial: Essentials

    This course is a part of Compliance Essentials, our best-selling compliance e-learning library. A subscription to this library gives you the ability to train your staff on all the key compliance issues from AML, Bribery, GDPR to Equality and Health and Safety. All these course can be customised to completely fit your organisation. Take a free trial to experience these courses yourself.

     

    Course Contents

    • Welcome
    • The importance of information security
    • What is information security?
    • What are the consequences of breaches?
    • What do you think?
    • Our Information Security Policy
    • What information is covered?
    • Information life cycle
    • Information classification
    • You make the call: Classifying information
    • Email security
    • Best practice for using emails
    • What do you think?
    • Scenario: Alan's email
    • Information security on the move
    • Best practice for securing information when travelling
    • Scenario: On vacation
    • Scenario: Corinna's trip
    • Using portable media
    • Portable media: What should you do?
    • Scenario: Using portable media
    • Network access
    • Access control: What should you do?
    • Scenario: Jonathan's new job
    • Password policy
    • Password policy guidelines
    • Scenario: Mark's event
    • Best practice for accessing the internet
    • Scenario: The suspected hack
    • Physical access
    • Physical security measures
    • What should you do?
    • Scenario: Physical security
    • Preventing information security breaches
    • Reporting breaches
    • You make the call: Report or not?
    • Information security and the law
    • Summary
    • Affirmation
    • Assessment

    New in 2020!

    • 16 recent news stories to further highlight key information security issues
    • Text updates and image replacements throughout the course
    • Updates to the scenarios contained within the section:
      • You make the call: Classifying information
      • Scenario: Alana's email
      • Scenario: On vacation
      • Scenario: Corinna's trip
      • Scenario: Using portable media
      • Scenario: Jonathan's new job
      • Scenario: The suspected hack
      • Scenario: Physical security
      • You make the call: Report or not?
    • A new infographic to demonstrate the information lifecycle
    • Updates to the post-course assessment with 21 additional questions grouped into the following Question Banks:
      • Information classification
      • Safeguarding information
      • Preventing information security breaches
      • Email security
      • Password policy
      • Network access
      • Portable media and devices
      • Information security on the move
      • Physical access

    Specifications

    Duration Approximately 35 minutes
    Audience Suitable for all staff - examples and interactivities designed for staff at all levels
    Prerequisites No previous knowledge or experience required
    Design SHARD-compliant, responsive display on all devices, accessibility on screen readers, visual design controlled via client style sheet
    Assessment Ten-question assessment
    Test-out Ability to offer optional test-out, whereby users can choose to skip the course content and complete the learning assignment simply by passing the assessment Deployment AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC
    Deployment AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC
    Compatibility All Windows, Mac OSX, iOS, Android (Flash-free for mobile compatibility)
    Tailoring Fully customisable on Skillcast Portal CMS
    Translation Pre-translated versions not available, but all text content can be exported for translation into all languages
    Localisation Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary

    Pricing

    We offer several off-the-shelf subscription options for you to train your staff using this course and others in this library. Alternatively, you may purchase a perpetual licence to this course and tailor it completely to fit in with your business or go for something totally bespoke that we build for you ground up. Visit our pricing page for more details on all these options.

    View pricing