<img src="https://certify.alexametrics.com/atrk.gif?account=b2hlr1ah9W20em" style="display:none" height="1" width="1" alt="">

Compliance Essentials Library

Information Security Course

The security of client and internal information is absolutely critical for businesses, and the consequences of information being lost or stolen are severe.

The loss or theft of commercially sensitive information could lead to lost revenues, damage to reputation, reduced consumer trust and even affect the survival of a company.

Failure to respect information security may lead to disciplinary measures, fines and even criminal prosecution under various laws (including the Computer Misuse Act and the GDPR).

Our Information Security Course helps employees to understand information classification, data security, network security, access control to your offices and what to do prevent information loss or theft.

Audience: All staff  |  Duration: 35 minutes  |  Format: E-learning module

Learning Objectives

This course will prepare your employees to:

  • Understand why information security is critical to your business
  • Know how and why information is classified
  • Exercise caution when using the web, emails and other electronic communications
  • Comply with your company procedures in relation to network access, portable media and devices, and physical security
  • Know how and when to report actual or suspected data breaches
  • Recognise the consequences of data breaches

Course Contents

  • Welcome
    - The importance of information security
    - What is information security?
    - What are the consequences of breaches?
    - What do you think?
  • Our Information Security Policy
    - What information is covered?
    - Information life cycle
    - Information classification
    - You make the call: Classifying information
  • Email security
    - Best practice for using emails
    - What do you think?
    - Scenario: Alan's email
  • Information security on the move
    - Best practice for securing information when travelling
    - Scenario: On vacation
    - Scenario: Corinna's trip
    - Using portable media
    - Portable media: What should you do?
    - Scenario: Using portable media
  • Network access
    - Access control: What should you do?
    - Scenario: Jonathan's new job
    - Password policy
    - Password policy guidelines
    - Scenario: Mark's event
    - Best practice for accessing the internet
    - Scenario: The suspected hack
  • Physical access
    - Physical security measures
    - What should you do?
    - Scenario: Physical security
  • Preventing information security breaches
  • Reporting breaches
    - You make the call: Report or not?
    - Information security and the law
  • Summary
  • Affirmation
  • Assessment

New in 2020

  • 16 recent news stories added
  • Text updates and image replacements 
  • Updates to the scenarios:
    - You make the call: Classifying information
    - Scenario: Alana's email
    - Scenario: On vacation
    - Scenario: Corinna's trip
    - Scenario: Using portable media
    - Scenario: Jonathan's new job
    - Scenario: The suspected hack
    - Scenario: Physical security
    - You make the call: Report or not?
  • New  information lifecycle infographic
  • 21 additional post-course questions:
    - Information classification
    - Safeguarding information
    - Preventing information security breaches
    - Email security
    - Password policy
    - Network access
    - Portable media and devices
    - Information security on the move
    - Physical access

Free Trial: Compliance Essentials

This course is part of our Compliance Essentials Course Library.

Compliance Essentials is our best-selling library and there's a reason for that.

Essentials contains 30 in-depth courses and dozens of express micro-learning modules from AML, Bribery, GDPR and Equality to Health and Safety. It provides a complete and comprehensive off-the-shelf compliance solution for UK businesses that can be customised completely to fit your organisation.

Request now


Duration Approximately 35 minutes
Audience Suitable for all staff - examples and interactivities designed for staff at all levels
Prerequisites No previous knowledge or experience required
Design SHARD-compliant, responsive display on all devices, accessibility on screen readers, visual design controlled via client style sheet
Assessment Ten-question assessment
Test-out Ability to offer optional test-out, whereby users can choose to skip the course content and complete the learning assignment simply by passing the assessment Deployment AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC
Deployment AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC
Compatibility All Windows, Mac OSX, iOS, Android (Flash-free for mobile compatibility)
Tailoring Fully customisable on Skillcast Portal CMS
Translation Pre-translated versions not available, but all text content can be exported for translation into all languages
Localisation Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary

Off-the-shelf Courses

Our off-the-shelf subscription options allow you to train your staff using this course and other essential compliance courses cost-effectively.

We can also customise courses to your business needs or create fully bespoke courses to your specification.

View pricing