<img src="https://certify.alexametrics.com/atrk.gif?account=b2hlr1ah9W20em" style="display:none" height="1" width="1" alt="">
  • information

    Essentials: Information Security

  • information

    Essentials: Information Security

  • info

    Essentials: Information Security

information security

The security of client and internal information is absolutely critical for our business, and the consequences of information being lost or stolen are severe. Learn what steps you should take for the safe use of our information, systems and networks.

In this course you'll learn about information classification, email security, network and physical access control and information security on the move. You'll also look at what information security means to us and what you should do to prevent information loss or theft.

Learning Objectives
  • Recognise why information security is critical to our business
  • Know how and why information is classified
  • Use email and the internet correctly
  • Follow network access procedures
  • Use portable media and portable devices correctly
  • Be aware of physical security procedures
  • Recognise how and when to report actual or suspected data breaches
Course Contents
  1. The importance of information security
  2. What is information security?
  3. What are the consequences of breaches?
  4. What do you think?
  5. Our Information Security Policy
  6. What information is covered?
  7. Information life cycle
  8. Information classification
  9. You make the call: Classifying information
  10. Email security
  11. Best practice for using emails
  12. Scenario: Alan's email
  13. Information security on the move
  14. Best practice for securing information when travelling
  15. Scenario: On vacation
  16. Scenario: Corinna's trip
  17. Using portable media
  18. Portable media: What should you do?
  19. Scenario: Using portable media
  20. Network access
  21. Access control: What should you do?
  22. Scenario: Jonathan's new job
  23. Password policy
  24. Password policy guidelines
  25. Scenario: Mark's Event
  26. Best practice for accessing the internet
  27. Scenario: The suspected hack
  28. Physical access
  29. Physical security measures
  30. What should you do?
  31. Scenario: Physical security
  32. Preventing information security breaches
  33. Reporting breaches
  34. You make the call: Report or not?
  35. Information security and the law
  36. Summary
  37. Assessment
Feature Description
Duration Approximately 35 minutes
Audience Suitable for all staff - examples and interactivities designed for staff at all levels
Prerequisites No previous knowledge or experience required
Design SHARD-compliant, responsive display on all devices, accessibility on screen readers, visual design controlled via client style sheet
Assessment Ten-question assessment
Test-out Ability to offer optional test-out, whereby users can choose to skip the course content and complete the learning assignment simply by passing the assessment
iExpress Supplementary four-minute iExpress interactive video provided to create awareness and interest about the topic
Deployment AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC
Compatibility All Windows, Mac OSX, iOS, Android (Flash-free for mobile compatibility)
Tailoring Fully customisable on Skillcast Portal CMS
Translation Pre-translated versions not available, but all text content can be exported for translation into all languages
Localisation Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary
We're here to help! Get In Touch