Currency:

Home » Downloads » E-Learning Courses » Information Security Suite – E-Learning

information security elearning

Information Security Suite – E-Learning

Get a quote
Request a Demo
Duration: 3 hours. Including videos, interactions and assessment.

E-Learning Course Content:

This highly interactive and engaging e-learning course focuses on the topic of Information Security. As technology evolves and threats become more sophisticated, safeguarding information security requires increased awareness, continuous vigilance, and strong defence measures. This course aims to address these issues with practical advice and information.

The e-learning can be provided as SCORM files, or on a subscription basis, whether hosted on your own Learning Management System, or using our, feature-rich, easy-to-use learning platform.

Watch this video for a quick overview of the e-learning course:

Our employees have commented on how helpful they have found the Information Security Suite e-learning course both outside of work and in, where it helps with protecting the business, especially with regards to password security, phishing and social media.

Honor Lewis - Head of Learning and Development, Fosroc
What’s the course about?

Information Security Suite

Raise awareness of information security issues in your organisation

Employees can be the biggest information security weakness to an organisation. It’s critical that employees are educated in the risks that cyber security threats pose to them and their business and that they know how to safely use the tools and information that is available to them.

This e-learning aims to raise awareness of information security, providing guidance and information that will help ensure your organisation and its employees avoid the potential pitfalls of poor cyber security practices.

This e-learning would be a great addition to Induction processes and where you need to provide policy understanding and sign-off throughout the business.

Who is it for?

This e-learning course is aimed at all employees and gives a general overview of the key requirements of information security. Therefore, it is excellent training for:

  • All employees
  • Directors
  • Managers
  • Team leaders
  • Supervisors
  • Consultants
What does the course look like?
  • It’s an online e-learning course
  • Includes ten learning modules
  • Interactive and engaging content
  • Blending video, text, graphics and images
  • Regular on-going testing as you progress
  • A full final assessment with CPD certification

Objectives

To put it simply, this online course will equip individuals with the knowledge and skills necessary to recognise and defend against cyber threats, helping to safeguard an organisation’s data and technology infrastructure. With this e-learning course:

  • Explore the challenges of ensuring confidentiality, integrity and availability
  • Identify the wide range of potential physical, digital, and human threats to information security
  • Describe the regulatory, physical, procedural, and technical controls aimed at safeguarding sensitive information and critical systems
Module 1 – Introduction to Information Security
  • Explain why information security is important
  • Explore your own experience of information security incidents
  • Review a case study on information security to embed learning
Module 2 – What needs safeguarding?
  • Identify the key aspects of what needs safeguarding
  • Explore what sensitive information is and how it is classified
  • Examine the three pillars of information security – Confidentiality, Integrity and Availability
  • Explain how to identify compromised pillars of information security
  • Review a case study to embed learning
Module 3 – Overview of Threats to Information Security
  • Explore the potential threats in your organisation
  • Identify the different physical, digital, and human threats
  • Describe overlapping and multiple threats
  • Establish different types of threat and particular threats of USB’s
  • Review a case study to embed learning
Module 4 – Physical Threats
  • Examples of physical threats
  • Identify unauthorised access to the workplace
  • Establish the threat of inadequately supervised visitors
  • Define workstation and physical storage insecurity
  • Raise awareness of insecurity in shared spaces
  • Effective disposal of sensitive information
  • Examine the dangers of eavesdropping
  • The risks with loss or theft of documents or devices
  • Making portable devices less vulnerable
  • Review a case study to embed learning​
Module 5 – Digital Threats
  • Explore examples of digital threats
  • Examine the techniques used for hacking and unauthorised access
  • Describe Malware, the different types and how they work
  • Identify the deceptive tactics used by cyber criminals
  • Explain the risks of data interception
  • Describe the risks with public wi-fi and Bluetooth
  • Follow tips for safer use of public wi-fi
  • Examine the added risks with remote working
  • Review a case study to embed learning
Module 6 – Human Threats
  • Examine examples of human threats
  • Identify the vulnerability of passwords and security questions
  • Describe brute force attacks and how they work
  • Establish how strong your passwords are
  • Explore tips for creating a password
  • Identifying and applying robust security questions
  • Establish the risk to yourself and your organisation when using internet browsers and surfing the web
  • Evaluate the safety of websites you visit
  • Describe the risk of website popups
  • Explore social engineering and how it exploits human nature
  • Review several case study scenarios to spot common social engineering techniques
  • Identify and nullify phishing attacks
  • Safeguard the information you share with others
  • Establish how cyber criminals use social media to gather information on their victims
  • Identify how cyber criminals use email to exploit individuals and organisations
  • Describe ‘insider threats’ and how they pose a potential risk to an organisation’s data, systems, or sensitive information, whether malicious or due to negligence or lack of awareness
  • Recognising and using your instincts for all human threats
  • Review a case study to embed learning​
Module 7 – New and Emerging Technologies and Threats
  • Examining the different emerging technologies, including IoT, AI, Machine Learning, Deepfakes, Cloud Services and Quantum Computing
  • Review a case study to embed learning
Module 8 – Controlling the Threats to Information Security
  • Review an overview of the controls available
  • Describe the regulatory controls and how they apply to your work
  • Establish the physical controls available
  • Explain access control systems
  • Define secure storage systems and what they are used for
  • Investigate procedural controls and how they mitigate threats
  • Recognise technical controls and how they can be used for information security
  • Using authentication and authorisation systems such as 2FA and MFA
  • Applying Multi-Factor Authentication
  • Using encryption for security
  • Deploying cybersecurity software to protect devices, systems, and networks from potential threats
  • Review a case study to embed learning
Module 9 – Responding to Information Security Incidents
  • Knowing how to respond to information security incidents
  • Follow a step process for responding to incidents
  • Identify what needs to be reported
  • Review a case study to embed learning​
Module 10 – Responsibilities
  • Establish the role we all play in information security
  • Revisiting tailgating
  • Implementing a security culture
  • Define the common information security responsibilities you have
  • Identify the information security responsibilities of a manager
  • Review a case study to embed learning
  • Making an action plan for information security
Module 11 - Assessment and CPD certificate
  • A chance to test your knowledge of the topic with scoring
  • The e-learning course comes with free CPD certificates for the learners​
Why subscribe to this e-learning course?
  • Practical courses – This course is designed to help your learners in the real business world, giving them practical skills that they can quickly and easily implement in the workplace.
  • Interactive and engaging – Learning doesn’t have to be boring. This multi-media course is designed to keep your participants engaged throughout.
  • Step-by-step learning – This course is broken down into easy to manage bite-size chunks. From start to finish we take your learners on an enjoyable learning journey.
  • Fully accredited – The CPD Verification Service accredit all our courses, so you can be sure our training materials are of the highest standard.​
LMS integration

Where clients are not using our LMS and wish to host it on their own LMS instead, we provide SCORM files that they can simply install directly. Although these files are added to the clients LMS as usual and the user will access and view the course exactly as they would if it was built on the clients system, we are still able to track user numbers our side and also provide regular updates to the content.​

E-Learning Alterations

Our e-learning products are always provided ‘white-label’ with no Trainer Bubble logos or references to our company.

We also understand that you may like to make alterations to the content. Whether it’s minor edits, larger alterations, adding of logos, or swapping images to better reflect your corporate identity – we can provide this change for a small fee.

Please note: We regularly update our courses to reflect legal changes or just general improvements to content. All this happens without you having to lift a finger whether the course is on your LMS or ours.

Price

​​‘Buy once, use forever’ Price – £3,500+vat​

Small number of users or several courses required? – Ask about subscription options

We have a variety of options for payment of this e-learning course. Please click on the Get a Quote button below, so that we can create a personal quote that suits your specific requirements.

If you are unsure of your e-learning requirements, you can also visit our sister website to find out more about our online learning services – Learner Bubble.​​​​​​

Information Security Suite – E-Learning

Updates

Subscribe to the Trainer Bubble mailing list to receive updates on new products, special offers and all the latest industry news sent right to your inbox.