Information Security

Compliance training is critical for individuals and the organisations they represent. It helps to ensure that employees follow governance and regulations that apply to their job responsibilities. This helps protect both the individual and the organisation from costly mistakes that could result in fines or bad publicity.

This Information Security e-learning course focuses on ensuring data is secure from unauthorised use and that information stored on IT systems is safe from potential misuse.

In this course, you’ll learn the information security principles and the simple steps organisations and individuals can take to make sure the confidential data they store is safe and secure from attack.

Watch this video for a quick overview of our Information Security course.

 

Who is it for?

If you’re involved in the handling of other people’s personal information, this course is for you. That may include:

  • All employees
  • Directors
  • Managers
  • Team leaders
  • Supervisors
  • Consultants

Why study this course?

To put it simply, you’ll ensure your compliance with the principles of Information Security. With this course:

  • You’ll help ensure organisational compliance with Information Security Governance
  • You’ll help ensure personal compliance with Information Security
  • You’ll improve general compliance within your organisation
  • You’ll help to develop a compliance culture within your organisation
  • You’ll help your company avoid potentially costly litigation, fines and bad publicity

Key facts

Average course duration: 1 1/2 hours. Course content broken down as follows:
Interaction
Offline
  • It’s an online e-learning short course
  • Containing four interactive modules
  • Blending text, graphics and images
  • Get downloadable worksheets, policy support documents and factsheets
  • Regular on-going testing as you progress
  • A full final assessment with certification

Price: GBP 20.00

Why study with ICM?

Practical courses - This course is designed to help you in the real business world, giving you practical skills that you can quickly and easily implement in the workplace.

Interactive and engaging - Learning doesn’t have to be boring. This multi-media course is designed to keep you engaged throughout.

Step-by-step learning - This course is broken down into easy to manage bite-size chunks. From start to finish we take you on an enjoyable learning journey.

Certificated courses - Employers recognise hard work and you will be awarded an official ICM certificate upon successful completion of your course.

Course content

  • 1Information Security – Risks and Threats

    Follow Tim’s experience with an Information Security Consultant that he employed to carry out investigations following security breaches at his organisation.

    • Understanding Information Security and why it is important – following three key security breach examples – Laptop loss, Loose Lips and Computer Virus
    • Review highly publicised information security incidents and their outcomes
    • Understand what information needs to be kept secure and why
    • Establishing what an organisation can do to protect itself from information security risks
  • 2Information Security – Concepts and Controls

    • Establishing an organisational security policy
    • Reviewing the three main information security concepts – Confidentiality, Integrity and Availability
    • Identifying internal and regulatory controls required for information security
    • Developing an information security policy with structure and example
  • 3Information Security – Employee Responsibilities

    • Provision of information security guidelines for employees
    • Understanding employee requirements for information security through different scenario examples
    • Identifying workplace information security risks and employing contingencies to overcome them
    • Establishing telephone procedures and processes for security
    • Forming email procedures and processes for security
    • Recognising the importance of information security for home workers
  • 4Information Security – Managers Responsibilities

    • Understanding what it takes to create a culture of information security within the organisation
    • Spotting the internal threats to information security and developing processes to mitigate them
    • Vetting potential employees to reduce the potential for security risks
    • Recognising the level of information access different employees need
    • Establishing the correct process for disposing of confidential waste
    • Setting up a process for reporting security incidents
    • Applying the correct training and awareness