Information Security Awareness Training

Information Security can be compromised in many ways. That’s why our e-learning solution offers 30 independent “off the shelf” topics covering the most important issues, from basic principles to best practices. Each activity is modular so you can create your own unique information security awareness training courses, targeting your organization’s specific needs.

  • Introduction to Information Security
    Read more
    Introduction to Information Security

    Introduction to Information Security

    • Gain knowledge on what information security is and why it’s important
    • Define basic information security terminology and concepts
    • Recognize user responsibility in protecting the organization’s information assets
    • Apply best practices that promote sound information security
  • Password
    Read more
    Password

    Password

    • Recognize the importance of a well-protected password
    • Differentiate between strong and weak passwords
    • Create a strong and easy to remember password
    • Apply best practices in password selection and protection
  • Email
    Read more
    Email

    Email

    • Gain knowledge and awareness on threats and harm to organizations due to misuse of email
    • Recognize spams and hoaxes threats and apply countermeasures
    • Practice secure email communication
  • The Clean Desk Principle
    Read more
    The Clean Desk Principle

    The Clean Desk Principle

    • Gain knowledge and awareness on the Clean Desk Principle
    • Recognize its importance for improved protection of information
    • Identify valuable and vulnerable items that compromise data security
    • Apply protective measures that comply with the Clean Desk Principle
  • Social Networks
    Read more
    Social Networks

    Social Networks

    • Recognize that social network information is public information
    • Recognize potential threats of fraudsters on social networks
    • Apply best practices when posting information on social networks
  • Mobile Users
    Read more
    Mobile Users

    Mobile Users

    • Gain knowledge of who the mobile user is
    • Recognize security risks mobile users are susceptible to encounter, and apply appropriate countermeasures
    • Apply best practices and behaviours to mitigate threats to mobile information
  • Physical Security
    Read more
    Physical Security

    Physical Security

    • Gain knowledge of user role in promoting physical security
    • Recognize valuable and vulnerable items that can jeopardize the physical security of data
    • Apply best practices to mitigate breaches of physical security
  • Privacy
    Read more
    Privacy

    Privacy

    • Gain knowledge and an increased awareness on the consequences of negligence in data privacy
    • Define what is considered Personally Identifiable Information (PII)
    • Recognize the organization’s and employee’s obligation to protect privacy
    • Recognize the organization’s and employee’s obligation to protect privacy
  • Malware
    Read more
    Malware

    Malware

    • Gain knowledge and an increased awareness on the different forms of malware
    • Recognize the human and technical factors in malware spread prevention
    • Apply best practices to mitigate the risks of malware attacks
  • Responsible Use of the Internet at work
    Read more
    Responsible Use of the Internet at work

    Responsible Use of the Internet at work

    • Recognize the need to learn the organizations’ acceptable Internet Use Policy
    • Gain awareness of the harm to the organization due to inappropriate Internet usage
    • Apply best practices that mitigate Internet connectivity risks
  • Identity Theft
    Read more
    Identity Theft

    Identity Theft

    • Gain knowledge and increased awareness on the consequence of identity theft to the individual and to the organization
    • Recognize frequent fraudulent methods leading to identity theft and apply appropriate countermeasures
    • Apply best practice to mitigate the risks of falling prey to identity theft
  • Phishing
    Read more
    Phishing

    Phishing

    • Define phishing and recognize its threat to information security
    • Recognize a phishing scam and apply appropriate countermeasures
    • Apply best practice to mitigate the risks of getting “hooked”
  • Information Lifecycle
    Read more
    Information Lifecycle

    Information Lifecycle

    • Gain knowledge of the different phases of information lifecycle
    • Apply appropriate security measures to information from creation through disposal
    • Recognize common data destruction methods per media type
    • Apply best practices for sound information management
  • Information Classification
    Read more
    Information Classification

    Information Classification

    • Gain awareness of the importance of information classification
    • Recognize the different levels of data protection and classification
    • Classify information based on the assigned level of protection
    • Apply best practices to mitigate the risks associated with a breach of security
  • Intellectual Property
    Read more
    Intellectual Property

    Intellectual Property

    • Define intellectual property and recognize violation consequences
    • Determine what is and what isn’t intellectual property
    • Recognize the difference between intellectual property and copyright
    • Apply best practices that protect intellectual property
  • Access Control
    Read more
    Access Control

    Access Control

    • Understand the main components that make up an access control system
    • Identify access control permissions by work area
    • Recognize the process of granting access
    • Differentiate between physical and electronic access control methods
    • Apply best practices to control unauthorized access to organizations’ information and premises
  • Confidentiality on the Web
    Read more
    Confidentiality on the Web

    Confidentiality on the Web

    • Gain knowledge and awareness of the potential danger of disclosing information on the Web
    • Recognize a secure connection
    • Apply best practices to mitigate the risks associated with breach of confidentiality on the Web
  • Bring Your Own Device (BYOD) Trend
    Read more
    Bring Your Own Device (BYOD) Trend

    Bring Your Own Device (BYOD) Trend

    • Recognize the need to learn the organization’s acceptable BYOD Use policy
    • Apply measures to mitigate the risks associated with BYOD data loss and breach of confidentiality
    • Apply best practices to protect the networks to which BYOD devices connect
  • Social Engineering
    Read more
    Social Engineering

    Social Engineering

    • Gain knowledge and awareness on social engineering: What it is and why it works
    • Recognize common social engineering methods and tools and apply appropriate countermeasures
    • Get insight into how social engineers think
    • Apply best practices that will promote the protection, security and confidentiality of data
  • Smartphones
    Read more
    Smartphones

    Smartphones

    • Gain knowledge and awareness on the value and vulnerability of data residing on devices
    • Recognize potential threats to data privacy and security, and apply appropriate countermeasures
    • Apply best practices that promote the security of information and that of the organization
  • Cloud Computing
    Read more
    Cloud Computing

    Cloud Computing

    • Gain basic knowledge on cloud computing
    • Recognize the risks associated with cloud computing and apply appropriate countermeasures
    • Apply best practices that promote the security of information
  • Governance and Security
    Read more
    Governance and Security

    Governance and Security

    • Gain knowledge on what information security is and why it’s important.
    • Understand your role as a manager in protecting your organization’s information assets and engage your employees to follow best practices.
  • ISA for managers
    Read more
    ISA for managers

    ISA for managers

    • Have a knowledge on what information security is, and why it is important
    • Have an understanding of the challenges faced by an organization in ensuring the protection of information
    • Be aware of the risks associated with the use of technology and employee mobility
    • Understand their role in supporting information security initiatives within the organization

Effectively create your own course by selecting any or all of these information security awareness topics. The resulting course will focus on changing behaviours and reducing risk caused by your employees’ actions, making them your organization’s strongest links!

Our program enables users to understand and apply best practices to information security matters. It emphasizes the importance of protecting confidential and strategic information. And we keep the learning simple, so your employees will enjoy it, increasing their likelihood of adherence!

Ask for your free trial

Need help choosing your courses?

service_smallOur talented and extremely knowledgeable information security professionals works with your team to solve your challenges and build a program that is right for you.

Make it secure and make it stick

comm-tools-small We offer an array of communications tools to help your staff embrace secure behavior and adopt best practices. Simply put together the elements that make the most sense to you!

Tried, tested, compliant

lms-small All our courses are SCORM- or AICC-compliant and have been tested in large multinational corporations and government institutions. They are compatible with multiple browsers and can easily be uploaded into your hosted LMS.

“It’s all about security! A global security strategy must guide users to new and enhanced levels of awareness. The conscious embrace of a secure culture by all users is the goal.”
- Will, Best Practices Advisor

Do you have questions about our information security awareness courses?
Get in touch with us