Start typing to search across courses, articles, and pages.

General

Cyber and Information Security Training

Course Overview

This eLearning course provides comprehensive training on cyber and information security, designed to give professionals a thorough understanding of the threats they face and the measures they must take to protect information assets. In an era of increasing digital connectivity and sophisticated cyber threats, information security is a critical concern for every organisation and every employee.

The course covers the full spectrum of cyber and information security topics, beginning with an overview of the threat landscape including the types of threat actors — from state-sponsored groups to opportunistic criminals — and their methods of attack. It explains social engineering techniques in depth, including phishing, spear phishing, vishing, and pretexting, and provides practical advice on how to identify and resist these attacks.

The training addresses the principles of information security — confidentiality, integrity, and availability — and how these apply to the handling of data in professional environments. It covers data classification, secure data handling procedures, encryption, and the specific requirements around personal data under GDPR. Practical guidance is provided on password management, multi-factor authentication, secure communication, and the risks associated with social media and online activity.

The course also covers physical security, mobile device security, and the particular risks associated with remote and hybrid working. It addresses incident response procedures and the importance of timely reporting, as well as the regulatory obligations around data breach notification. Upon completion, learners will have a comprehensive understanding of cyber and information security principles and practices, and be equipped to play their part in protecting their organisation's information assets.

Learning Outcomes

  • Understand the current cyber threat landscape and emerging risks
  • Identify common types of cyber attacks including phishing, malware, and social engineering
  • Recognise the importance of password security and multi-factor authentication
  • Know how to handle sensitive data securely
  • Understand the principles of data protection in a cyber context
  • Know how to respond to a suspected cyber security breach
  • Apply best practices for safe use of email, internet, and mobile devices
  • Understand the regulatory obligations around cyber security and data breach reporting