Information Security is no longer just an IT function β itβs everyoneβs responsibility. This training helps employees recognise confidential information, protect it appropriately, and respond correctly to security threats.
This eLearning course gives employees the knowledge and tools to safeguard company and customer data, comply with policies, and prevent breaches. Relatable examples, scenarios, and quizzes make security concepts practical.
Why Information Security matters, legal and reputational stakes.
Identify confidential data, protection responsibility, and classification.
Data classification, handling, secure storage, transmission, and access control.
Phishing, smishing, vishing, tailgating, shoulder surfing, baiting.
Password security, clear desk & screen policy, mobile/BYOD security.
Physical security, secure disposal, internet safety, responsible social media use.
Prevent insider threats, acceptable use of assets, NDAs, and policy exceptions.
Incident reporting procedures and scenario-based assessment with certificate upon completion.
β Key concepts: confidentiality, integrity, availability
β Organisational risks and legal requirements
β Examples of sensitive data (personal, financial, intellectual property)
β How to identify and classify it
β Business impact of breaches
β Regulatory / contractual obligations
β Data handling and storage
β Encryption and secure transfer
β Access control
β Phishing, smishing, vishing
β Tailgating, shoulder surfing, baiting
β How to spot and report them
β Strong password practices, MFA
β Password managers and rotation
β Keeping desks clear of sensitive info
β Auto-locking screens, shredding printouts
β Securing company and personal devices
β Remote wipe, updates, secure networks
β Badge access, visitor controls
β Secure disposal of paper and electronic media
β Safe browsing, avoiding malicious sites
β Use of VPN for remote work
β Avoiding oversharing company information
β Respecting confidentiality online
β Public Wi-Fi risks
β Keeping devices and documents safe during travel
β What they look like
β Preventive controls and reporting
β Email, internet, software, and equipment usage rules
β Purpose and employee obligations
β How exceptions work
β Who can approve them
β Internal reporting channels and timelines
β What information to provide
β Incident response flow
β Scenario-based quiz to reinforce learning
β Certificate upon successful completion
De-risk your business from intended or unintended ethical transgressions. Drive personal, legal, behavioural, and business-centric outcomes and consequences with this training CoC training module.
Stay ahead of digital privacy challengesβminimize exposure to breaches, penalties and reputational damage. Achieve legal, behavioural and business-aligned outcomes with this DPDP training module.