Information Security Awareness Training

Information Security can be compromised in many ways. That’s why our e-learning solution offers 30 independent “off the shelf” topics covering the most important issues, from basic principles to best practices. Each activity is modular so you can create your own unique information security awareness training courses, targeting your organization’s specific needs.

  • Introduction to Information Security
    Read more
    Introduction to Information Security

    Introduction to Information Security

    • Learn about information security and why it is important
    • Understand users’ responsibilities in protecting the organization’s information
    • Apply best practices that contribute to the protection of information
  • Password
    Read more
    Password

    Password

    • Understand the importance of passwords
    • Learn how to create a strong yet easy to remember password
    • Apply best practices to manage passwords safely
  • Email
    Read more
    Email

    Email

    • Recognize common email threats and email misuse
    • Learn what precautions to take with incoming and outgoing emails
    • Apply best practices to use email securely
  • Malware
    Read more
    Malware

    Malware

    • Learn about the different types of malware
    • Recognize the human behaviors and technical factors involved in preventing malware infection
    • Apply best practices to reduce the threats posed by malware
  • Identity Theft
    Read more
    Identity Theft

    Identity Theft

    • Understand how identity theft affects victims and organizations
    • Learn about the methods frequently used to commit identity theft
    • Apply best practices to reduce the risk of falling prey to identity theft
  • Information Lifecycle
    Read more
    Information Lifecycle

    Information Lifecycle

    • Understand the value of information to an organization
    • Learn how to properly manage information throughout its lifecycle
    • Apply best practices for secure information management, including secure data destruction
  • Information Classification
    Read more
    Information Classification

    Information Classification

    • Understand why organizations classify their information
    • Practice classifying information according to its level of sensitivity
    • Apply best practices for handling information according to its classification level
  • Intellectual Property
    Read more
    Intellectual Property

    Intellectual Property

    • Learn about intellectual property
    • Understand behaviors and situations that may violate intellectual property rights
    • Apply best practices to protect the organization’s intellectual property and to respect the intellectual property rights of others
  • Privacy
    Read more
    Privacy

    Privacy

    • Learn about privacy and the related rights and obligations
    • Identify what is considered personal information
    • Apply best practices to protect personal information and the privacy of individuals
  • Protecting payment card data
    Read more
    Protecting payment card data

    Protecting payment card data

    • Understand an organization’s obligation to protect payment card data
    • Learn about the threats to payment card data
    • Apply best practices to ensure the security of cardholder information and reduce the risk of payment card fraud
  • The Clean Desk Principle
    Read more
    The Clean Desk Principle

    The Clean Desk Principle

    • Understand the importance of keeping unattended work areas clear of sensitive information
    • Learn about how to properly ensure the security of documents and portable devices
    • Apply best practices to reduce the risk of information leakage
  • Physical Security
    Read more
    Physical Security

    Physical Security

    • Understand the need for organizations to ensure the security of facilities and equipment
    • Learn about common work areas and how they must be protected
    • Apply best practices to reduce the risk of intrusion and theft
  • Access Control
    Read more
    Access Control

    Access Control

    • Learn why organizations must control access to their networks and systems
    • Understand the processes involved in granting and monitoring access
    • Apply best practices to reduce the risk of unauthorized access to information
  • Social Engineering
    Read more
    Social Engineering

    Social Engineering

    • Learn about social engineering
    • Recognize common social engineering methods
    • Apply best practices to thwart social engineering attacks
  • Bring Your Own Device (BYOD) Trend
    Read more
    Bring Your Own Device (BYOD) Trend

    Bring Your Own Device (BYOD) Trend

    • Understand the security issues related to the use of personal devices for business purposes
    • Learn the strategies adopted by organizations to reduce BYOD-related risks
    • Apply best practices when using personally owned devices in the workplace
  • Smartphones
    Read more
    Smartphones

    Smartphones

    • Learn about the information security risks inherent in smartphone functionalities
    • Learn about protecting information stored on smartphones
    • Apply best practices that promote the security and integrity of smartphones and information
  • Mobile devices
    Read more
    Mobile devices

    Mobile devices

    • Understand the inherent vulnerabilities of mobile devices
    • Learn about preserving the security and the integrity of mobile devices
    • Apply best practices to reduce the risk of device loss, theft, and malware infections
  • Confidentiality on the Web
    Read more
    Confidentiality on the Web

    Confidentiality on the Web

    • Understand the risks of inadvertently disclosing sensitive information on the web
    • Understand and recognize potential online threats
    • Apply best practices to minimize the risks posed by cybercriminals on the web
  • Mobile Users
    Read more
    Mobile Users

    Mobile Users

    • Learn about mobile users
    • Understand the risks related to user mobility
    • Apply best practices to protect mobile devices and the information contained in them
  • Traveling Securely
    Read more
    Traveling Securely

    Traveling Securely

    • Preserve the security of information while traveling and working remotely
    • Learn about the potential threats to information and technology used by traveling employees
    • Apply best practices and behaviors to keep information and mobile devices secure while traveling
  • Responsible Use of the Internet at work
    Read more
    Responsible Use of the Internet at work

    Responsible Use of the Internet at work

    • Learn how the organization could be harmed by inappropriate Internet usage
    • Understand what constitutes acceptable use of the Internet at work
    • Apply best practices to ensure responsible Internet use in the workplace
  • Social Networks
    Read more
    Social Networks

    Social Networks

    • Understand information confidentiality and the information ownership issues inherent in the use of social networks
    • Learn about the potential threats posed by fraudsters and cybercriminals
    • Apply best practices when posting information on social networks
  • Cloud Computing
    Read more
    Cloud Computing

    Cloud Computing

    • Understand what cloud computing is
    • Recognize the risks associated with cloud-based services
    • Apply best practices regarding the security of information and the respect of the organization’s policies regarding cloud use
  • Phishing
    Read more
    Phishing

    Phishing

    • Understand what phishing is and recognize how it threatens information security
    • Recognize and identify the features of a phishing message and website
    • Apply best practices to minimize the risks of being taken in by a phishing attempt

Effectively create your own course by selecting any or all of these information security awareness topics. The resulting course will focus on changing behaviours and reducing risk caused by your employees’ actions, making them your organization’s strongest links!

Our program enables users to understand and apply best practices to information security matters. It emphasizes the importance of protecting confidential and strategic information. And we keep the learning simple, so your employees will enjoy it, increasing their likelihood of adherence!

Ask for your free trial

Need help choosing your courses?

service_smallOur talented and extremely knowledgeable information security professionals works with your team to solve your challenges and build a program that is right for you.

Make it secure and make it stick

comm-tools-small We offer an array of communications tools to help your staff embrace secure behavior and adopt best practices. Simply put together the elements that make the most sense to you!

Tried, tested, compliant

lms-small All our courses are SCORM- or AICC-compliant and have been tested in large multinational corporations and government institutions. They are compatible with multiple browsers and can easily be uploaded into your hosted LMS.

“It’s all about security! A global security strategy must guide users to new and enhanced levels of awareness. The conscious embrace of a secure culture by all users is the goal.” – Isa

Do you have questions about our information security awareness courses?

Get in touch with us