Information Security

E-Learning Information Security

IT security and best practice advice for handling sensitive information

Information security involves a number of different measures to ensure an organisation’s sensitive data and information is protected – developing a secure IT infrastructure is fundamental to this. However, there is also a human element to consider in IT security. Employees themselves can unknowingly pose challenges to security measures through the careless handling of items such as passwords, devices and documents.

By delivering the ‘Information Security’ e-learning tutorial to your employees, you can increase their awareness of security risk and the steps they can take to prevent a breach. With practical examples from everyday life, your employees will learn how to act compliantly both at work and in public, as well as how to send information safely when using electronic devices. Additionally, employees will learn how information can be compromised even in a seemingly ‘safe’ environment – ever heard of ‘social engineering’?

Contents of the Information Security e-learning programme

The tutorial consists of a number of self-contained lessons. You can pick and choose any combination of lessons depending on whether you want to use the standard product or would like more options. Click here to learn more about ’lessons’ and ’lesson types’.

  • Welcome
  • Protecting Information
  • Information Classes
  • Secure Workplace
  • Company IT Network: Risks and How to Protect the Network
  • My Password
  • Electronic Communications
  • How to Act in Public Spaces
  • Social Engineering
  • Test

Expert author

Dr. Johann BizerThe expert author of our CEO fraud tutorial is Dr. Johann Bizer – Chief Executive Officer at Dataport, an IT service provider for the public sector. Dr. Bizer has served as a Deputy Regional Representative for data security for many years, and is well-known for his numerous publications on data privacy, as well as being one of the publishers of the ‘Data Protection and Data Security’ journal. Learn more at www.dataport.de.

Screenshots

References

Many companies have benefited from Idox Compliance’s Information Security tutorials, including Bilfinger Berger, Infineon, LEONI and SAP.

You might also like

Learning Management System

Learn more about how to roll-out your compliance training to your employees with the help of our LMS.

Learn more about the compliance LMS

Compliance communication

An appropriate communication concept is always necessary to accompany your compliance training!

Learn more compliance communication

Our clients

Do you want to know which companies and organisations rely on compliance training by Idox Compliance? Here is a selection of our clients and testimonials.

Clients overview