Strengthen your team’s skills through our data protection and privacy awareness training program centered on India’s Digital Personal Data Protection bill, aimed at preventing breaches. 

Audience: All/ End-Users, Learning time: 35-40 minutes

Customize this course

Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.

Feature your logo

Choose case-studies

Choose topics

Add information classification

Add incident reporting information

Translate the course (optional)

Learn more

Course data

The Information Security and India Data Protection course is designed to assist organizations in establishing their primary defence against cyber threats. It achieves this by delivering a comprehensive training program in information security, equipping employees with essential principles and best practices for safeguarding personal data. Additionally, the course addresses protocols for the collection and processing of personal data in accordance with Indian regulations such as the DPDP, emphasizing the importance of maintaining the privacy of such information.

The course includes an assessment at the end.

Section 1: Cyber Threat Landscape
In this course segment, a practical approach is adopted, with a focus on analyzing actual cybersecurity events rather than focusing exclusively on theory. Learners are encouraged to apply this newfound knowledge to practical applications within their professional settings, implementing proactive measures to prevent similar incidents. Additionally, they explore incidents that have impacted individuals ranging from employees and customers to partners, vendors, and stakeholders, thereby expanding their understanding of information security risks. 

Cyber Threat Landscape

Section 2: Essential Elements of Information Security and Data Privacy 
This section covers the key pillars of information security and the value of information. 

  • CIA Triad
  • Data Classification
  • Types of Personal Information
Essential Elements of Information Security and Data Privacy 

Section 3: Common Cyberattacks and Prevention 

This section covers the most common cyberattacks and best practices to prevent them.

  • Phishing and its variants
  • Ransomware
  • Disinformation
Common Cyberattacks and Prevention 

Section 4: Practicing Information Security at Work

This section covers nine challenges based on real-life scenarios and preventive measures that employees can apply to their work.

  • Secure Access to Facilities
  • Safe Remote Working
  • Securing Access Credentials
  • Safe Internet Browsing
  • Safe Usage of Email and Collaboration Platforms
  • Safe Social Media Usage
  • Safe Usage of AI Apps
  • Safe Usage of Information Storage and Transfer
Practicing Information Security at Work

Section 5: Understanding India Digital Personal Data Protection Act (DPDP)
This section focuses on key concepts and principles of DPDP that are essential for understanding and ensuring data protection and privacy.

  • What is the India Digital Personal Data Protection Act (DPDP)?
  • Why is DPDP important?
  • Who does DPDP apply to?
  • Definitions under the India DPDP.
  • Rights of a Data Subject.
  • Responsibilities of Data Protection Authority (DPA)
  • Consequences of Non-Compliance with the India DPDP.
Understanding India Digital Personal Data Protection Act (DPDP)

Section 6: Reporting Privacy Breaches and Security Incidents
This section highlights examples of privacy breaches and security incidents and provides guidance on reporting procedures.

  • What is a privacy breach?
  • Examples of privacy breaches.
  • Overview of Information Security incidents.
  • Examples of Information Security incidents.
  • Reporting Privacy Breach and Security Incidents.
Reporting Privacy Breaches and Security Incidents

Section 7: Summary and Assessment
This section summarizes the key takeaways from this course. Also, an assessment towards the end to test the knowledge level and understanding.

Summary and Assessment

Have more questions?

Get your questions answered by our team of security awareness experts.

Pick a convenient slot from our calendar.

Image representing schedule a demo