e-Learning course

Information Security and Cyber Risk Awareness


A customizable course to equip your employees with the essential knowledge required to protect sensitive business information and foster a security culture within the organization.

Audience: All/ End-Users, Learning time: 25-30minutes

Customize this course

Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.

Feature your logo

Choose case-studies

Choose topics

Add information classification

Add incident reporting information

Translate the course (optional)

Discover this course in Arabic

Unlock the power of knowledge and fortify your organization against cyber threats with our Arabic security awareness training course, equipping your team to defend against evolving challenges confidently.


Course data

This course helps organizations build the first line of defence against cyber threats by providing comprehensive information security and cyber risk awareness training. The participants will gain the knowledge to identify potential threats, protect sensitive data, and effectively respond to security incidents.

To assess the knowledge and comprehension acquired throughout the course, there will be a concluding assessment. Upon successful completion of the assessment, participants will have the opportunity to obtain a certificate as proof of their achievement.

Section 1: Cyber Threat Landscape
This course section takes a practical approach, examining real-life cybersecurity incidents instead of focusing solely on theory. They can then apply this knowledge to their work environments, implementing proactive measures to prevent similar incidents. Furthermore, they explore incidents that have affected employees, customers, partners, vendors, and stakeholders, broadening their understanding of information security risks.

Security Awareness Training Solutions for Middle East.

Section 2: Essential Elements of Information Security
This section covers the key pillars of information security and the value of information.

  • CIA Triad
  • Data Classification
Information Security and Cyber Risk Awareness

Section 3: Common Cyberattacks and Prevention
This section covers the most common cyberattacks and best practices to prevent them. 

  • Phishing and its variants
  • Ransomware
  • Disinformation

Section 4: Practicing Information Security at Work 
This section covers nine challenges based on real-life scenarios and preventive measures that employees can apply to their work.

  • Secure Access to Facilities
  • Safe Remote Working
  • Securing Access Credentials
  • Safe Internet Browsing
  • Safe Usage of Email and Collaboration Platforms
  • Safe Social Media Usage
  • Safe Usage of AI Apps
  • Safe Usage of Information Storage and Transfer
Data Protection and Privacy Awareness

Section 5: Reporting Security Incidents
This section covers examples of security incidents and how to report them.

  • Overview of Information Security Incidents
  • Examples of Information Security Incidents
  • Reporting Security Incidents

Section 6: Summary and Assessment
This section summarizes the key takeaways from this course. Also, an assessment towards the end to test the knowledge level and understanding.

Build Your Plan, Within Your Budget.

Have more questions?

Get your questions answered by our team of security awareness experts.

Pick a convenient slot from our calendar.

Image representing schedule a demo