Information Security and Cyber Risk Awareness

Aligned with the ISO/IEC 27001:2002 standard

A customized course designed to prepare your workforce with the crucial knowledge to safeguard sensitive business data and foster a security-aware culture in accordance with the ISO/IEC 27001:2022 standard.

Audience
Learning Time
Employees and Contractors
25-30 minutes
Create a free account

About this course

Upon finishing this course, participants will acquire the skills to identify potential threats, safeguard sensitive data, and efficiently handle security incidents, aiding organisations in achieving ISO/IEC 27001:2022 certification standards and ensuring secure information management.

1
Section 1: Cyber Threat Landscape

In this module, we adopt a practical approach by focusing on real-world cyber security incidents, moving beyond theory. This enables participants to apply this practical knowledge directly in their day-to-day responsibilities, empowering them to proactively devise strategies to prevent similar incidents. Additionally, the course explores incidents that have affected several stakeholders, enhancing participants’ understanding of information security risks.

2

Section 2: Essential Elements of Information Security

This section delves into the key elements of information security, emphasizing the importance of effective information management.

CIA Triad

Data Classification

3

Section 3: Common Cyberattacks and Prevention

In this section, we explore the common categories of cyber threats and offer impactful strategies to mitigate them effectively.

Phishing and Its Variations

Ransomware

Disinformation

4

Section 4: Understanding ISO/IEC 27001 Standard

This section covers the basic concepts pertaining to the ISO/IEC 27001 standard.

Understanding ISO/IEC 27001

Understanding ISMS

Maintaining ISO/IEC 27001 Compliance Strategies

Significance of ISO/IEC 27001

Responsibilities of employees in achieving ISO/IEC 27001 compliance

Benefits of ISO/IEC 27001 certification

5

Section 4: Practicing Information Security at Work 

This section lists nine practical challenges inspired by real-life scenarios and equips professionals with effective strategies for their daily responsibilities. 

Secure Access to Facilities

Safe Remote Working

Securing Access Credentials

Safe Internet Browsing 

Safe usage of email and collaboration platforms

Safe Social Media Usage

Safe Usage of AI Applications

Safe Usage of Information Storage and Transfer

6

Section 5: Reporting Security Incidents

This section comprises examples of security incidents and offers guidance on the procedure to report them.

Overview of Information Security Incidents

Examples of Information Security Incidents

Reporting Security Incidents

7

Section 6: Summary and Assessment

In this section, we offer a summary of the key takeaways from the course. Additionally, we include a post-course assessment to evaluate the comprehension and knowledge retention of participants.

Customize this Course

Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.

Book a Demo

Feature your logo

Choose case-studies

Choose topics

Add information classification

Add incident reporting information

Translate the course (optional)

You may also like

Role
Information Security Awareness for E-commerce & SaaS Professionals

Arm E-commerce and SaaS professionals with cyber resilience.

E-commerce & SaaS Professionals

25-30mins

Role
Information Security Awareness for Data Scientists/Analysts

Enhance data scientists’ cyber security awareness for safeguarding sensitive information.

Data Scientists/Analysts

25-30 minutes

Role
Information Security Awareness for Software Professionals

Elevate your software team’s cyber awareness for robust security solutions.

Software Professionals

25-30 minutes