Information Security and Cyber Risk Awareness
A customized course designed to prepare your workforce with the crucial knowledge to safeguard sensitive business data and foster a security-aware culture in accordance with the ISO/IEC 27001:2022 standard.
About this course
Upon finishing this course, participants will acquire the skills to identify potential threats, safeguard sensitive data, and efficiently handle security incidents, aiding organisations in achieving ISO/IEC 27001:2022 certification standards and ensuring secure information management.
Section 1: Cyber Threat Landscape
In this module, we adopt a practical approach by focusing on real-world cyber security incidents, moving beyond theory. This enables participants to apply this practical knowledge directly in their day-to-day responsibilities, empowering them to proactively devise strategies to prevent similar incidents. Additionally, the course explores incidents that have affected several stakeholders, enhancing participants’ understanding of information security risks.
2
Section 2: Essential Elements of Information Security
This section delves into the key elements of information security, emphasizing the importance of effective information management.
CIA Triad
Data Classification
3
Section 3: Common Cyberattacks and Prevention
In this section, we explore the common categories of cyber threats and offer impactful strategies to mitigate them effectively.
Phishing and Its Variations
Ransomware
Disinformation
4
Section 4: Understanding ISO/IEC 27001 Standard
This section covers the basic concepts pertaining to the ISO/IEC 27001 standard.
Understanding ISO/IEC 27001
Understanding ISMS
Maintaining ISO/IEC 27001 Compliance Strategies
Significance of ISO/IEC 27001
Responsibilities of employees in achieving ISO/IEC 27001 compliance
Benefits of ISO/IEC 27001 certification
5
Section 4: Practicing Information Security at Work
This section lists nine practical challenges inspired by real-life scenarios and equips professionals with effective strategies for their daily responsibilities.
Secure Access to Facilities
Safe Remote Working
Securing Access Credentials
Safe Internet Browsing
Safe usage of email and collaboration platforms
Safe Social Media Usage
Safe Usage of AI Applications
Safe Usage of Information Storage and Transfer
6
Section 5: Reporting Security Incidents
This section comprises examples of security incidents and offers guidance on the procedure to report them.
Overview of Information Security Incidents
Examples of Information Security Incidents
Reporting Security Incidents
7
Section 6: Summary and Assessment
In this section, we offer a summary of the key takeaways from the course. Additionally, we include a post-course assessment to evaluate the comprehension and knowledge retention of participants.
Customize this Course
Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.
Book a DemoFeature your logo
Choose case-studies
Choose topics
Add information classification
Add incident reporting information
Translate the course (optional)
You may also like
Information Security Awareness for E-commerce & SaaS Professionals
Arm E-commerce and SaaS professionals with cyber resilience.
E-commerce & SaaS Professionals
25-30mins
Information Security Awareness for Data Scientists/Analysts
Enhance data scientists’ cyber security awareness for safeguarding sensitive information.
Data Scientists/Analysts
25-30 minutes
Information Security Awareness for Software Professionals
Elevate your software team’s cyber awareness for robust security solutions.
Software Professionals
25-30 minutes