Organizations have strict systems to monitor information and managing inflow and outflow of information. The threat to information security needs to be tackled or mitigated in a timely manner. Employees have an important role to play in managing information security of an organization The course helps answer the question, How to protect information by mitigating security risks?
Duration: 30 minutes
Target Audience: All employees, managers of an organization.
Course Prerequisites: None
Business Outcomes: To help employee with knowledge of Information security and take measures to report information security breaches in a timely manner.
The below words only indicate, the relevance to go through the Information Security course, when we discuss what it means to be protected against the unauthorized use of information, electronic data, comes into the picture. These are not an exhaustive set of terms but are relevant for sure.
Phishing, Authentication, Attack Vector, Encryption, Ransomware, Malware, Breach, Backdoor, Exploit, Firewall, Trojan Horse, Adware, Access Control, Spyware, BYOD, IP, Spoofing, Account Harvesting, Vulnerability Reduction, Deterrence.
After covering our existing course, if you need more details on a specific key word mentioned above or something unique to your organization, let us know and we will make those updates as needed, subject to discussion.
Organizations have strict systems to monitor information and managing inflow and outflow of information. The threat to information security needs to be tackled or mitigated in a timely manner.
Employees have an important role to play in managing information security of an organization.
This eLearning course will help you know about information security.
Explain the concept of ‘Information Security’.
Describe the key principles of ‘Information Security’.
Identify different types of security threats.
Explain the different measures and strategies for ‘Information Security Management’.