Information Security
The Information Security course aims to provide participants everything they need to know about keeping sensitive and confidential information secure whilst working.
By the end of the course participants will understand:
-
How to best keep information secure
-
How to properly classify information
-
Which company policies may also fall underneath the information security umbrella
The course focuses on the following:
The CIA Infosec Triad
Participants will learn what it means to keep information held by the company they work for confidential and how to best prevent breaches of confidentiality and what to do during situations when such a breach has occurred, for example, sensitive emails being sent to the wrong recipients, alongside the importance of keeping data held by companies accurate and available to those authorised to access it at all times.
Information Security Policies
Many company policies fall under the Information Security umbrella, not just the company Information Security policy itself, therefore it is important that participants have an understanding of which company policies they can refer to and how they tie in to information security. This course provides an overview of how the following policies tie in with Information Security:
-
Phishing Policies
-
Data Protection Policies
-
Clear Desk Policies
-
Anti Bribery Policies
-
Information Classification Policies
-
The different classifications of information are detailed, including: public, internal, confidential and restricted information.
-
-
Social Media policies
-
Two Factor Authentication Policies
-
Password Policies