Online Cybersecurity & Information Technology Awareness Training

Our online Cyber security awareness platform allows you to customize your training to fit your organization’s needs and schedule.

  • - The modules are delivered online and involves a number of interactive exercises that help in the learning experience.

  • - Different groups of users can be assigned different modules and durations.

  • - Phishing emails are also sent during the course of the year.

  • - Reporting will be done after every 90 days or as requested.

At the end of this course participants will be able to:

  • Understand the basics of an IT architecture

  • Understand and know how they can help keep information and data safe and why

  • Understand any regulations, acts and laws that interact with their day to day use of technology and how they affect them Understand how to use technology safely and wisely and why Understand what technologies help keep their system safe from hackers, viruses, spam, and other risks

  • Understand data protection guidelines as they relate to the Data Protection Act and the Freedom of Information Act Understand good practices when using the Internet, email and social media and how to use these wisely and safely

Course Modules:

1. Phishing

2. Password Security

3. Malware

4. Ransomware

5. Mobile Security

6. Mobile Wi-Fi Security

7. Public Networks and Computers

8. Social Engineering

9. Safe Web Browsing

10. Working Remotely

11. Physical Security

12. Removeable Media

13. PCI DSS

14. Privacy and PII

15. International Travel Security

16. Avoiding Cybersecurity Risks for Executes

17. Social Media

On-Site Cyber Security Training

We can also deliver cyber security training in person at your office of place of business. This may be preffered when you want a more ‘hands-on,’ personal approach or there are specific topics you want to cover in detail.

At the end of this course participants will understand:

  1. The basics of an IT architecture

  2. Why and how they can keep information safe

  3. The regulations, acts and laws that interact with their day to day use of technology

  4. How to use technology safely and wisely

  5. What technologies help keep their system safe from hackers, viruses, spam and other risks

  6. Data protection guideslines as they relate to the Data Protection Act and the Freedom of Information Act

  7. Good practices when using the Internet, email and social media