Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Certificate in Secure Information Handling
Welcome
Introduction
Module One - Fundamentals of Information Security
Introduction
Information is an Asset
What is Information Security?
Information Classification
Information Security Policies
Module Summary
Module One Learning Assessment
Module Two - Acceptable Use of your Client’s Information and Technology
Introduction
Using the Internet
Sharing Information with Third-Parties
Unauthorised Software
Password Security
Using Public AI Platforms
Using USB Enabled Devices
Module Summary
Module Two - Learning Assessment
Module Three - Acceptable and Secure Use of Email
Introduction
Emailing Sensitive Information
Phishing - Business Email Compromise (BEC) attacks
Phishing - Handling Links in Emails
Module Summary
Module Three -Learning Assessment
Module Four - Protecting Information at the Office
Introduction
Keeping a 'Clear Desk' and a 'Clear Screen'
Visitor Management
Printing and Copying Sensitive Information at the Office
Disposing of Sensitive Hardcopy at the Office
Faxing Sensitive Information
Handling Telephone Requests
Confidential Meetings and Meeting Rooms
Module Summary
Module Four - Learning Assessment
Module Five - ProtectIng Information Away From the Office
Introduction
Working at Home
Using Personal and Third-Party IT
Working in Public Places
Secure Business Trips
Using Social Media
Module Five - Learning Assessment
Module Six - Recognising and Reporting Information Security Incidents
Recognising and Reporting Information Security Incidents
Module Six - Learning Assessment
Teach online with
Working at Home
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock