Information Security : All Employees Bundle
Course

Information Security : All Employees Bundle

Human Logic
Updated Nov 27, 2019

Course Overview

When we talk about information security for end users, we’re referring to the type that needs to be focused on employees whom hackers may target. Basically, anyone with an Internet connection can inadvertently provide access to your company’s sensitive information if they are not trained to do otherwise.

In this course you will learn about Access Control Systems, Assets Management, Awareness and Training, Compliance, General Guidelines, IS Security Incident Management, Physical and Environmental Security, Financial Phishing, Reset Password Over Phone, Storing Company Data on Personal External Drives in detail. 

Target Audience

Information Security

Learning Objectives

  • Use assigned privileges, to conduct authorized activities
  • Protect your access credentials
  • Change your password, as per InfoSec mandate, and adhere to the complexity requirement
  • Support maintenance of Information asset inventory (Digital and Physical)
  • Classify and label the assets as per policy
  • Protect assets from unauthorized access
  • Support maintenance of Information asset inventory (Digital and Physical)
  • Classify and label the assets as per policy
  • Protect assets from unauthorized access
  • Understand the importance of Information Security Awareness and Training programs in identifying and preventing breaches of information security
  • Understand and adhere to legislative statutory, regulatory, and contractual requirements as per Information Security standards available
  • Understand and conform to the Performance Evaluation policy and associated controls
  • Review reported incidents and take suitable corrective & preventive measures. Encourage staff members to report incident
  • Create awareness among staff members based on lessons learnt from incidents and advise them on good and ethical security practices
  • Understand and Conform to the Physical and Environmental Security policy and associated controls
  • Reducing the Financial Damages
  • Avoiding the Damage
  • Protect the information against external or internal threats
  • Classify the information according to its criticality to protect it against unauthorized modifications or disclosure
  • Restrict users to use unathorised devices in organization computers/laptops. 
;