Covered in this Course

The Cyber Security Awareness Training course is broken down into 3 sections.

1) Cyber Security Overview

The main types of security breaches that organisations face tend to be those that take advantage of human error and flaws in computer security. This section looks at how these breaches could happen and explains some simple ways to make it harder for cyber-criminals to gain access.

In section 1 of our Cyber Security Training we give a complete overview of Cyber Security.

2) What You Can Do

This section looks at some of the most common ways malicious software can get into a system and at ways to prevent this from happening. It concentrates on emails, passwords, accessing websites, using social media and uploading data from external devices.

What can you do to prevent attacks from happening? As part of our Cyber Security Training.

3) Security Breaches

This final section is about continued vigilance on a day-to-day basis – spotting security weaknesses BEFORE a breach happens and how to report this. It also looks at recovery plans – how organisations handle breaches if they do happen.

Section 3 of our Cyber Security Training looks at security breaches.

Cyber Security Training Certificate

Each of our courses ends with a multiple choice test to measure your knowledge of the material. You'll also be able to download and print off a certificate once you've completed the course which displays your name, the course you've completed, and your test score.

This Cyber Security Awareness Training course concludes with a 20 question multiple choice test with a printable certificate. In addition, brief in-course questionnaires guide the user through the sections of the training and are designed to reinforce learning and ensure maximum user engagement throughout.

As well as printable user certificates, training progress and results are all stored centrally in your LMS (Learning Management System) and can be accessed any time to reprint certificates, check and set pass marks and act as proof of a commitment to ongoing legal compliance.

What does my Cyber Security Certificate include?

Your certificate will include your name, company name (if applicable), the name of course taken, pass percentage, date of completion, expiry date and all relevant approvals. 

An example of our Cyber Security Training certificate

Real User Reviews

Based on 219 real user reviews.

4.34 out of 5
Probably the best e-course I've taken

Accurate, thorough, and completely to the point. Definitely one of the best courses I've done. The structure of learning was brilliant and nothing was too long, this means it is easy to keep your attention on it.

5/5
Excellent course and very easy to follow

This is a very useful course. It is so easy to forget what colour extinguisher is for what type of fire and this information in this course is very straight forward as well as being very detailed.

5/5
fine

All relevant points covered in a claear and concise way.

3/5
A very high rating in its presentation .

I found this programme was very informative in respect of all the aspects of health and safety and has given me a wider perspective of the need to be vigilant at all times to enable myself and work colleagues a safe environment to work in.

5/5
very easy to use

Very informative, and a good refresher which could be done at regular intervals.

4/5
very easy to use

Very informative, and a good refresher which could be done at regular intervals.

4/5
user friendly

No summary provided

5/5
Easy to follow and broken done well

No summary provided

4/5
Read our full reviews for Cyber Security Awareness Training.

Legislation relating to Cyber Security Training

It's important that you comply with the law and know the ways in which it affects you and the way you work. Take a look at relevant legislation below.

The GDPR

The General Data Protection Regulation builds on the long-standing 1995 EU Data Protection Directive. What does the GDPR mean for businesses? In short, dramatically increased fines for breaches and other changes including: 

  • Data breaches must be reported within 72 hours.
  • 'Personal data' now includes location, IP address and RFID identifiers.
  • People now have a right to "be forgotten".

*The GDPR comes into effect on the 25th of May 2018. You can register your interest in our upcoming GDPR training.

The NISD

A complimentary directive to GDPR, which focuses more on critical IT systems and their infrastructure.