Managing Online Security Risk
As incidents of data leaks, hacks and attacks hit the headlines from week to week, it has never been more crucial that organisations understand different types of data security risks. These accessible and engaging courses explain good practice that protects staff, stakeholders, and the public against the impact of those risks.
Cyber Security
Introductory
£17.99
Introductory
Learning Nexus
It seems that everything relies on technology these days, after all, most of us use computers, tablets, or mobile phones for e-mails, entertainment, online banking, and shopping. Of course, this means that much of our personal information is stored either on our own computers, or on someone else’s system. Practically all businesses and organisations worldwide use computers and the internet to store, process, and communicate information – much of it sensitive and confidential.
Gaining illegal access to both personal and organisational
information can be very lucrative for cyber criminals; it can also be very satisfying for those seeking some form of revenge, or wishing to enjoy the kudos of breaking into apparently secure systems.
This course will explain how you can remain safe and compliant by understanding online security. You will be able to describe how to protect yourself, and the company in which you work, to stay safe from digital threats.
The duration of this course is 20 minutes and can be completed over multiple sessions.
By the end of this course you will be able to:
• List the dangers of cyber attacks
• Recall the methods of system attacks and how to minimise the risks
• Apply your knowledge to different scenarios
• Describe the basic security practices and explain how to apply them
Introductory
Learning Nexus
Cyber Security
It seems that everything relies on technology these days, after all, most of us use computers, tablets, or mobile phones for e-mails, entertainment, online banking, and shopping. Of course, this means that much of our personal information is stored either on our own computers, or on someone else’s system. Practically all businesses and organisations worldwide use computers and the internet to store, process, and communicate information – much of it sensitive and confidential.
Gaining illegal access to both personal and organisational
information can be very lucrative for cyber criminals; it can also be very satisfying for those seeking some form of revenge, or wishing to enjoy the kudos of breaking into apparently secure systems.
This course will explain how you can remain safe and compliant by understanding online security. You will be able to describe how to protect yourself, and the company in which you work, to stay safe from digital threats.
The duration of this course is 20 minutes and can be completed over multiple sessions.
By the end of this course you will be able to:
• List the dangers of cyber attacks
• Recall the methods of system attacks and how to minimise the risks
• Apply your knowledge to different scenarios
• Describe the basic security practices and explain how to apply them
Dealing with Requests for FOI
£17.99
Learning Nexus
The purpose of the Freedom of Information Act is to give people increased access to the wealth of information held by public bodies, and government departments. The Act further aims to encourage increased openness, and to enable members of the public to understand how such organisations carry out their duties, why they make the decisions they do, and how they spend public money. This course will enable learners to understand how to deal with FOI requests.
The duration of this course is 20 minutes and can be completed over multiple sessions.
Learning Objectives:
• Explain how requests for information under the Publication Scheme, which is covered under section 19 of the Freedom of Information Act, work
• Outline the process for individual requests for information, covered under section 1 of the Act
• Explain how to request Environmental Information
Learning Nexus
Dealing with Requests for FOI
The purpose of the Freedom of Information Act is to give people increased access to the wealth of information held by public bodies, and government departments. The Act further aims to encourage increased openness, and to enable members of the public to understand how such organisations carry out their duties, why they make the decisions they do, and how they spend public money. This course will enable learners to understand how to deal with FOI requests.
The duration of this course is 20 minutes and can be completed over multiple sessions.
Learning Objectives:
• Explain how requests for information under the Publication Scheme, which is covered under section 19 of the Freedom of Information Act, work
• Outline the process for individual requests for information, covered under section 1 of the Act
• Explain how to request Environmental Information
Exemptions to FOI
£17.99
Learning Nexus
A person might make a request for any information, but this does not mean you are always obliged to provide them with it. There will be occasions where there will be a good reason why you should not make public some, or all of the information requested. This course will introduce you to those exemptions.
The duration of this course is 20 minutes and can be completed over multiple sessions.
Learning Nexus
Exemptions to FOI
A person might make a request for any information, but this does not mean you are always obliged to provide them with it. There will be occasions where there will be a good reason why you should not make public some, or all of the information requested. This course will introduce you to those exemptions.
The duration of this course is 20 minutes and can be completed over multiple sessions.
Information Security
£17.99
Learning Nexus
This course will give you an introduction to remaining safe and compliant, by understanding information security. You will be able to describe how to protect yourself, and the company in which you work, to stay safe from digital threats.
The duration of this course is 20 minutes and can be completed over multiple sessions.
Upon completion of this course, you will be able to:
• Explain what security breaches are, and how they can happen
• List ways to ensure that data storage equipment is secure
• Outline the rules relating to personal use of email and the internet
• Identify the damage related to the transmission of junk email and offensive material
• Acknowledge the consequences of using unauthorised software
Learning Nexus
Information Security
This course will give you an introduction to remaining safe and compliant, by understanding information security. You will be able to describe how to protect yourself, and the company in which you work, to stay safe from digital threats.
The duration of this course is 20 minutes and can be completed over multiple sessions.
Upon completion of this course, you will be able to:
• Explain what security breaches are, and how they can happen
• List ways to ensure that data storage equipment is secure
• Outline the rules relating to personal use of email and the internet
• Identify the damage related to the transmission of junk email and offensive material
• Acknowledge the consequences of using unauthorised software