Information Security Awareness-ISO 27001:2013
IT, Technology and Software
No. of Attendant
Acquired Skills/Covered Subjects
- Understand how to be a secured computer user
- Understand the need for Business Continuity planning and Disaster Recovery
- Understand how to be respond to various security incidents
- How to become a cyber safe employee
|About The Provider||
Udemy.com is an online learning platform aimed at professional adults and students.
Udemy, a portmanteau of you + academy, has more than 30 million students and 50,000 instructors teaching courses in over 60 languages. There have been over 245 million course enrollments. Students and instructors come from 190+ countries and 2/3 of students are located outside of the U.S. Udemy also has over 4,000 enterprise customers and 80% of Fortune 100 companies use Udemy for employee upskilling (Udemy for Business). Students take courses largely as a means of improving job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
Udemy serves as a platform that allows instructors to build online courses on topics of their choosing. Using Udemy's course development tools they can upload video, PowerPoint presentations, PDFs, audio, zip files and live classes to create courses. Instructors can also engage and interact with users via online discussion boards.
Courses are offered across a breadth of categories, including business and entrepreneurship, academics, the arts, health and fitness, language, music, and technology. Most classes are in practical subjects such as Excel software or using an iPhone camera. Udemy also offers Udemy for Business, enabling businesses access to a targeted suite of over 3,000 training courses on topics from digital marketing tactics to office productivity, design, management, programming, and more. With Udemy for Business, organizations can also create custom learning portals for corporate training.
The essential objective of this course is to create awareness within the organization regarding various basic requirements of the standard & impart working knowledge on how these requirements can be interpreted to suit the organization’s processes, products, people & customers.
The employees in most companies don’t take Information security seriously – not only the top managers, but also their peers.
This is due to the fact that the employees usually do not understand what information security or business continuity is all about – in other words, you may have perfect policies and procedures, but simply pushing those to your internal email list won’t help. You need to explain to your colleagues why information security and business continuity are needed, and how to perform certain tasks – that’s the main purpose of awareness and training.
In this course, we will teach you how employees, business owners and other computer users are compromised in this digitally connected world and also teach you how to safeguard themselves and their organization's information asset against various attacks.
It helps each and every employee of an organization on various security policy and its importance.
It helps HR managers to learn how to recruit as per ISO 27001:2013 guidelines and how to run an effective employee induction program for better information security awareness.
It helps IT managers to learn how to securely handle data, media containing data and IT devices to ensure organization's information safety.
It also helps the business continuity manager on how to handle disaster at an event of disaster.
You will be encouraged to practice what you have learned in a simulated environment via our practice "Audio Visual Exercise" session.
We have designed this course to enable each and every computer user to safeguard themselves and their organization against identity theft and other credential breach from unauthorized users via technical and non-technical attack methods.
By the end of this course, you will be familiar with how various types of technical and non-technical attack methods are performed and you will be fully equipped to defend and safeguard yourself and your organization's information asset against various real-time attack vectors.
This course has been specifically designed by a team of information security researchers who are acknowledged experts in their field.
This course has been designed to accelerate your learning process through the use of creative animations and easy to understand voice over narratives. Complex concepts have been broken down into easy to understand modules.
Together, our team will walk you through the entire learning process step by step.
This course is a must for every computer user of an organization.No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.
We look forward to having you join us. In the meantime, please feel free to take a look at our demo tutorial and exercise before you purchase the full course.
Security awareness and awareness of institutions | Stay safe on the Internet