Information technology awareness e-learning course material

Information technology awareness e-learning course material

In a corporate environment, the importance of secure information communication devices is increasing user knowledge required for its management. In the modular curriculum, the small, medium and topics that occur in a large company environment are also processed in a way that is easy to understand and extremely vivid in form.

The use of the course material is an excellent solution for developing user awareness, which is essential for GDPR compliance , in an economical and extremely flexible way, since regardless of the time schedule and geographical location of the employees their training is feasible.

With the use of this e-learning solution, the training of not only current but also future employees can be solved, since it is not necessary to organize new classroom trainings for new employees , and therefore to use neither external nor internal resources.

The curriculum is recommended for all employees of the company who use IT devices (computer, laptop, tablet, smartphone) in their daily work.

The curriculum consists of 14 modules, each module consists of video films of approximately 10 minutes each, which can be learned during everyday work. The structure of the modules follows the following pattern:

  • Attitude shaping - Why is it important?
  • Theoretical overview - What dangers lurk for users?
  • Practical tools - How can we protect ourselves?
  • Summary - What are the most important lessons of the module?

Scope of the course material: 136 minutes of HD quality video material + multiple choice questions

The curriculum can be installed on an intranet or integrated into a SCORM-compatible educational framework form, and we provide online access to the knowledge sharing system of Training360.

The authors and lecturers of the course material

Kornél Tóth-Csikós

CISM

Information security manager
Training360 leading trainer and consultant

Balázs Tapasztó

CISA

Information security auditor
Training360 leading trainer and consultant

Modules of the curriculum

Module titleShort description
1.You are the target!An overview of the IT security situation today.
2.Email and correspondenceSecurity risks related to correspondence and their management.
3.Internet browsingThings to know about safe browsing.
4.Things to know about safe browsing.Types of identification, one- and multi-factor identification methods and recommended applications solutions.
5.Everyday dangersEveryday IT threats that the user faces in their home and the at work.
6.Password useBasics, tips and tricks for secure password usage.
7.Physical securityPhysical security breaches and their prevention.
8.Use of mobile devicesSources of danger during the use of mobile devices and protection against them.
9.Is encryption necessary?Free text and encrypted texts, types and advantages of encryption.
10.The principle of least authorityGranting the smallest, most necessary authority to the user.
11.PIIA group of identifiers that can be used to identify the person concerned. Direct and indirect damages and defense.
12.PhishingAttacks on our personal and sensitive data, suspicious winnings in e-mail, and that's it telltale signs that help you defend yourself.
13.RansomwareTypes and dangers of malware. Security updates and the importance of antivirus.
14.DDOSProcess of sophisticated overload attacks, denial of service requests, zombie machines abundance and prevention of attack.