Introduction to Information Security

Mitigate the risks of cyberattacks and protect your business

Key Learning Points:

  • Best practice to keep information secure
  • How to set a strong password and use access control measures
  • How to apply the Information Security Triad
  • Importance of maintaining the quality of information security systems
  • Financial and legal risks involved in losing sensitive information
  • Personal responsibilities when it comes to keeping information secure

Course Overview

This online training course on information security is designed to educate members of staff on their personal responsibilities for information security and helps to ensure that organisations are protected against cyberattacks and breaches.

Set in an engaging, immersive format, the course offers a good introduction to employees on the topic of information security. Learn the best practice to follow when it comes to information security, enable employees to become aware of their responsibilities and to help organisations mitigate the risks.

Learners go behind the scenes at Target Co to identify vulnerabilities in Target Co’s information security and to provide guidance on how these can be mitigated. Learners will complete an investigation on Target Co before making recommendations to the board.

Course Details

  • Certificate on completion
  • Regular course updates
  • Course can be tailored to meet your specific requirements

Course Contents

This course is published by Cylix

Tailored versions of the courses are available for the following sectors

Compatible for

Any Workplace

Public Sector




Fire & Rescue

The Assessment

The course is highly gamified and broken up into three phases with its own challenges: Information Gathering, Exploitation and Debrief.

In the Information Gathering phase, there are seven inventory items available to collect. Learners must collect them all to gather as much information as possible about Target Co. Learners must uncover at least six of the seven vulnerabilities in this phase to ensure you’re able to debrief the board. If you don’t identify the vulnerabilities right away, you can go back and try again before you finish this phase.

In the Exploitation phase, learners must exploit the information they have gathered to identify Target Co’s vulnerabilities. The challenge is to see three risk dials increase to show the risks to the confidentiality, integrity and availability of Target Co’s information.

Finally, in the Debrief phase, learners debrief the Target Co board and recommend improvements to their security culture to reduce the risks to their information. Learners must make suggestions to resolve six vulnerabilities. To pass the course, at least five of the suggestions must reflect best practice.

2 Ways of Purchasing

You can purchase our courses individually or for even better value you can purchase the complete range of Compliance, Health and Safety or Performance Management courses in one neat bundle.

1. Individual Licenses

If you buy courses on an individual bases you pay a price per learner, per course per year. You can run these courses on your own LMS if Xapi/SCORM compliant or you can take them online.


2. Complete Bundle

Buy all of the Compliance, Health and Safety or Performance Training courses in one great value package and receive unlimited benefits including our AI driven Learning Experience Platform, Astute.

1. Individual Pricing

Number of Learners Cost (per year)
1 - 10
£34.50 / per learner
11 - 20
£29 / per learner
21 - 50
£23 / per learner
51 - 100
£17.50 / per learner
101 - 150
£11.50 / per learner
Exchange rates are updated regularly but are only intended as a guide.

2. Complete Bundle Pricing

If you buy all the Compliance, Health & Safety or Performance Training in a complete bundle, all features come as standard, no matter the size of your organisation!
Number of Learners Cost (per year)
50 - 100
£34.50 / per learner
101 - 200
£29 / per learner
201 - 300
£24.50 / per learner
301 - 400
£21 / per learner
401 - 500
£17.50 / per learner
501 - 750
£14.50 / per learner
751 - 1000
£11.50 / per learner
1001 - 2500
£9.50 / per learner
2501 - 5000
£7 / per learner
5000 - 10,000
£6 / per learner
10,000 +

Included Features

  • All courses in our catalogue
  • Our Learning Experience Platform ‘Astute’
  • New courses added regularly
  • Branded, downloadable posters
  • Customise Course Content for Your Team
  • Regular course updates
  • Dedicated Account Manager
  • Unlimited help desk support
Exchange rates are updated regularly but are only intended as a guide. Prices are based on a 2 year contract.

Why You Need Information Security Training

Information security is critical to all organisations. Breaches in information security have led many organisations, including banks, telecommunications companies and even governments, to lose valuable business information such as customers’ personal data. The loss of sensitive information places organisations at financial and legal risks and it can seriously damage their reputation. Organisations and employees are both responsible for managing information securely, understanding the security risks and ensuring compliance with security policies.


If you have any questions that are not covered here, please get in touch.

Information security, often shortened to InfoSec, is the practice of protecting business information from the threat of cyber-attacks and cybercriminals and mitigating the risks. The main goals of protecting information security are preventing the compromise of business information, the loss of integrity and the breach of confidentially of business systems and data.

The CIA triad is a well-known information security model often used as a foundation to develop strong information security policies. The triad defines three main principles of information security: availability, integrity and confidentiality. Confidentiality is limiting data access, integrity is ensuring your data is accurate, and availability is making sure it is accessible to those who need it.

Information security is vital for ensuring day-to-day business operations. The consequences from breaches can be expensive for businesses to recover from. Apart from resulting in non-compliance with data protection regulations, breaches can affect businesses negatively through heavy penalty fines and loss of reputation – both can impact longevity and profitability a business.

If you have any feedback about our products please contact us at [email protected]

7 Day Instant FREE Trial