• Pricing

Information Security Training

CPD Certified Information Security training courses for your employees. We provide a comprehensive range of courses that contains a cluster of information security compliance courses.

Click image to enlarge

Click on the tabs below to view our innovative, engaging range of Information Security eLearning

The Collection

Collections are unique solutions designed to bring together the convenience and cost effectiveness of off-the-shelf eLearning with all the benefits of an engaging, bespoke training curriculum.

Our new Collections feature a variety of learning styles and fresh content to improve engagement and provide a long term solution to your training needs.

Using Collections, your organisation can enjoy the best of both worlds, giving you ready-made, holistic training programmes designed to deliver a multi-year training strategy with fresh content year-on-year.

Adaptive Courses

  • An innovative new approach to promote knowledge retention and learner engagement

  • Pre-assessment identifies areas of strengths and weaknesses

  • Course is automatically tailored to cover gaps in learners’ knowledge

  • Significantly reduces unnecessary training time

Our Adaptive Courses

Information Security Diagnostic Assessment

This online training course is designed to test learner’s knowledge on key topic areas of information security principles and best practice.

An AI-powered assessment, it measures the learner’s understanding of the topic and offers follow up microlearning training designed to fill gaps in knowledge. Available as xAPI courses on Astute LXP, the Diagnostic Assessment utilises the auto enrol functionality of Astute’s powerful AI engine.

A unique, innovative solution, the Diagnostic Assessment is ideal for evaluating individual training needs for each employee and saving time on unnecessary training.

Immersive Courses

  • Scenario-based courses

  • Place the learner at the centre of the experience

  • Test their ability to make the right decisions.

  • Highly interactive; designed to improve learner engagement.

Our Immersive Courses

Introduction to Information Security

This online training course on information security is designed to educate members of staff on their personal responsibilities for information security and helps to ensure that organisations are protected against cyberattacks and breaches.

Set in an engaging, immersive format, the course offers a good introduction to employees on the topic of information security. Learn the best practice to follow when it comes to information security, enable employees to become aware of their responsibilities and to help organisations mitigate the risks.

Learners go behind the scenes at Target Co to identify vulnerabilities in Target Co’s information security and to provide guidance on how these can be mitigated. Learners will complete an investigation on Target Co before making recommendations to the board.

Keeping Information Secure

This course is set in our engaging format and split into two modules of gamified scenarios.

It is designed to enable learners to understand key elements of data protection and keeping business information secure.

The course will also demonstrate to employees how to identify information security risks and minimise them accordingly. Learners are immersed in realistic scenarios which could occur in any organisation, anywhere in the world. The learner is tasked with discovering the source of a breach of information security.

Records Management Training

Many business decisions rest on accurate records management. All organisations benefit when their documents and records are correctly classified, stored and maintained. Document and Records Management Training will help your employees learn about the global restrictions and requirements regarding filing (whether electronic or paper) and the four stages of a record’s lifestyle.

Microlearning Courses

  • Short 5-10 minute learning vignettes

  • Focussed on key topics

  • Improve knowledge retention with bite size learning

  • Can be rolled out in response to emerging training needs.

Our Microlearning Courses

Consequences of Cybercrime

This microlearning course on Consequences of Cybercrime is designed to raise awareness on how cybercriminals target individuals and organisations.

Delivered in a powerful, video format, this microlearning course enables learners to gain a deeper understanding of the tactics used by cybercriminals and the breaches in information security which occur as a result of cybercrime.

Learn the importance of information security, the impact of cybercrime on organisations and their impact on employees and individuals alike.

Consequences of Information Leaks

This microlearning course on Consequences of Information Leaks is designed to raise awareness on information leaks in organisations.

Delivered in a powerful, video format, this microlearning course enables learners to gain a deeper understanding of how information leaks and breaches in information security occur and how it affects organisations.

Learn the importance of information security, the consequences of information leaks and its impact on employees throughout an organisation.

Handling Different Types of Data

An engaging online training course designed to raise awareness on handling different types of business data at work. In this interactive microlearning course, learners will understand the various levels of classifying and protecting data from unauthorised disclosure.

Set in an innovative and gamified format, learners will understand the various levels of data, how to classify data and sort data correctly. Learn the importance of handling data correctly and mitigating the risks of unauthorised disclosure.

By raising awareness, learners can confidently make the right decisions and align their data handling decisions with best practice.

Phishing Awareness

An engaging online training course enabling learners to identify and understand phishing attacks, how they occur and the tactics employed by cybercriminals. Learn how to successfully prevent phishing attacks in both personal and professional contexts.

The course enables businesses to mitigate the risks associated with online phishing attacks, including those that carry ransomware. By raising awareness, learners can confidently take action against the increasing threat of phishing by remaining alert and responding to threats appropriately.

Help you and your team understand how phishing attacks work, the tactics employed by cybercriminals, and how to spot and successfully avoid phishing scams.

Protecting Information (Digital Risks)

An engaging online training course on Protecting Information designed to raise awareness on mitigating the risks and protecting information at work. In this interactive microlearning course, learners will understand how to prevent breaches in information security.

Presented in a gamified format to understand the key steps learners must take to keep information digitally secure. Learn the best practice to follow when connecting to a network at work, saving files and transferring data and recognise the risks to data security.

By raising awareness, learners will be empowered to make correct decisions and understand the significance of keeping information secure – decreasing the risks of information breaches.

Protecting Information (Physical Risks)

Previously titled ‘Is Your Information Secure?’.

This course is set in our Take 5 microlearning format and contains a single module.

The interactive course starts with a tour of a typical office, its filing systems, printing station and workstations. Learners must take a closer look to correctly spot the lapses in information security and recognise the potential risks.

Along the way, learners will understand the importance of information security in the workplace and how they can contribute to securing business information and assets.

Protecting your Identity Challenge

Identity theft is an increasing online threat, whereby criminals can steal your personal information to steal from you and others, as well as commit crimes in your name.

The thief only needs to know your name, date of birth and current/previous address to steal your identity and use it to commit fraud. The more information they obtain, the easier it is, and harder to come back from.

This course goes beyond our cyber security and information security training courses to identify specific identity theft threats, detection methods and appropriate responses.

This online training course is designed to raise awareness on the pitfalls of identity theft and its impact on employees in a professional and personal context.

It outlines the risks of identity theft and the consequences that result, along with a number of ways in which businesses can protect themselves.

The online training concludes with a quiz to check your understanding of identity theft and how you can protect yourself against it.

Securing Mobile Devices

An engaging online training course on Securing Mobile Devices, designed to raise awareness on using mobile devices at work and protecting business information. In this interactive microlearning course, learners will understand how to prevent breaches in information security associated with mobile devices.

Presented in a gamified format, learners are presented with a scenario at work where they have received a new work tablet. Learn the best practice to follow while setting up a new mobile device and keeping information secure.

By raising awareness, learners can confidently make the right decisions and understand the significance of keeping mobile devices secure, reducing the risks of information breaches.

Setting a Secure Password

An engaging online training course on setting a secure password, enabling learners to understand the importance of strong passwords and help them create a secure password.

Packed with useful hints and tips that learners can use to create strong passwords that protect themselves, their company, and their customers. By raising awareness, learners can confidently create strong and unique passwords of secure length and strength and use different passwords for different accounts to better protect information.

Detailed Study Courses

  • Utilises what we would call a ‘traditional’ eLearning approach, meaning that learners are presented with the information then tested at the end

  • Information is presented in an interactive, engaging way

  • Longer, detailed courses

Our Detailed Study Courses

Freedom of Information Essentials

Under the Freedom of Information Act, public bodies have a number of important legal duties when it comes to handling, processing and responding to requests for information. Failure to comply with these can be a serious matter, so it’s vitally important your staff understand their responsibilities under the Act.

Our Freedom of Information Essentials online training course provides all the key things your staff need to know in an engaging and interactive format. Featuring clear explanations of the main provisions of the Act, case studies to explore its practical implications, and an ‘ask the expert’ reference facility. Our Freedom of Information Essentials eLearning course brings your staff up to speed with the Act quickly and cost-effectively.

Information Security Essentials

With so much important information now held in digital form, information security has become an issue that no organisation can afford to ignore. The scale of the threat can’t be overstated: in a recent survey, more than 90% of organisations said that they’d suffered some form of cyber security incident in the previous year.

This is where our Information Security Essentials eLearning course can help. It’s been designed to provide your staff with an understanding of the main cyber security threats and the practical things they can do to counter them. By taking this course learners can help to ensure everyone in your organisation know how to protect the confidentiality, integrity and availability of the information they work with.

PCI DSS

Any entity that stores, processes or transmits cardholder data should comply with Payment Card Industry Data Security Standards (PCI DSS). DeltaNet International’s PCI DSS eLearning course is designed to help organisations implement and maintain PCI DSS compliance. By exploring the security requirements set for card schemes, merchants, service providers, and financial institutions, the course highlights how PCI DSS compliance helps protect payment card data, as well as the profitability and reputation of your organisation.

We offer two versions of our PCI DSS eLearning course, with questions tailored to either front line (customer facing) or back office members of staff.

Communications Resources

To positively reinforce the learning messages in our courses we also provide you with a suite of communications resources, including:
  • Engaging resources to print out and display in the workplace

  • Share digitally via intranet, newsletter or display screen.

  • Promote a culture of compliance

  • Reinforce key behaviours

Our Communications Resources

Toolbox Talks

  • Resources based on corresponding courses

  • Designed to facilitate a blended learning experience for small groups.

  • Includes downloadable facilitation notes

  • Use as part of face-to-face training.

Our Toolbox Talks Courses

Mobile Security – Toolbox Talk

Our Mobile Security Toolbox Talk is a multimedia facilitation resource for training a small group or team on the basics of risks to information on mobile devices.

The format of this course is designed to encourage discussion and raise awareness on using mobile devices securely at work and protecting business information.

Take this course to recognise the risks associated with mobile devices and understanding the significance of keeping mobile devices secure.

Physical Risks – Toolbox Talk

Our Physical Security Toolbox Talk is a multimedia facilitation resource for training a small group or team on the basics of physical risks to information security.

The format of this course is designed to encourage discussion and learning on the topic of information security. From securing workstations, filing systems and print stations to recognising the potential risks in the workplace.

Take this course to learn about the physical risks to information in the workplace and how to protect information and prevent breaches.

Risks to Digital Information – Toolbox Talk

Our Risks to Digital Information Toolbox Talk is a multimedia facilitation resource for training a small group or team on the basics of risks to digital information.

The format of this course is designed to encourage discussion and raise awareness on mitigating the risks and protecting information at work.

Take this course to recognise the risks associated with digital information and understanding the significance of securely connecting to a network at work, saving files and transferring data and recognise the risks to data security.

Phishing Simulator

To positively reinforce the learning messages in our courses we also provide you with a suite of communications resources, including:
  • Send simulated phishing emails to your employees

  • Track and report on who opens them

  • Our AI driven platform will assess their learning needs

  • Auto enrol employees on our Phishing and Information Security courses to make your business more secure
Our Information Security Training Courses

Consequences of Cybercrime

This microlearning course on Consequences of Cybercrime is designed to raise awareness on how cybercriminals target individuals and organisations.

Delivered in a powerful, video format, this microlearning course enables learners to gain a deeper understanding of the tactics used by cybercriminals and the breaches in information security which occur as a result of cybercrime.

Learn the importance of information security, the impact of cybercrime on organisations and their impact on employees and individuals alike.

icon
Microlearning Courses

Consequences of Information Leaks

This microlearning course on Consequences of Information Leaks is designed to raise awareness on information leaks in organisations.

Delivered in a powerful, video format, this microlearning course enables learners to gain a deeper understanding of how information leaks and breaches in information security occur and how it affects organisations.

Learn the importance of information security, the consequences of information leaks and its impact on employees throughout an organisation.

icon
Microlearning Courses

Freedom of Information Essentials

Under the Freedom of Information Act, public bodies have a number of important legal duties when it comes to handling, processing and responding to requests for information. Failure to comply with these can be a serious matter, so it’s vitally important your staff understand their responsibilities under the Act.

Our Freedom of Information Essentials online training course provides all the key things your staff need to know in an engaging and interactive format. Featuring clear explanations of the main provisions of the Act, case studies to explore its practical implications, and an ‘ask the expert’ reference facility. Our Freedom of Information Essentials eLearning course brings your staff up to speed with the Act quickly and cost-effectively.

icon
Detailed Study Courses

Handling Different Types of Data

An engaging online training course designed to raise awareness on handling different types of business data at work. In this interactive microlearning course, learners will understand the various levels of classifying and protecting data from unauthorised disclosure.

Set in an innovative and gamified format, learners will understand the various levels of data, how to classify data and sort data correctly. Learn the importance of handling data correctly and mitigating the risks of unauthorised disclosure.

By raising awareness, learners can confidently make the right decisions and align their data handling decisions with best practice.

icon
Microlearning Courses

Information Security Diagnostic Assessment

This online training course is designed to test learner’s knowledge on key topic areas of information security principles and best practice.

An AI-powered assessment, it measures the learner’s understanding of the topic and offers follow up microlearning training designed to fill gaps in knowledge. Available as xAPI courses on Astute LXP, the Diagnostic Assessment utilises the auto enrol functionality of Astute’s powerful AI engine.

A unique, innovative solution, the Diagnostic Assessment is ideal for evaluating individual training needs for each employee and saving time on unnecessary training.

icon
Adaptive Courses

Information Security Essentials

With so much important information now held in digital form, information security has become an issue that no organisation can afford to ignore. The scale of the threat can’t be overstated: in a recent survey, more than 90% of organisations said that they’d suffered some form of cyber security incident in the previous year.

This is where our Information Security Essentials eLearning course can help. It’s been designed to provide your staff with an understanding of the main cyber security threats and the practical things they can do to counter them. By taking this course learners can help to ensure everyone in your organisation know how to protect the confidentiality, integrity and availability of the information they work with.

icon
Detailed Study Courses

Introduction to Information Security

This online training course on information security is designed to educate members of staff on their personal responsibilities for information security and helps to ensure that organisations are protected against cyberattacks and breaches.

Set in an engaging, immersive format, the course offers a good introduction to employees on the topic of information security. Learn the best practice to follow when it comes to information security, enable employees to become aware of their responsibilities and to help organisations mitigate the risks.

Learners go behind the scenes at Target Co to identify vulnerabilities in Target Co’s information security and to provide guidance on how these can be mitigated. Learners will complete an investigation on Target Co before making recommendations to the board.

icon
Immersive Courses

Keeping Information Secure

This course is set in our engaging format and split into two modules of gamified scenarios.

It is designed to enable learners to understand key elements of data protection and keeping business information secure.

The course will also demonstrate to employees how to identify information security risks and minimise them accordingly. Learners are immersed in realistic scenarios which could occur in any organisation, anywhere in the world. The learner is tasked with discovering the source of a breach of information security.

icon
Immersive Courses

Mobile Security – Toolbox Talk

Our Mobile Security Toolbox Talk is a multimedia facilitation resource for training a small group or team on the basics of risks to information on mobile devices.

The format of this course is designed to encourage discussion and raise awareness on using mobile devices securely at work and protecting business information.

Take this course to recognise the risks associated with mobile devices and understanding the significance of keeping mobile devices secure.

icon
Toolbox Talks

PCI DSS

Any entity that stores, processes or transmits cardholder data should comply with Payment Card Industry Data Security Standards (PCI DSS). DeltaNet International’s PCI DSS eLearning course is designed to help organisations implement and maintain PCI DSS compliance. By exploring the security requirements set for card schemes, merchants, service providers, and financial institutions, the course highlights how PCI DSS compliance helps protect payment card data, as well as the profitability and reputation of your organisation.

We offer two versions of our PCI DSS eLearning course, with questions tailored to either front line (customer facing) or back office members of staff.

icon
Detailed Study Courses

Our Collections help you to:

A Flexible Solution

  • Collections are designed to offer a highly flexible, easily scalable and agile alternative to traditional off the shelf training.

  • Our collections offer a variety of different learning interventions and styles, providing each organisation the flexibility to create a training plan that meets their unique requirements.

A Scalable Solution

  • Collections are easily scalable too; whether you need to provide in-depth training, refresher training or a comprehensive schedule of short training activities, each collection provide enough options to roll out a unique training programme year after year.

An Agile Solution

  • As they are off the shelf, our collections are ready when you are and can be deployed quickly and easily in direct response to the changing level of risk being faced by your organisation.

  • Each collection is updated with new courses as we develop them, so your training programme can be fresh each year and your training is always up to date, relevant and effective.

All Topics

Information Security Training FAQs

Information Security refers to a set of strategies for managing, detecting, and preventing unauthorised access or use of digital or non-digital information. The term covers a broad range of training, processes, programmes and management systems that all share a common objective: keeping information safe and handling information compliantly.

Information security training is a vital part of the day-to-day running of any organisation. This is because threats to sensitive and private information come in many different forms, and there are numerous regulations and best practices to follow depending on the type of information you would like to keep safe and where and how it is stored.

Information security threats are constantly evolving along with the technology we use to access and store information in the workplace. So many organisations rely heavily on the internet and smart devices to quickly share information, but without proper security measures and back-up plans in place, companies stand to lose millions in the event of a breach or internet outage. Threats to information security include the following (although this list is not exhaustive):

  • Ransomware
  • Spyware
  • Malware
  • Insecure passwords
  • Phishing attacks
  • Trojan infections
  • Keyloggers
  • Distributed Denial of Service (DDos)
  • Browser hijacking
  • Data protection breaches

Insights

Get in Touch

When you send us a message one of our friendly, knowledgeable eLearning experts will contact you as quickly as possible

Search...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Before you go…

Why not let a member of our team walk you through our innovative eLearning solutions? Simply add your details below and one of our team will arrange your platform demo.