Data Protection Baseline
Data protection ensures when we are processing, transferring and storing information that we do so efficiently. We’ll make sure that we understand our own responsibilities.
Courses created in the TAE branding, available as COTS solutions
Data protection ensures when we are processing, transferring and storing information that we do so efficiently. We’ll make sure that we understand our own responsibilities.
Your organisation has implemented technical controls to prevent cyber criminals from accessing your data. However, social engineers attempt to exploit your kindness and willingness to…
Information Security is much more than just policies and processes. To keep data safe, we need to make sure we understand how to keep our…
Cyber security is an ever-changing landscape, with new threats constantly emerging. We’ll look at whether we can identify a malicious website and keep our data…
Once you’ve completed our Introduction to Cyber Security module, you will know how to: Identify different telephone scams Define social engineering Understand the importance of updates Recommend…
Think you can spot a SMShing attempt? Well try our simulated game where you received some trustworthy and some malicious text messages – in a…
After successfully passing the MCSS module, learners will gain the ability to: Once you’ve completed our Minimum Cyber Security Standard module, you will know how…
Once you’ve completed our Freedom of Information module, you will know how to: Define and summarise the Freedom of Information Act, and explain its inner…
Learning Objectives: Once you’ve completed our NIS Regulations module, you will know how to: Categorise organisations under “Operators of Essential Services” or “Digital Service Providers”…
Put your knowledge to the test with our mini game. Simply answer 5 questions without getting caught to win 25 points!