Data Protection Baseline

Data protection ensures when we are processing, transferring and storing information that we do so efficiently. We’ll make sure that we understand our own responsibilities.

Social Engineering Baseline

Your organisation has implemented technical controls to prevent cyber criminals from accessing your data. However, social engineers attempt to exploit your kindness and willingness to…

Information Security Baseline

Information Security is much more than just policies and processes. To keep data safe, we need to make sure we understand how to keep our…

Cyber Security Baseline

Cyber security is an ever-changing landscape, with new threats constantly emerging. We’ll look at whether we can identify a malicious website and keep our data…

Introduction to Cyber Security

Once you’ve completed our Introduction to Cyber Security module, you will know how to: Identify different telephone scams Define social engineering Understand the importance of updates Recommend…

Spotting a SMShing Message

Think you can spot a SMShing attempt? Well try our simulated game where you received some trustworthy and some malicious text messages – in a…

Introduction to the MCSS

After successfully passing the MCSS module, learners will gain the ability to:  Once you’ve completed our Minimum Cyber Security Standard module, you will know how…

Introduction to Freedom of Information

Once you’ve completed our Freedom of Information module, you will know how to: Define and summarise the Freedom of Information Act, and explain its inner…

Introduction to the NIS Regulations

Learning Objectives: Once you’ve completed our NIS Regulations module, you will know how to: Categorise organisations under “Operators of Essential Services” or “Digital Service Providers”…