$165.00 inc GST

Cyber Responsibility

Online Compliance Course

Course length:
20-30 Minutes

Region:
Region-neutral content format

Course audience:
All employees, contractors and volunteers

Delivery:
Deploy our courses online via Safetrac’s Compliance LMS or opt for SCORM delivery on your company’s LMS.

Course type:
Accelerated iThis course type is designed for learners with prior knowledge, giving learners more ability to self-direct how they engage with the full course content. Using scenarios with voice-overs, tests within the course, and a ‘Learn More’ option, learners can engage the course on any smartphone, tablet, or PC.

About this course

The Cyber Responsibility course is meticulously designed to offer comprehensive guidance on the proper, secure, and lawful handling of your organisation’s information assets. 

This course provides detailed instructions on the responsibilities employees must uphold when accessing these assets, whether using mobile devices or working remotely from locations outside the organisation’s premises.

This training ensures that all personnel are well-informed on how to manage and protect sensitive information effectively, thereby safeguarding the organisation against potential cyber threats and maintaining compliance with relevant legal standards.

Preview Course

Enquire about this online course

We can provide trial access to preview this course.  Enquire today about training your organisation with Safetrac.

Or submit the form below

Learning outcomes

On completing this course, learners should be able to understand:

  • the appropriate, secure, safe and legal way to use their organisation’s information assets; and
  • their responsibilities when working remotely.

Course contents

  • Information Assets
  • Electronic Communications
  • Secure Data Transfer
  • Cyber Security
  • Social engineering
  • Confidentiality of Information
  • Copyright and Licensing
  • Device Protection
  • Wireless and Internet Protection Access
  • User Responsibilities
  • Cloud Services
  • Physical Security
  • International Use
  • Personally Owned Devices
  • Policy Breaches