“… internal costs and time saved by Fisher and Paykel more than satisfied the Return on Investment expectations of the organisation”.
At a glance
5-45 minutes online
Available in Australian, New Zealand, and Region-neutral content format
Structured LearningiDesigned for learners with little prior knowledge, this course type takes the learner through the course subject sequentially – one step at a time., Accelerated LearningiCreated for learners with prior knowledge, this course type allows learners to control how they engage with the full course content. It delivers scenario-based learning with questions embedded in the teachings and a ‘Learn More’ option, giving learners the option of how they consume/engage the information., Accelerated Multi-Device LearningiThis course type is designed for learners with prior knowledge, giving learners more ability to self-direct how they engage with the full course content. Using scenarios with voice-overs, tests within the course, and a ‘Learn More’ option, learners can engage the course on any smartphone, tablet, or PC., and ShortBurst.
About this course
Major cyber-attacks are threatening computer systems, network and data around the world, disrupting operations from Mumbai to Melbourne, London to Los Angeles.
It is critical that all employees who access your organisation’s technology systems should have sufficient training and be able to identify potential security risks and know what action to take in the event of a security breach.
On completing this course, learners should be able to:
- recognise a security breach;
- know who to contact should a breach occur and how to minimise security breaches;
- recognise the required procedures for system accounts and authorisation; and
- guidelines for going about your business.
- What is IT security?
- Standard operating procedures
- How to recognise a security breach
- Malicious code infection
- Policies and Procedures
- Website access
- Electronic mail security
- Contracting a virus
- Chain emails
- Other security requirements
- System accounts
- Electronic mail accounts
- Remote access & data transfer
- Laptops and PDAs
This Safetrac course is built in conjunction with: