• No products in the basket.

Security Awareness Online Video Course

0( 0 REVIEWS )
Security Awareness Online Video Course


Enhance your security awareness and keep your data safe. The Security Awareness course is something that everyone can benefit from. Data breaches are at an all-time high and it is not as safe to function online. Security is no longer having an IT department that oversees security functions in an enterprise, it is to also help individuals learn to keep things secure.  You may have heard people complaining that data is getting compromised. The truth is that there have been attacks for a while, however, it is on the rise and more and more people need to be informed on how to protect their own data. It is not just about being careful with what you download.

The Security Awareness course will discuss security and privacy with regard to your personal devices, passwords, social engineering, URLs and data leakage. The course will offer insight on not just what to look but why and what works.

The Security Awareness course is also for home users who want to expand their knowledge in security and privacy. The course will teach you how to protect yourself against basic attacks from malicious websites and phishing. The course is internationally recognised and accredited to a training organisation and you will be issued an internationally recognised qualification following full completion of Security Awareness course.

Why consider 1Training?

As improvements and advancements are made in technology, online courses are no longer just conventional means of studying at affordable costs. In many aspects online training offers superiority to traditional learning. There is an effectiveness and convenience that traditional learning cannot provide. The overall convenience and flexibility makes it a superior learning method.

1Training offers the most convenient path to gain an internationally recognised qualification that will give you the opportunity to put into practice your skill and expertise in an enterprise or corporate environment. You can study at your own pace at 1Training and you will be provided with all the necessary material, tutorials, qualified course instructor and multiple free resources which include Free CV writing pack, Nus Discounted Card, Free career support and course demo to make your learning experience enriching and more rewarding.

Learning Outcomes

  • Learn about online security and privacy.
  • Learn about digital mail and how to spot the difference between what is real and what is spam
  • Discover safe methods to browse the web.
  • Learn how to communicate safely online and avoid accidental data leakage.
  • Understand identity theft and data classification.

Course Titles

  • Module 01: Types of Security Threats
  • Module 02: Social Engineering
  • Module 03: Identity Theft
  • Module 04: Data Classification
  • Module 05: Protecting Your Digital Information
  • Module 06: Malware
  • Module 07: Security from End-to-End
  • Module 08: Piracy
  • Module 09: Security Policies
  • Module 10: Moving Forward

Access Duration

The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course.  The course is self-paced and you can complete it in stages, revisiting the lectures at anytime.

Who is this Course aimed at?

  • The course is individuals looking to advance their knowledge on security awareness.
  • Employees who are working in positions related to security awareness.
  • The course is suitable for individuals who want a career related to security awareness.
  • The course is ideal for anyone interested in enhancing their skills and knowledge.
  • Employees in leadership positions

Entry Requirements

  • You must be 16 or over
  • You should have a basic understanding of English and basic IT knowledge
  • You will need a computer or tablet with internet connection (or access to one)

Method of Assessment

At the end of the Security Awareness course you will be required to take a multiple choice question assessment test. The multiple choice question assessment will be automatically marked with learners receiving an instant grade.


Those who successfully complete the exam will be awarded the certificate in Security Awareness.

Awarding Body

The certificate will be awarded by CPD and iAP. This internationally recognised qualification will make your CV standout and encourage employers to see your motivation at expanding your skills and knowledge in the IT enterprise.

Progression and Career Path

Once you successfully complete Security Awareness you will be qualified to work in the following positions. The Security Awareness qualification will also put you in line to demand a higher salary or job promotion. The course is for modern and forward thinking professionals who are entry-mid-level in their careers. The average UK salary per annum according to is given below.

  • Security Architect – £59,290 per annum
  • Information Security Manager – £51,234 per annum
  • Information Security Analyst – £34,906 per annum
  • Digital Marketing Manager – £32,183 per annum

Other Benefits

  • Written and designed by the industry’s finest expert instructors with over 15 years of experience
  • Repeat and rewind all your lectures and enjoy a personalised learning experience
  • Gain access to quality video tutorials
  • Unlimited 12 months access from anywhere, anytime
  • Excellent Tutor Support Service (Monday to Friday)
  • Save time and money on travel
  • Learn at your convenience and leisure
  • Quizzes, tests mock exams, practice exams to ensure you are 100% ready
  • Eligible for a NUS discount card

Key Features

Gain an accredited UK qualification

Access to excellent quality study materials

Learners will be eligible for TOTUM Discount Card

Personalized learning experience

One year’s access to the course

Support by phone, live chat, and email

Course Curriculum Total Units : 103
➤ Course Overview
Course Introduction
1.0 Course Overview
1.1 What is Security Awareness?
1.2 Security Domains
1.3 What is Security?
1.4 Are You at Risk?
1.5 So What about You?
1.6 What are the Goals of this Course?
1.7 What Will We Cover?
1.8 Surprise!
1.9 Is it Too Late?
1.10 Module 00 Review
➤ Module 01 - Types of Security Threats
1.0 Types of Security Threats
1.1 Your Computer
1.2 Your Internet
1.3 Yourself
1.4 Your Words
1.5 Your E-mail
1.6 Your Home
1.7 Your Files
1.8 Module 01 Review
➤ Module 02 - Social Engineering
2.0 Social Engineering
2.1 What is Social Engineering?
2.2 Social Engineering Defense
2.3 Manipulation
2.4 Why does it Work?
2.5 Fooling People
2.6 What Else Can Be Done?
2.7 Personal Precautions
2.8 Module 02 Review
➤ Module 03 - Identity Theft
3.0 Identity Theft
3.1 What is Identity Theft?
3.2 How does it Happen?
3.3 How to Defend Yourself
3.4 What Criminals Do with Your Information
3.5 How Can You Tell if You’re a Victim?
3.6 Actions to Take if You are a Victim
3.7 Contact Information
3.8 Module 03 Review
➤ Module 04 - Data Classification
4.0 Data Classification
4.1 Policies for Data Sharing
4.2 Least Privilege
4.3 How to Classify
4.4 Types of Classifications
4.5 Jurisdictional Issues
4.6 Your Involvement
4.7 What Could Happen?
4.8 What Type of Policies?
4.9 How to Destroy Data
4.10 Module 04 Review
➤ Module 05 - Protecting Your Digital Information
5.0 Protecting Your Digital Information
5.1 Why Do a Backup?
5.2 Types of Backups
5.3 What to Backup
5.4 Where to Store Backups
5.5 How to Perform Backups
5.6 Demo – Backups
5.7 Backup Utilities
5.8 Backup Management Practices
5.9 Passwords
5.10 Demo – Password Management
5.11 Password Management
5.12 AAA
5.13 Module 05 Review
➤ Module 06 – Malware
6.0 Malware
6.1 Basic Definitions
6.2 What to Look For
6.3 How You Can Get Infected
6.4 Software Detection
6.5 Hardware Detection
6.6 Cloud Detection
6.7 Know the Extensions
6.8 Demo – Knowing Your Extensions
6.9 Your Defenses
6.10 Module 06 Review
➤ Module 07 - Security from End-to-End
7.0 Security from End-to-End
7.1 Physical Security
7.2 Home/Workstation Security
7.3 Encryption
7.4 Demo – EFS
7.5 Hand Held Electronics
7.6 Workstation Software
7.7 Updating the OS and Software
7.8 Secure E-mail Use
7.9 E-mail Encryption
7.10 E-mail Hazards
7.11 How to Stop SPAM
7.12 E-mail Attachments
7.13 Other E-mail Warnings
7.14 What if You Get Malware from E-mail?
7.15 How to Avoid SPAM
7.16 Secure Web Browsing
7.17 Demo – Secure Web Browsing
7.18 Secure Instant Messaging / Social Sites
7.19 Module 07 Review
➤ Module 08 – Piracy
8.0 Piracy
8.1 What is Intellectual Property?
8.2 Copyrights
8.3 Software Piracy
8.4 Types of Piracy
8.5 Risks
8.6 Module 08 Review
➤ Module 09 - Security Policies
9.0 Security Policies
9.1 Why is Policies Important?
9.2 Defining an Incident
9.3 Response Teams
9.4 Response Checklist
9.5 Module 09 Review
➤ Module 10 - Moving Forward
10.0 Moving Forward
10.1 Education and Awareness
10.2 Individuals
10.3 Organizations
10.4 Know the Principles of Security Domains
10.5 Module 10 Review
10.6 Course Closure
WhatsApp chat