Information Security Training Course

Empowering your staff to protect data, minimize risk, and seamlessly integrate best practices into their daily responsibilities

Information Security Course Description

Information Security Awareness training is designed to provide all employees who have access to your organization’s computer systems and networks with the awareness and motivation to protect and reduce the risk associated with managing sensitive information.

  • Target Audience: All faculty/staff
  • Course Length: 8-12 minutes/module; total: 250 minutes

InfoSec Awareness Course Learning Objectives

CampusGuard’s information security awareness course provides training on a variety of topics, including email security, social engineering, phishing, data classification, remote work, password security, and more.

With flexible micro-modules, organizations can select modules to deploy to staff throughout the year, keeping cybersecurity top of mind.

Real-world scenarios and case studies are utilized to reinforce best practices and provide relevant guidance that staff can implement in both their professional and personal roles.

InfoSec Course

Information Security Awareness Course Modules

Our Information Security course is designed with micro-learning modules, making the content easier to retain. You can choose to launch the training all at once or roll it out throughout the year to fit your team’s schedule.

  • An Introduction

    This module will discuss what information security is and why it is important to everyone. Training is designed to provide all employees who have access to your organization’s computer systems and networks with the awareness and motivation to protect and reduce the risk associated with managing sensitive information.
  • Data Classification

    This module will discuss the classification of sensitive data types and various security and compliance requirements that organizations are responsible for adhering to.
  • Social Engineering

    Statistics continue to indicate that a lack of awareness among employees is the biggest risk facing information security today. This module will review common social engineering attacks so users can more easily identify and protect their organization against potential attacks. Phishing is a major focus of the training, with an included sample email with warning indicators highlighted.
  • Email Security

    This module discusses email best practices along with prevention strategies for identifying and avoiding potential risks including spam messages, malicious attachments, and email hoaxes.
  • Password Management

    This module teaches staff how to create and select strong passwords to help prevent unauthorized access to systems and information.
  • Remote Work Environments

    This module primarily focuses on remote work environments and understanding the risks and best practices for keeping data and devices secure when operating outside of the corporate environment.
  • Incident Management

    Incident management describes the activities of the organization to identify, analyze, and remediate a potential incident or compromise. This module teaches staff about the importance of identifying and reporting suspicious incidents.
  • Internal Controls

    Internal controls include all of the policies and procedures an organization uses to safeguard assets, ensure reliability and integrity of information, ensure compliance, promote efficient and effective operations, and accomplish operational goals and objectives. This module will review why just having policies in place for acceptable usage, least privilege, etc., is not sufficient alone, and why it is important that all users adhere to them.
  • Security Components

    Technical solutions to address security continue to evolve, and new products and versions are being released daily. This module discusses common components used to secure devices and networks, including firewalls, intrusion detection systems, vulnerability scanning, anti-virus software, encryption, and multi-factor authentication.
  • Physical Security

    If physical access to sensitive information and/or systems is not restricted, unauthorized individuals could easily get their hands on this sensitive data. This module provides best practices for physically securing your environment, and basic steps for information storage and disposal are covered in this module.
  • Cyber Crime

    This module reviews some of the most common risks and threats to information systems, like malware, viruses, advanced persistent threats, bots, ransomware, crypto-jacking, and more.
  • Internet Usage

    This module reviews the importance of using common sense and following information security best practices when accessing the Internet.
  • Security at Home

    It is important for employees to understand the importance of protecting their home network and ensuring the right tools are in place before accessing organizational resources. This module also reviews best practices for connecting to networks, installing applications, social networking, and more.
  • Data Breaches and Compromises

    With data breaches continuing to increase, it is critical that organizations understand where the desirable data lives, what the risks are, and limit the risks as much as possible. This module will review some of the weaknesses identified in recent breaches and the average cost of a data breach.
  • Third-Party Risks

    While outsourcing services is chosen for a number of reasons, including increased efficiency, decreased cost, or a lack of internal resources, it doesn’t come without risk. This module reviews why it is critical to properly evaluate third-party vendors, understand responsibilities, and implement a program to monitor their compliance on an ongoing basis.
  • Travel Security

    Traveling can pose a significant risk to information stored on or accessible through laptops, tablets, and smartphones. This module reviews steps to protect employee devices and sensitive information before and during potencial business travel.
  • Artificial Intelligence (AI) Security

    AI, or Artificial Intelligence, if used appropriately, can be a valuable business tool. Applications can be used to automate tasks, analyze data, generate reports, and even detect fraud. However, before any AI applications are implemented for organizational use, it is important to understand any associated security risks. This module provides users with an understanding of AI and its usage and discusses requirements to ensure AI is used in a way that aligns with industry best practices, privacy and consumer protection regulations, and organizational policies and procedures.
  • Help Desk Security

    Help desks have become a common point of entry for hackers attempting to gain access to organizational systems and/or data. This module provides users with an understanding of social engineering risks targeted at help desk staff, necessary processes for verification of callers, incident reporting and response, how to monitor help desk calls, and best practices for new system updates and/or applications.
  • Managing AI Risks

    As the usage of Artificial Intelligence tools increases, cybercriminals are taking advantage of available tools and exploiting the technology to create sophisticated cyberattacks. This module explores some of the more prevalent AI-powered cybersecurity threats and shares guidance on how to detect potential risks and protect your organization.
  • Identity Theft

    Identity theft is a crime that involves the use of a victim’s personally identifiable information for fraudulent activities or financial gain. This module reviews common identity theft tactics, as well as best practices for identifying and preventing fraud.
  • Insider Threats

    Internal attacks by disgruntled, temporary, or ex-employees pose a risk due to their access to and knowledge of an organization’s sensitive information. This module provides best practices for identifying, detecting, and preventing insider threats.
  • Cryptocurrency Scams

    Cryptocurrency is a type of digital currency that generally exists only electronically or online. This module provides end users with a basic understanding of the cryptocurrency ecosystem, common risks and vulnerabilities, and tools for securing their digital assets.
  • Database and System Administrator

    Database and System Administrator training ensures administrators are aware of the major cybersecurity risks to critical systems and data, and of best practices to ensure the integrity, security, and availability of those systems. This module builds on the overall security awareness curriculum, provides administrators with basic security requirements, and outlines responsibilities for protecting systems that store, process, and transmit organizational data.
  • Web and Application Developer

    Application Developer training is intended to ensure developers are aware of the basics of application security, including the vocabulary, the business requirements for application security, common application security pitfalls, and the existence of secure design and development techniques. This training leverages the Open Web Application Security Project (OWASP) Top Ten list to ensure developers are aware of common application security risks.

online training iconExplore our other courses

Explore our full course library to find training that fits your needs, from security awareness and compliance essentials to specialized topics designed to support your role and responsibilities. Whether you’re looking to strengthen your cybersecurity posture, stay up to date with industry regulations, or broaden your knowledge, we’ve got you covered.

The Latest InfoSec Awareness Course Updates

Along with the annual updates due to changing regulatory requirements, evolving risks, and real-world scenarios and statistics, this year’s update also includes six additional micro-modules:
  • Managing AI Risks
  • Identity Theft
  • Insider Threats
  • Cryptocurrency Risks
  • Database/System Administrator
  • Web/Application Development
Request a Demo

Access Our Resource Library and Threat Intel News

All InfoSec Awareness Course users also have access to our Resource Library, which offers supplemental materials that support the course content.

Our Threat Intel Briefing newsletter is sent directly to your inbox twice a month, and features the latest cyber threats, cyber crimes, and vulnerabilities happening now around the globe.

Information Security Awareness Articles

Creating a Workforce that Protects Data & Reduces Risk

CampusGuard’s InfoSec Awareness course guides your staff in how to securely access resources, safeguard data, and report suspicious activity to keep your organization safe.

Request a Demo

InfoSec Awareness Frequently Asked Questions

Cyberattacks are increasing across all industries, and employees are the first line of defense. Training helps you recognize risks like phishing, social engineering, and data breaches.

Most organizations require training annually, though some may require refresher modules throughout the year.

All employees, contractors, and sometimes third-party vendors with access to company systems or data must complete it.

Yes. Security awareness training is often mandated by laws and regulations such as PCI DSS, GLBA, HIPAA, FERPA, and GDPR.

By reducing human error, one of the leading causes of data breaches, training helps safeguard sensitive data, maintain compliance, and prevent costly cyber incidents.

Yes. Topics like clean desk policy, locking your computer, and preventing tailgating are included to protect both digital and physical assets.