Making Sense of Information Security – Online Course

Making Sense Of Information Security
In this series of 5 short tutorials, 'Making Sense Of Information Security', Ciaran delivers a step by step guide on getting to grips with this at times tricky concept. Aimed at office managers, we cover areas such as how to get senior management buy-in, how to undertake a risk assessment, how to approach treatment of those risks, your responsibilities to data subjects under the GDPR, and more.

The course is split into 5 modules with accompanying worksheets that together builds up a comprehensive overview of your information management and information security systems.

If you are seeking certification for your company, or you just want to know how to get started, this course will set you in good stead.

We also offer a comprehensive Security Workshop, covering all the basics such as how to spot scams, the types of fraud scammers perpetuate, and how to increase awareness of security essentials within your organisation.

Get in touch if you want to know more, we would be delighted to talk to you.

Contact – Macnamara ICT

Making Sense of Information Security | Introduction


Making Sense of Information Security | Lesson 1

Lesson 1 Worksheet


Making Sense of Information Security | Lesson 2

Lesson 2 Worksheet


Making Sense of Information Security | Lesson 3

Lesson 3 Worksheet


Making Sense of Information Security | Lesson 4

Lesson 4 Worksheet


Making Sense of Information Security | Lesson 5

Like this article?

Share on Twitter
Share on LinkedIn
Share by Email

Subscribe to our monthly newsletter

Get the best IT tips and Office ideas in your inbox

Further reading

copilot-logo

Enhance Productivity with Microsoft 365 Copilot

AI tools are transforming how people approach their work, but online ‘free’ tools such as ChatGPT are not secure for businesses to use, and you should never enter any confidential or personal information into free online AI Services. This information can be used to train the AI and make it available to other users, and may constitute a data breach.

Read More »
3D rendering. Abstract background concept of cyber security and attack, system crash.

The 7 Most Common Attack Vectors in 2024

With the rapid onset of new technological capabilities, cyberattacks are a very real threat to any modern business. After all, as more businesses implement new technologies into their business, cyber attackers gain more new targets to try their hand at.

Read More »
Scroll to Top