Cyber Awareness eLearning

Educating your team on cyber risks in their everyday lives, at home or at work, will not only protect their personal data but also the assets of your business.

You’d be forgiven for thinking cybersecurity is formidable territory that only programmers or IT whizzes can comprehend. That’s simply not the case. Terms such as Bootkit, DDOS, Phishing, Ransomware & Trojans sound complicated but when presented through clear, concise & captivating animations, learners will quickly understand the jargon and what role they play in preventing a cyber-attack.

Our Knowledge Centre, which is continuously reviewed and updated, currently consists of 16 essential cyber security lessons such as GDPR, Phishing, Ransomware & Password Security.

Talk to our team

The General Data Protection Regulation (GDPR) is replacing the current EU Data Protection Directive 95/46/EC and will come into effect on 25 May 2018.

Organisations and businesses are required to be fully transparent about how they are using and safeguarding personal data, and be able to demonstrate accountability for their data processing activities.

While the buck stops with Directors and business owners, it is crucial that employees at all levels understand their responsibilities in GDPR and training is the key to a successful implementation.

Our GDPR course is delivered via short animations which evoke the learner's interest and helps digest and retain vital information.

Learning Objectives

This course is aimed at employees at any level and highlights the key changes and effects that the GDPR will have on their day to day roles. Upon completion of this lesson, you will be able to:

  • Provide an understanding of the aim of the regulation.
  • Describe who GDPR applies to.
  • Explain key terminology – Data Subject, Data Controller and Data Processor.
  • Understand your rights as a Data Subject
  • Understand your responsibilities as a Data Controller or Processor.
  • Discuss breach notifications, penalties and fines.
  • Identify the first steps on how to be compliant.

Talk to our team

It's currently estimated that half of all emails are spam and in 2016, 1 in 131 emails contained Malware.* 

For many businesses, this reinforces the realisation that spam is more than just a nuisance, it is a direct threat to their organisation.

Phishing scams prey on our good nature and criminals are becoming increasingly more sophisticated in their attacks. Some perpetrators are known to contact an employee posing as a colleague or boss asking for confidential information. Without vigilance and the skills to identify these scams, the result could be immeasurable damage to your reputation and substantial monetary losses.

This lesson will take you through the various types of phishing scams and educate you on what to look out for.

Source: * Symantec

Learning Objectives

By the end of this lesson, you will be able to:

  • Define phishing.
  • Recognise the personal risks and impact to your company.
  • List types of email and phishing attacks..
  • Identify popular types of phishing i.e spear phishing, whaling.
  • Demonstrate best practice to avoid phishing scams.

Talk to our team

Every employee has a role to play in workplace security. Where do you store passwords? How do you back up your data? What should you do if you find an unfamiliar person in a restricted area?

This lesson is designed to make you think about the physical security of your devices and assets and will provide tips and best practices for staying secure at home, in the workplace and while travelling.

Learning Objectives

  • Understand the role people have to play in physical security.
  • Define terms such as tailgating, pre-texting & dumpster diving.
  • Understand best practice for workplace, home & device security.
  • Recognise the types of preventative measures one can take to keep their data secure.
  • Understand the importance of data back up.

In 2012, a major social network suffered a security breach where hackers stole 6.5 million encrypted passwords and posted them on a Russian hacker forum. Most people will have changed their password immediately, however not realising that if they were using that same password elsewhere, they are actually exposed in all of those places as well.

The goal of this lesson is to teach you about passwords, and the rules that can be applied to creating a secure password or adopting a strong password policy in your organisation.

Learning Objectives

By the end of this lesson you will be able to:

  • Understand password policies.
  • Identify the characteristics of strong passwords.
  • Apply the characteristics of strong passwords to your files.
  • Understand the types of attacks and preventative measures.

Talk to our team

Malware (Malicious Software) is distributed by cybercriminals with the intent of stealing, corrupting or destroying data on your devices and networks.

As many as seven out of ten* newly programmed malware programs targeted the Microsoft platform. Although Windows remains the most widely attacked operating system, Apple devices are coming more and more under fire with the quantity of malware for macOS tripling since 2015. Android devices are also becoming increasingly attacked.

The aim of this lesson is to teach you about the dangers of Malware and how it can enter a device or network. This lesson will also inform you how to spot Malware and the appropriate response, should a device or network become infected.

* Source: AV-Test

Learning Objectives

By the end of this course, you will be able to:

  • Define Malware.
  • Discuss the most common types of malware such as trojans, worms, botnets and keyloggers.
  • Determine steps to prevent Malware infection.

The US Department of Justice in 2017 released statistics stating that "more than 4,000 ransomware attacks have occurred daily since January 1, 2016", which was a 300% increase from 2015.*

Ransomware targets home users, businesses, and government networks and can lead to temporary or permanent loss of sensitive or proprietary information, disruption to regular operations, financial losses incurred to restore systems and files, and potential harm to an organization’s reputation.*

*Source US Dept. Of Justice "How to protect your network from Ransomware"

Learning Objectives

On completion of this lesson you will be able to:

  • Define what Malware is
  • Define common terms such as Ransomware, Bitcoin, Fusob, WannaCryptor and WannaCry
  • Identify steps to prevent a malware attack.

Talk to our team

Cyber risks for Executives appear in many forms. They can be breaches of confidentiality, theft, destruction or sale of sensitive data.

Cyber Liability is an ever increasing topic around the board room in 2017. With organisational data breaches becoming a regular feature in international media, the direct and indirect result of weak cyber security measures is no longer an IT issue, but a board room one.

The goal of this lesson is to make executive level employees aware of potential cyber security threats and how to avoid increased risk of attack.

Learning Objectives

By the end of this lesson you should be able to:

  • Identify what potential cyber threats exist
  • Recognise who the potential actors are
  • Demonstrate how to prepare for physical security threats
  • Demonstrate how to protect your devices from threats
  • Prepare for cyber security threats
  • Identify potential phishing & social engineering scams
  • Practice safe internet browsing
  • Perform data back-ups & encryption

According to a study by McAfee in 2015, "Internal actors were responsible for 43% of data loss, half of which is intentional, half accidental."

Internal actors include employees, contractors, and third-party suppliers, with a 60/40 split between employee/contractors and suppliers.

The research identified that the most commonly used method of extracting data was through the use of USB drives and laptops, with MS Office documents the most stolen (25%).

The goal of this lesson is to teach you the meaning and potential dangers of Insider Threats & the potential damage they can cause to your organisation.

*Source Grand Theft Data, McAfee, 2015


Learning Objectives

At the end of this course, learners should be able to:

  • List the types of insider threat
  • Identify who is likely to be an insider threat
  • Recognise steps to prevent yourself being targeted by malicious insiders
  • Demonstrate how to avoid becoming an accidental insider threat
  • Identify ways in which your employer can deal with insider threats

The forensic team at Deloitte Ireland recently scanned a number of lost or stolen devices (all with security features such as pass codes or encryption) and found that sensitive personal data such as the identity of the owner and PPS numbers could still be retrieved. In the cases where a device had undergone a complete factory wipe (a process many believe to result in all data being destroyed), the forensic team managed to recover contacts in 60% of cases, text/chat logs content in 85% of cases, and identified the owners’ email address in 60% of cases.

In today's business world, blocking mobile network access completely would be a more secure approach however this is not conducive to the mobile office which is why we need to educate ourselves in how to prevent and control these types of threats.

Learning Objectives

By the end of this lesson, you will be able to:

  • Demonstrate how to properly secure your mobile devices.
  • Describe how to minimise impact in the event of loss, theft or compromise of the device.
  • Recognise device security features.
  • Explain Location Services.
  • Understand information on App Stores.
  • Identify Types of Connectivity.
  • Practice updating Operating Systems & Apps.

Social engineering is the art of manipulating people in order to gain confidential information.

As we become more educated about our online security, cybercriminals have become smarter in their approach and will often use social media as a reconnaissance tool to socially engineer their targets. Social networks are a place where people let their guard down. You might publicly tweet that you're at a leadership conference and an attacker may use this opportunity to target you with a phishing email containing a malicious link.

Social engineering isn't limited to technology either. Attackers might use traditional methods of manipulation such as telephone calls claiming to be a friend of your boss or a charity checking up on a donation made.

The goal of this lesson is to make you aware of how criminals will target our human nature as well as our technology.

Learning Objectives

By the end of this lesson you will be able to:

  • Discuss what Social Engineering is.
  • Describe its many forms.
  • Identify the type of attacks that can take place.
  • Demonstrate how to counter Social Engineering.

Almost one third of employers in the UK say they have experienced a data breach as a direct result of mobile working. While comparable Irish data can be hard to come by, employers should remain vigilant when allowing employees access sensitive company data remotely.

This lesson covers basic tips and knowledge on how to secure your devices when working remotely, either when travelling, commuting or at home.

*Source: Vanson Bourne

Learning Objectives

By the end of this lesson you should be able to:

  • Describe the different methods by which you can connect to your workplace safely and securely.
  • Identify potential threats when commuting or working remotely in a public area.
  • Demonstrate best practice when accessing company data outside of the main office. 

In 2016 the most commonly searched recipe in Ireland was Spaghetti Bolognese. The biggest news moment was Brexit and the most asked question was 'What is Pokemon Go?'. Nowadays we browse the internet to answer questions, publish on social networks, read news articles and perform banking transactions. It simplifies our day to day but just how aware are you of the dangers after each click?

A study by Kapersky* found that a child watching videos on YouTube is an average of three clicks away from inappropriate or adult content. However, despite exposure to these threats, safe surfing is possible. By educating yourself and becoming aware of the risks that exist, you can stay safe browsing the web.

*Source Kapersky


Learning Objectives

By the end of this lesson, you will be able to:

  • Define terms such as HTTPS, Digital Certificates and Cookies.
  • Discuss how to practice private browsing and access browser history.
  • Discuss the dangers of internet browsing.
  • Recognise potentially dangerous content such as pop ups and browser hijacking.
  • Demonstrate good practice while browsing the web.

In August 2017, Ipsos MRBI* calculated that 64% of Irish people have a Facebook account, while 28% are on Twitter. One of the major attractions of social media is the ease with which people can share their personal information with their friends. Social media is also an attractive platform for cybercriminals as it is free, easy to access and offers a global reach for reconnaissance, malware and phishing deployment, while providing anonymity for the criminal.

The goal of this lesson is to educate you on the dangers of social media and how your accounts can be used to aid cybercriminals in planning attacks against you, your colleagues or organisation.

*Source Ipsos MRBI


Learning Objectives

By the end of this lesson, you will be able to:

  • Discuss the types of social media privacy settings available.
  • Demonstrate how to limit access to your information.
  • Identify terms such as Honey Traps, Grooming, Trolling and Data Mining.
  • Practice safe, controlled information sharing on personal social media accounts.
  • Identify some of the dangers you may face on social media platforms.

In 2017, Norton by Symantec conducted research into the consumers beliefs and perceptions of Wi-Fi security and their usage.The respondents were a 50/50 split gender balance and the majority were millennials and boomers (36% and 32% respectively) from over 15 different countries.

  • 53% couldn't tell the difference between a secure or unsecure public Wi-Fi network
  • 8% were willing to share personal details to receive a strong free Wi-Fi signal
  • 1 in 3 would be willing to watch a 3 minute ad to receive free Wi-Fi on their device

The goal of this lesson is to teach you about Wi-Fi security and what measures you should take to ensure your Wi-Fi network is secure both at home and in the work place.

Learning Objectives

By the end of this lesson you will be able to:

  • Identify what routers are
  • Have a deeper understanding of Wi-Fi Security
  • Demonstrate ways to connect to the internet securely
  • Recall common types of attacks that cybercriminals may attempt on your Wi-Fi Network

Payment Card Industry Data Security Standard (PCI DSS) follows common-sense steps that mirror security best practices.

The PCI DSS globally applies to all entities that store, process or transmit cardholder data and/or sensitive authentication data.

PCI DSS and related security standards are administered by the PCI Security Standards Council, which was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide & Visa Inc.

Learning Objectives

By the end of this lesson, you will be able to:

  • State the risks associated with a data breach and why DSS matters
  • Describe the PCI DSS process
  • Identify security controls and process requirements
  • Understand data protection and breach prevention
  • Demonstrate how to improve compliance

The goal of this lesson is to introduce to you the complicated encryption processes using a straightforward, digestible approach.

Encryption is applied to data through complex mathematical formulas, in order to convert this data into a format that is unreadable to anyone without the correct decryption information or authorisation.

Learning Objectives

By the end of this lesson, you will be able to:

  • Identify the Principles of Cryptography
  • Distinguish between the various methods and concepts of encryption
  • Identify applications to assist with simplifying the process of encryption

You’d be forgiven for thinking cybersecurity is formidable territory that only programmers or IT whizzes can comprehend. That’s simply not the case. Terms such as Bootkit, DDOS, Phishing, Ransomware & Trojans sound complicated but when presented through clear, concise & captivating animations, learners will quickly understand the jargon and what role they play in preventing a cyber-attack.

Our Knowledge Centre, which is continuously reviewed and updated, currently consists of 16 essential cyber security lessons such as GDPR, Phishing, Ransomware & Password Security.

Talk to our team

The General Data Protection Regulation (GDPR) is replacing the current EU Data Protection Directive 95/46/EC and will come into effect on 25 May 2018.

Organisations and businesses are required to be fully transparent about how they are using and safeguarding personal data, and be able to demonstrate accountability for their data processing activities.

While the buck stops with Directors and business owners, it is crucial that employees at all levels understand their responsibilities in GDPR and training is the key to a successful implementation.

Our GDPR course is delivered via short animations which evoke the learner's interest and helps digest and retain vital information.

Learning Objectives

This course is aimed at employees at any level and highlights the key changes and effects that the GDPR will have on their day to day roles. Upon completion of this lesson, you will be able to:

  • Provide an understanding of the aim of the regulation.
  • Describe who GDPR applies to.
  • Explain key terminology – Data Subject, Data Controller and Data Processor.
  • Understand your rights as a Data Subject
  • Understand your responsibilities as a Data Controller or Processor.
  • Discuss breach notifications, penalties and fines.
  • Identify the first steps on how to be compliant.

Talk to our team

It's currently estimated that half of all emails are spam and in 2016, 1 in 131 emails contained Malware.* 

For many businesses, this reinforces the realisation that spam is more than just a nuisance, it is a direct threat to their organisation.

Phishing scams prey on our good nature and criminals are becoming increasingly more sophisticated in their attacks. Some perpetrators are known to contact an employee posing as a colleague or boss asking for confidential information. Without vigilance and the skills to identify these scams, the result could be immeasurable damage to your reputation and substantial monetary losses.

This lesson will take you through the various types of phishing scams and educate you on what to look out for.

Source: * Symantec

Learning Objectives

By the end of this lesson, you will be able to:

  • Define phishing.
  • Recognise the personal risks and impact to your company.
  • List types of email and phishing attacks..
  • Identify popular types of phishing i.e spear phishing, whaling.
  • Demonstrate best practice to avoid phishing scams.

Talk to our team

Every employee has a role to play in workplace security. Where do you store passwords? How do you back up your data? What should you do if you find an unfamiliar person in a restricted area?

This lesson is designed to make you think about the physical security of your devices and assets and will provide tips and best practices for staying secure at home, in the workplace and while travelling.

Learning Objectives

  • Understand the role people have to play in physical security.
  • Define terms such as tailgating, pre-texting & dumpster diving.
  • Understand best practice for workplace, home & device security.
  • Recognise the types of preventative measures one can take to keep their data secure.
  • Understand the importance of data back up.

In 2012, a major social network suffered a security breach where hackers stole 6.5 million encrypted passwords and posted them on a Russian hacker forum. Most people will have changed their password immediately, however not realising that if they were using that same password elsewhere, they are actually exposed in all of those places as well.

The goal of this lesson is to teach you about passwords, and the rules that can be applied to creating a secure password or adopting a strong password policy in your organisation.

Learning Objectives

By the end of this lesson you will be able to:

  • Understand password policies.
  • Identify the characteristics of strong passwords.
  • Apply the characteristics of strong passwords to your files.
  • Understand the types of attacks and preventative measures.

Talk to our team

Malware (Malicious Software) is distributed by cybercriminals with the intent of stealing, corrupting or destroying data on your devices and networks.

As many as seven out of ten* newly programmed malware programs targeted the Microsoft platform. Although Windows remains the most widely attacked operating system, Apple devices are coming more and more under fire with the quantity of malware for macOS tripling since 2015. Android devices are also becoming increasingly attacked.

The aim of this lesson is to teach you about the dangers of Malware and how it can enter a device or network. This lesson will also inform you how to spot Malware and the appropriate response, should a device or network become infected.

* Source: AV-Test

Learning Objectives

By the end of this course, you will be able to:

  • Define Malware.
  • Discuss the most common types of malware such as trojans, worms, botnets and keyloggers.
  • Determine steps to prevent Malware infection.

The US Department of Justice in 2017 released statistics stating that "more than 4,000 ransomware attacks have occurred daily since January 1, 2016", which was a 300% increase from 2015.*

Ransomware targets home users, businesses, and government networks and can lead to temporary or permanent loss of sensitive or proprietary information, disruption to regular operations, financial losses incurred to restore systems and files, and potential harm to an organization’s reputation.*

*Source US Dept. Of Justice "How to protect your network from Ransomware"

Learning Objectives

On completion of this lesson you will be able to:

  • Define what Malware is
  • Define common terms such as Ransomware, Bitcoin, Fusob, WannaCryptor and WannaCry
  • Identify steps to prevent a malware attack.

Talk to our team

Cyber risks for Executives appear in many forms. They can be breaches of confidentiality, theft, destruction or sale of sensitive data.

Cyber Liability is an ever increasing topic around the board room in 2017. With organisational data breaches becoming a regular feature in international media, the direct and indirect result of weak cyber security measures is no longer an IT issue, but a board room one.

The goal of this lesson is to make executive level employees aware of potential cyber security threats and how to avoid increased risk of attack.

Learning Objectives

By the end of this lesson you should be able to:

  • Identify what potential cyber threats exist
  • Recognise who the potential actors are
  • Demonstrate how to prepare for physical security threats
  • Demonstrate how to protect your devices from threats
  • Prepare for cyber security threats
  • Identify potential phishing & social engineering scams
  • Practice safe internet browsing
  • Perform data back-ups & encryption

According to a study by McAfee in 2015, "Internal actors were responsible for 43% of data loss, half of which is intentional, half accidental."

Internal actors include employees, contractors, and third-party suppliers, with a 60/40 split between employee/contractors and suppliers.

The research identified that the most commonly used method of extracting data was through the use of USB drives and laptops, with MS Office documents the most stolen (25%).

The goal of this lesson is to teach you the meaning and potential dangers of Insider Threats & the potential damage they can cause to your organisation.

*Source Grand Theft Data, McAfee, 2015


Learning Objectives

At the end of this course, learners should be able to:

  • List the types of insider threat
  • Identify who is likely to be an insider threat
  • Recognise steps to prevent yourself being targeted by malicious insiders
  • Demonstrate how to avoid becoming an accidental insider threat
  • Identify ways in which your employer can deal with insider threats

The forensic team at Deloitte Ireland recently scanned a number of lost or stolen devices (all with security features such as pass codes or encryption) and found that sensitive personal data such as the identity of the owner and PPS numbers could still be retrieved. In the cases where a device had undergone a complete factory wipe (a process many believe to result in all data being destroyed), the forensic team managed to recover contacts in 60% of cases, text/chat logs content in 85% of cases, and identified the owners’ email address in 60% of cases.

In today's business world, blocking mobile network access completely would be a more secure approach however this is not conducive to the mobile office which is why we need to educate ourselves in how to prevent and control these types of threats.

Learning Objectives

By the end of this lesson, you will be able to:

  • Demonstrate how to properly secure your mobile devices.
  • Describe how to minimise impact in the event of loss, theft or compromise of the device.
  • Recognise device security features.
  • Explain Location Services.
  • Understand information on App Stores.
  • Identify Types of Connectivity.
  • Practice updating Operating Systems & Apps.

Social engineering is the art of manipulating people in order to gain confidential information.

As we become more educated about our online security, cybercriminals have become smarter in their approach and will often use social media as a reconnaissance tool to socially engineer their targets. Social networks are a place where people let their guard down. You might publicly tweet that you're at a leadership conference and an attacker may use this opportunity to target you with a phishing email containing a malicious link.

Social engineering isn't limited to technology either. Attackers might use traditional methods of manipulation such as telephone calls claiming to be a friend of your boss or a charity checking up on a donation made.

The goal of this lesson is to make you aware of how criminals will target our human nature as well as our technology.

Learning Objectives

By the end of this lesson you will be able to:

  • Discuss what Social Engineering is.
  • Describe its many forms.
  • Identify the type of attacks that can take place.
  • Demonstrate how to counter Social Engineering.

Almost one third of employers in the UK say they have experienced a data breach as a direct result of mobile working. While comparable Irish data can be hard to come by, employers should remain vigilant when allowing employees access sensitive company data remotely.

This lesson covers basic tips and knowledge on how to secure your devices when working remotely, either when travelling, commuting or at home.

*Source: Vanson Bourne

Learning Objectives

By the end of this lesson you should be able to:

  • Describe the different methods by which you can connect to your workplace safely and securely.
  • Identify potential threats when commuting or working remotely in a public area.
  • Demonstrate best practice when accessing company data outside of the main office. 

In 2016 the most commonly searched recipe in Ireland was Spaghetti Bolognese. The biggest news moment was Brexit and the most asked question was 'What is Pokemon Go?'. Nowadays we browse the internet to answer questions, publish on social networks, read news articles and perform banking transactions. It simplifies our day to day but just how aware are you of the dangers after each click?

A study by Kapersky* found that a child watching videos on YouTube is an average of three clicks away from inappropriate or adult content. However, despite exposure to these threats, safe surfing is possible. By educating yourself and becoming aware of the risks that exist, you can stay safe browsing the web.

*Source Kapersky


Learning Objectives

By the end of this lesson, you will be able to:

  • Define terms such as HTTPS, Digital Certificates and Cookies.
  • Discuss how to practice private browsing and access browser history.
  • Discuss the dangers of internet browsing.
  • Recognise potentially dangerous content such as pop ups and browser hijacking.
  • Demonstrate good practice while browsing the web.

In August 2017, Ipsos MRBI* calculated that 64% of Irish people have a Facebook account, while 28% are on Twitter. One of the major attractions of social media is the ease with which people can share their personal information with their friends. Social media is also an attractive platform for cybercriminals as it is free, easy to access and offers a global reach for reconnaissance, malware and phishing deployment, while providing anonymity for the criminal.

The goal of this lesson is to educate you on the dangers of social media and how your accounts can be used to aid cybercriminals in planning attacks against you, your colleagues or organisation.

*Source Ipsos MRBI


Learning Objectives

By the end of this lesson, you will be able to:

  • Discuss the types of social media privacy settings available.
  • Demonstrate how to limit access to your information.
  • Identify terms such as Honey Traps, Grooming, Trolling and Data Mining.
  • Practice safe, controlled information sharing on personal social media accounts.
  • Identify some of the dangers you may face on social media platforms.

In 2017, Norton by Symantec conducted research into the consumers beliefs and perceptions of Wi-Fi security and their usage.The respondents were a 50/50 split gender balance and the majority were millennials and boomers (36% and 32% respectively) from over 15 different countries.

  • 53% couldn't tell the difference between a secure or unsecure public Wi-Fi network
  • 8% were willing to share personal details to receive a strong free Wi-Fi signal
  • 1 in 3 would be willing to watch a 3 minute ad to receive free Wi-Fi on their device

The goal of this lesson is to teach you about Wi-Fi security and what measures you should take to ensure your Wi-Fi network is secure both at home and in the work place.

Learning Objectives

By the end of this lesson you will be able to:

  • Identify what routers are
  • Have a deeper understanding of Wi-Fi Security
  • Demonstrate ways to connect to the internet securely
  • Recall common types of attacks that cybercriminals may attempt on your Wi-Fi Network

Payment Card Industry Data Security Standard (PCI DSS) follows common-sense steps that mirror security best practices.

The PCI DSS globally applies to all entities that store, process or transmit cardholder data and/or sensitive authentication data.

PCI DSS and related security standards are administered by the PCI Security Standards Council, which was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide & Visa Inc.

Learning Objectives

By the end of this lesson, you will be able to:

  • State the risks associated with a data breach and why DSS matters
  • Describe the PCI DSS process
  • Identify security controls and process requirements
  • Understand data protection and breach prevention
  • Demonstrate how to improve compliance

The goal of this lesson is to introduce to you the complicated encryption processes using a straightforward, digestible approach.

Encryption is applied to data through complex mathematical formulas, in order to convert this data into a format that is unreadable to anyone without the correct decryption information or authorisation.

Learning Objectives

By the end of this lesson, you will be able to:

  • Identify the Principles of Cryptography
  • Distinguish between the various methods and concepts of encryption
  • Identify applications to assist with simplifying the process of encryption

Course Contributors

Brian O'D

Brian's extensive global travel and expertise in L&D ensures clients receive high calibre, cutting edge content. Lesson plans are meticulously structured to maximise user engagement and retention.

Clive

Clive is a highly qualified and experienced professional with over 17 years proven success in the field of Occupational Health & Safety, providing Illuminate with insights, developments and expertise in the importance of Health & Safety.

Brian

Offering extraordinary insights into Cyber Forensics, which is ever present in our everyday lives, Brian's educational achievements and experience is invaluable.

Talk to one of our team

Please leave us some details and we will be in touch as soon as possible.

Key Advantages

Speed of Deployment

Our fully web-based platform can be configured and deployed in minutes thus avoiding expensive IT deployment costs.

Tailored Solution

Our platform is highly customisable. You choose the components you need and you can also add your own content.

On Demand Access

Our learning solutions are fully mobile optimised providing an engaging user experience that your teams will love.

Learn from Experts

Our training solutions are developed by experts who have worked in the areas of cyber security and operational security for over 20 years.

Low Cost

You can enjoy cost savings without compromising on quality. Our subject matter expertise ensures your staff have the most up to date information at their finger tips.

Certification & Audit

All of our programmes offer full tracking of employee participation with content comprehension achieved through programme assessments.

Testimonials

Kirsten, I absolutely LOVE the videos!! Honestly, they're above and beyond any of our expectations and we're just so thrilled to now be able to share who we are and what we do!! Can you please thank Siobhan, Gemma and EVERYONE on your team who put so much attention, time and care into these videos.. I really do mean it was such a pleasure working with you all.. sad it's over, but as I said before, I've no doubt we will be working together again in the future!

Louise O’Conor

Abodoo

After seeing the quality of Illuminate’s portfolio and the highly competitive pricing, we were happy to move forward and have the videos made for the CMIT site. Kirsten and the Illuminate team were extremely helpful and flexible in doing whatever was required to fulfil our every need. The videos turned out great and we are delighted with them. We would be happy to work with Illuminate on future projects and highly recommend them to anyone looking to get promotional or instructional videos made. Special thanks to Kirsten for her excellent communication throughout the project!

Jack O’Connor

CMIT

The online video training fit well within our organization, allowing individuals to complete the course at a time that suited them. Our onsite trainer was very well suited to the role and engaged everyone in the practical demonstration. The training helped us identify some additional needs within our organization and become more familiar with the processes that need to be in place should a fire break out. Highly Recommended.

Andrew Rynhart

Tramex Ltd.

The dedicated team were professional in their approach to challenges we faced and paid attention to our specific needs and tailor made the response. Their team treated our concerns with the utmost professionalism and delivered a customised solution that was the best fit for our business needs. We would highly recommend their service.

Barbara O’Connell

Acquired Brain Injury Ireland

We rolled out Illuminate among our staff due to our concerns around IT and Cyber crime. The team in Illuminate were fantastic to deal with and delivered a 100% customer focused service. We found engagement amongst our staff to be tremendous as the content was animated and this brought a level of fun to the program.

Gemma Davis

Accounting 4 U

In all of our work at The School of Choice, the safety and security of our students and staff is our highest priority. We have chosen to partner with Reconnaissance because of their consistent and reliable service, their professional leadership, and their prompt response to our needs. They help us to maintain a positive atmosphere on our campus, and we are tremendously grateful!

Laura Pincus Hartman

The School of Choice / l'Ecole de Choix (Haiti)