IT Security

IT Security module will help you to understand the main concepts underlying the secure use of ICT in daily life and to use relevant techniques and applications to maintain a secure network connection, use the Internet safely and securely, and manage data and information appropriately.

Course Description

IT Security module covers some of the main concepts of IT Security at a general level, helping you understand the make-up of a personal computer in terms of hardware and software and to understand some of the IT security for users such as data storage and memory. Also, the module covers how information networks are used within computing and be aware of the uses of computer-based software applications in everyday life. Health and safety issues as well as some environmental factors and legal issues involved with using computers, are also covered.

Course Structure

The Security for IT Users course consists of 5 lessons in which you will cover the following areas:

1. System Performance Security: This lesson consists of 4 topics in which you will be able to describe how unwanted email and other messages, or ‘spam’, can be received on the computer. Use and manage anti-spam software to protect the computer from the risk of unwanted messages. Be able to describe how a firewall can protect the computer against the risk of infiltration. You will be made aware of the threats to software and data when downloading software from the Internet. Finally you will be able to describe what hoaxes are, and how to check whether a received message is a hoax: virus hoaxes, chain letters, scams, false alarms, misunderstandings, scares

  • Unwanted Messages
  • Malicious Programmes
  • Infiltration
  • E-mail Hoaxes

2. Information Security: This lesson comprises of 3 lessons. You will learn how to describe how information can be at risk from theft, from unauthorised access, use access controls to keep data confidential, learn about ways you can keep personal data safe and secure from outside threats and how to deal with confidential data. You will also learn about describing how an individual user name limits access to relevant levels of information when logging onto a computer and describe different forms of phishing and learning ways in which personal information is stolen.

  • Authentication
  • Confidentiality
  • Identity Theft

3. Technology Security: This lesson covers 3 topics. You will be able to describe how unsecured networks can make information accessible to others and know how to ensure that unencrypted confidential information is not sent across an unsecured network. The lesson will also cover the use of Portable devices and using Bluetooth, where you learn to describe what Bluetooth connectivity is, and why information on Bluetooth devices is vulnerable to unauthorised access and change the settings of the Bluetooth device. You will also learn about why portable devices are vulnerable to loss or theft: laptop, notebook, PDA, mobile phone, multimedia player, be able to describe why USB and other removable storage devices are vulnerable to loss or theft of valuable and confidential information and learn how to describe how information stored on USB and other removable devices can be protected: passwords, safe and secure storage

  • Networks
  • Connectivity
  • Portable Devices

4. Guidelines and Procedures: The lesson on Guidelines and Procedures covers the following 2 lessons. During this lesson you will learn how to apply the guidelines and procedures for the secure use of IT set by employers or organisations, know the legal requirements within security procedures for organisations, understanding and carrying out relevant IT security checks and to understand and follow the privacy policy within an organization.

  • Guidelines and Procedures
  • Privacy

5. Data Security: The final lesson of the course covers 3 lessons. In this lesson you learn about ways to prevent physical data theft like: locking computer and hardware using a security cable, be able to describe the possible consequences of accidental file deletion on a personal computer and a network and learn how to store data safely and securely. In addition to this, you will also be able to describe the importance of having a secure, off-site backup copy of data and you will be able to select and use effective back up procedures for systems, and know the importance of doing so.

  • Security
  • Backups
  • Storage

Qualification

This is an online self-learning and self-facilitated course only and in order to obtain a qualification, you must take and pass ECDL Essentials Exams. Please visit our BCS ECDL Essentials Exams section for further information.

Successful candidates will gain ECDL Essentials Award in IT User Skills (QCF) Level 1 qualification.

Duration

The duration of this course will be 2 months from the day of enrolment. Learning account will be automatically closed on the end date regardless of the progress you have made.

Cost

Self-funded, self-learning and self-facilitated online IT Security (Security for IT Users) Module costs £60.
Please note that no refund will be offered under any circumstances

ECDL ESSENTIALS EXAMS: Please note that the cost of taking the BCS ECDL Essentials exams will be separate. Please visit BCS ECDL Essentials Exam section for further details.

FUNDED ECDL ESSENTIALS PROGRAMME & EXAMS: Please note that Intech Centre also provides government funded IT Level 1 (ECDL Essentials) programme where both the learning and exam will be funded, subject to eligibility criteria. Please visit our IT Level 1 (ECDL Essentials) section for further details

Enrolment

To find out more about this course and to book an appointment with one of our advisers, please call us on 020 7354 5655.

Please be advised that full cost of the course must be cleared and you need to bring your Passport or Driving Licence for the enrolment.

microsoft word courses - intech centre London
  • Cost: £60
  • Duration: 2 months
  • Enrolment: Rolling basis
020 7354 5655

Call us now!

020 7354 5655
shadow

We also offer exam only option where you can pay and sit a computerised exam.

  • Service*

    Full Name*

    Email*

    Telephone*

    Residency*

    Age*

    Where did you hear?*

    Your Message

    IMPORTANT - Privacy Policy!

  • Service*

    Full Name*

    Email*

    Telephone*

    Residency*

    Age*

    Where did you hear?*

    Your Message

    IMPORTANT - Privacy Policy!

  • Service*

    Full Name*

    Email*

    Telephone*

    Residency*

    Age*

    Where did you hear?*

    Your Message

    IMPORTANT - Privacy Policy!

  • Service*

    Preferred Day*

    Full Name*

    Email*

    Telephone*

    Residency*

    Age*

    Where did you hear?*

    Your Message

    IMPORTANT - Privacy Policy!

  • Service*

    Preferred Day*

    Full Name*

    Email*

    Telephone*

    Residency*

    Age*

    Where did you hear?*

    Your Message

    IMPORTANT - Privacy Policy!