Skip to main content
Online kursus om IT-sikkerhed. Mand og kvinde kigger på computer.

Cyber Security

  • Duration: 30 min.

  • Language: English and Danish

Grape, in collaboration with BDO, has put together an online course of 9 modules that gives your target group a solid foundation in good IT security and minimizes the risk of security breaches in your IT system.

Cyber Security online course developed by experts

Get professional content developed by experts from BDO, one of Denmark’s largest accounting firms.

  • Professional content by BDO, Denmark’s 4th largest consultancy and auditing company with a high level of professionalism and expertise in Cyber Security
  • Designed and produced by Grape, specialists in e-learning
  • Both customized to your organization, audience and brand

This way you get accurate, motivating and relevant e-learning in Cyber Security.

You avoid your target audience perceiving the content as hollow and you avoid having to develop and maintain the content yourself.

We’ve put together a library of 9 modules that can be delivered as a single program or in smaller portions on an ongoing basis. The online course provides your target audience with the right skills to handle IT security in everyday life. Your audience will be able to navigate potential cyber threats and protect your organisation.

The course is structured as microlearning that continuously activates your target audience and uses different tools. We can deliver the program to your LMS or in a complete solution including LMS and reporting.

CONTENT

MODULE 1 - EMAIL

Statistics show that 98% of all cyber-attacks in companies are partially or completely due to the actions of unwitting employees. This module goes through the three most common types of malicious email you need to be aware of.

MODULE 2 - PASSWORD

80% of all hacking-related crimes are related to weak or stolen passwords. This module goes through 5 good rules for using passwords.

MODULE 3 - MOBILE DEVICES

Your mobile phone contains a lot of information that must not fall into the wrong hands. This module goes through 5 best practices on how to make your mobile more secure.

MODULE 4 - PHYSICAL DATA SECURITY

Confidential data, such as contracts and personal data, is often handled on screen, on paper and verbally. This module goes through 6 good rules for working with physical data security.

MODULE 5 - OUTSIDE THE WORKPLACE

When vacationing and traveling, there are a number of cyber threats you should be aware of. This module goes through 8 best practices for handling data while traveling.

MODULE 6 - SOCIAL MEDIA

Although social media accounts are private, there are a number of issues we need to be aware of in relation to our work. This module goes through 3 tips for social media behavior.

MODULE 7 - DATA SHARING

When it comes to sharing confidential data, there are a number of things to be aware of to ensure that unauthorized persons do not gain access to the shared data.

MODULE 8 - DATA CLEANUP

By law, information that can be attributed to a specific person or personal data must be deleted when it is no longer necessary for the purpose for which it was collected. This module goes through 3 rules for handling emails with personal data.

MODULE 9 - SECURITY BREACHES

If you suspect a security breach of your company’s IT systems, it’s crucial to react quickly – even at the slightest suspicion. This module goes through what the user should be aware of and what to ensure in the event of an accident.

MODULE 10 - FOR THE IT MANAGER

As an IT manager, there are often several areas where you need to pay attention to IT security. This module is directly targeted at the IT manager.

Teacher

The program is developed in collaboration with BDO, one of Denmark’s largest accounting firms.

CALCULATE PRICE

Min side
     
     
DKK

Order a course or contact us

JENS HINDKJÆR

CCO, Partner

What does an e-learning Cyber Security course look like?

E-learning can take many forms, depending on the content and message. Below you can see a short clip of our Cyber Security course.

The video is a short clip of a video element from the e-learning. In addition to videos, there are interactive exercises with gamification elements after each module.

How IT savvy do I need to be to take an Cyber Security course?

You don’t need any special IT skills to take our Cyber Security course. The course goes through the different IT-related threats and uses examples to show you when you need to be aware. Anyone can take the course and get a great professional benefit.

Who is Cyber Security relevant for?

IT security is relevant for all organizations that have data available digitally. In order to be proactive about Protecting your organization’s data requires the entire organization to have the necessary knowledge to prevent cyber attacks. It is employees who can prevent cyber attacks through their actions.

In this course, your organization will gain the necessary knowledge that is easily accessible to the entire organization via an LMS system. We’re happy to help you implement the course in your LMS system and make recommendations if you don’t have an LMS yet.

Why should you take an Cyber Security course?

Every business is exposed to cyber attacks. It can be anything from a link in an email, insecure internet connections and weak passwords that give the hacker the necessary access to all data in the company.

Not only can your data be leaked on various media outlets, your data can be locked by the hacker, who can demand large sums of money to give you back access. Data is invaluable to most businesses, as hackers are well aware. Therefore, the right proactive approaches are needed to prevent hackers from gaining access.

These approaches start with employees, but it requires employees to be empowered with the necessary knowledge.

What is Cyber Security?

At its core, IT security is about protecting data available on the internet, computers and computer networks.

Cyber Security is about everything from strong passwords and antivirus programs to your online behavior. Cyber Security is often a big part of a company’s IT policy in terms of what and how security is ensured.

Some people think that Cyber Security is only relevant for the largest Danish companies, but data shows that hackers also target smaller companies, as they often don’t have the security measures in place.

Due to digitalization, Cyber Security is becoming more and more relevant for businesses as data is increasingly available online. That’s why it’s important that your employees know how to ensure that hackers and other cybercriminals don’t gain access to your precious data.

What is the difference between information security and Cyber Security?

Information security is about keeping your company’s information safe. That’s why Cyber Security is an important element of information security – but the two disciplines are not the same.

The reason the two are often assumed to be the same is because most of our information is digital today. While Cyber Security is exclusively about digital data, information security is generally about the information the company has available and is therefore subject to the General Data Protection Regulation, which is part of the GDPR regulations.