We've updated our Sexual Harassment Courses to include changes to The Worker Protection Act

Online Courses FAQs

Choosing the right course or knowing which one best suits your requirements can be difficult, here we answer the most commonly asked questions about popular topics to help.

General Cyber Security FAQs

Cyber attacks are a growing threat, make sure you are cyber aware with our FAQs.

  • Can I sue for a data protection breach?

    In the event of a data protection breach, you can pursue legal action against the company that held your data. Contact a legal professional for more information.

  • How can I learn cyber security for free?

    There is a selection of free cyber security courses available online, but levels in the quality and validity of the information on these free courses can vary.

  • Is network security the same as cyber security?

    Network security and cyber security are different aspects of digital security. Cyber security normally refers to protective measures around devices connected to the internet. Network security refers to the act of protecting files and folders in devices which make up part of a local network.

  • What are the 3 domains of information security?

    The three domains of information security are as follows:

    1. Confidentiality – how private and secret the information is
    2. Integrity – how accurate and error-free the information is
    3. Availability – how available and disruption-free the information is

  • What are the elements of cyber security?

    The elements of cyber security can be split into various sections:

    • Application security
    • Information security
    • Network security
    • Disaster planning
    • Operational security
    • End-user education

  • What are the three types of countermeasures?

    The three types of countermeasures are:

    1. Hi-Tech – technological and electronic countermeasures such as alarm systems
    2. Lo-Tech – Physical and analogue countermeasures such as padlocks
    3. No-Tech – Human responses such as risk assessments

  • What are the three types of security policies?

    Three types of security policy are in place to ensure computer safety in working environments - they are the following:

    • Organisational security policy – this policy is the master policy for the security processes for the company
    • System-specific policy – the system-specific policy is designed for specific pieces of hardware or software
    • Issue-specific policy – the issue-specific policy is set in place for set functions which are complex enough or important enough to require their own processes

  • What are the types of security breaches?

    There are a series of security breaches which can be created by hackers, they can be categorised as: virus/malware, phishing and DDoS attacks.

  • Who discovered number theory?

    Number theory was discovered by French mathematician Pierre de Fermat.

  • Who invented VPN?

    It is generally agreed that the framework that led to the invention OF VPN was first designed by Microsoft employee Gurdeep Singh Pall in 1996.