Course Content
Introduction to Cyber Security at The Health Academy
You don't currently have access to this content
Purpose of the Cyber Security Policy at The Health Academy
You don't currently have access to this content
Acceptable Use of ICT Resources
You don't currently have access to this content
Confidentiality
You don't currently have access to this content
Use of Email at The Health Academy
You don't currently have access to this content
Use of Internet in Remote Settings
You don't currently have access to this content
Use of Mobile / Portable Media Equipment
You don't currently have access to this content
Use of Google Workspace Chat / Video
You don't currently have access to this content
Copyright
You don't currently have access to this content
Secure Printing Practices
You don't currently have access to this content
Good Security Practice
You don't currently have access to this content
General Principles for IT Resource Management
You don't currently have access to this content
Monitoring
You don't currently have access to this content
Secure Desk Policy
You don't currently have access to this content
Definitions and Classifications of Information
You don't currently have access to this content
Protecting Information
You don't currently have access to this content
Electronic Storage Devices
You don't currently have access to this content
Personal Computers and Laptops
You don't currently have access to this content
Printers and Photocopiers
You don't currently have access to this content
Keeping Desk / Work Areas Clear
You don't currently have access to this content
Network Password
You don't currently have access to this content
Password Handling
You don't currently have access to this content
Creating Strong Passwords – Passphrases
You don't currently have access to this content
Password Composition
You don't currently have access to this content
Passphrase Recommendations and Examples
You don't currently have access to this content
Secure Email
You don't currently have access to this content
Social Media, Data Protection, and the Law
You don't currently have access to this content