{"id":86225,"date":"2023-04-19T10:03:53","date_gmt":"2023-04-19T08:03:53","guid":{"rendered":"https:\/\/skillbest.com\/information-security-what-should-e-learning-contain\/"},"modified":"2023-04-19T10:05:20","modified_gmt":"2023-04-19T08:05:20","slug":"information-security-what-should-e-learning-contain","status":"publish","type":"post","link":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/","title":{"rendered":"Information security: what should the e-learning include"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;0&#8243; top_padding=&#8221;2&#8243; bottom_padding=&#8221;2&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-554342&#8243; heading_semantic=&#8221;h1&#8243; text_size=&#8221;fontsize-197929&#8243; text_transform=&#8221;uppercase&#8221; uncode_shortcode_id=&#8221;346295&#8243; text_color_type=&#8221;uncode-palette&#8221;]e-Learning Information Security[\/vc_custom_heading][vc_empty_space empty_h=&#8221;0&#8243;][vc_separator sep_color=&#8221;color-554342&#8243; el_width=&#8221;10%&#8221; el_height=&#8221;1px&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-154192&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-101650&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;159519&#8243; text_color_type=&#8221;uncode-palette&#8221;]Information security: what should the e-learning include[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_column_text uncode_shortcode_id=&#8221;129686&#8243;]Information security is critical in today&#8217;s digital world. Organizations need to ensure that their employees have the latest information and <a href=\"https:\/\/skillbest.com\/elearning-best-practices\/\">best practices<\/a> related to information security to minimize the risk of data leaks, <a href=\"https:\/\/skillbest.com\/referenz\/avl-cybersecurity-management-system\/\">cyberattacks<\/a> and other security threats. One way to do this is through <strong>e-learning on information security<\/strong>, which can be practical and effective.[\/vc_column_text][vc_column_text uncode_shortcode_id=&#8221;163711&#8243;]<\/p>\n<ul>\n<li>Introduction to information security<\/li>\n<li>Basics of information security<\/li>\n<li>Physical security<\/li>\n<li>Network Security<\/li>\n<li>Security in handling data<\/li>\n<li>Security incident response<\/li>\n<li>Monitoring and compliance<\/li>\n<li>Regular testing and training<\/li>\n<li>Introduction to information security<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h3&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;213839&#8243; text_color_type=&#8221;uncode-palette&#8221;]Basics of information security[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;216935&#8243;]First, it is important to understand the basics of information security. This includes understanding what information security is and why it is important. Information security refers to the protection of information from unauthorized access, misuse, disclosure, alteration, or destruction. This is important because companies often store sensitive information, such as customer and financial data, that is at risk in the event of a data leak or cyberattack.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h3&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;158843&#8243; text_color_type=&#8221;uncode-palette&#8221;]Physical security[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;106306&#8243;]Another important component of information security is physical security. This refers to preventing unauthorized access to computers and other devices, and protecting devices from theft or damage.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h3&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;169875&#8243; text_color_type=&#8221;uncode-palette&#8221;]Network Security[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;191903&#8243;]Network security is also critical, as companies need to protect their networks from viruses, malware and other types of cyberattacks. One way to do this is by using strong passwords and multi-factor authentication.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h3&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;844196&#8243; text_color_type=&#8221;uncode-palette&#8221;]Security in handling data[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;148468&#8243;]Security in handling data is another important component of information security. This refers to security awareness in handling confidential information as well as the use of encryption to protect data. It is also important to prevent data theft by disposing of devices and media securely.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h3&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;239701&#8243; text_color_type=&#8221;uncode-palette&#8221;]Security incident response[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;193606&#8243;]It is also important that companies teach their employees how to respond in the event of a security incident. This includes recognizing signs of a security incident, reporting an incident, and taking action to minimize the impact of an incident.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h3&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;132529&#8243; text_color_type=&#8221;uncode-palette&#8221;]Monitoring and compliance[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;205488&#8243;]Monitoring and compliance are also important aspects of information security. Companies need to monitor their systems and networks and ensure that they comply with regulatory requirements and industry standards. In addition, it is important to regularly review information security policies and procedures and ensure that they are in line with current threats.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h3&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;208994&#8243; text_color_type=&#8221;uncode-palette&#8221;]Regular testing and training[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;102103&#8243;]To ensure that employee:s are aware of the latest best practices and security protocols, it is important to conduct regular testing and training. These can take the form of simulated attacks or interactive e-learning programs to ensure employees are aware of the latest techniques to defend against security threats.[\/vc_column_text][vc_custom_heading text_color=&#8221;color-154192&#8243; heading_semantic=&#8221;h3&#8243; text_font=&#8221;font-604939&#8243; text_size=&#8221;fontsize-898198&#8243; text_weight=&#8221;400&#8243; uncode_shortcode_id=&#8221;975526&#8243; text_color_type=&#8221;uncode-palette&#8221;]Conclusion[\/vc_custom_heading][vc_column_text uncode_shortcode_id=&#8221;982874&#8243;]Overall, it is critical for organizations to ensure that their employees are aware of the latest best practices and techniques related to information security. E-learning programs can be a practical and effective way to train employees and minimize the risk of security threats.[\/vc_column_text][vc_row_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_button button_color=&#8221;color-154192&#8243; border_width=&#8221;0&#8243; link=&#8221;url:https%3A%2F%2Fskillbest.com%2Fen%2Fcontact%2F|title:Contact|&#8221; button_color_type=&#8221;uncode-palette&#8221; uncode_shortcode_id=&#8221;174890&#8243;]Create e-learning for information security[\/vc_button][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>What should a good information security e-learning include? Best practices for increasing security awareness in the enterprise.<\/p>\n","protected":false},"author":1,"featured_media":86221,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"h5ap_radio_sources":[],"footnotes":""},"categories":[517,592],"tags":[476,504,536,590],"class_list":["post-86225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-based-trainings-en","category-online-courses","tag-online-course","tag-web-based-trainings-en","tag-individuelles-e-learning-en","tag-wbt-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Information security: what should the e-learning include<\/title>\n<meta name=\"description\" content=\"What should a good information security e-learning include? Best practices for increasing security awareness in the enterprise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information security: what should the e-learning include\" \/>\n<meta property=\"og:description\" content=\"What should a good information security e-learning include? Best practices for increasing security awareness in the enterprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/\" \/>\n<meta property=\"og:site_name\" content=\"skillbest GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/skillbest.elearning\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-19T08:03:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-19T08:05:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skillbest.com\/wp-content\/uploads\/2023\/04\/eLearning-Informationssicherheit.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00fcnther Veit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Skillbest_GmbH\" \/>\n<meta name=\"twitter:site\" content=\"@Skillbest_GmbH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00fcnther Veit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/\"},\"author\":{\"name\":\"G\u00fcnther Veit\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#\\\/schema\\\/person\\\/ad6a195e46df51c40c26d944a34a4ccf\"},\"headline\":\"Information security: what should the e-learning include\",\"datePublished\":\"2023-04-19T08:03:53+00:00\",\"dateModified\":\"2023-04-19T08:05:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/\"},\"wordCount\":1040,\"publisher\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/eLearning-Informationssicherheit.jpg\",\"keywords\":[\"online course\",\"web based trainings\",\"individuelles e-learning\",\"wbt\"],\"articleSection\":[\"Web Based Trainings\",\"Online courses\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/\",\"url\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/\",\"name\":\"Information security: what should the e-learning include\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/eLearning-Informationssicherheit.jpg\",\"datePublished\":\"2023-04-19T08:03:53+00:00\",\"dateModified\":\"2023-04-19T08:05:20+00:00\",\"description\":\"What should a good information security e-learning include? Best practices for increasing security awareness in the enterprise.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/#primaryimage\",\"url\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/eLearning-Informationssicherheit.jpg\",\"contentUrl\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/eLearning-Informationssicherheit.jpg\",\"width\":1200,\"height\":627,\"caption\":\"e-Learning Informationssicherheit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/information-security-what-should-e-learning-contain\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/skillbest.com\\\/en\\\/e-learning-agency\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information security: what should the e-learning include\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/skillbest.com\\\/en\\\/\",\"name\":\"skillbest GmbH\",\"description\":\"e-Learning Agentur\",\"publisher\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#organization\"},\"alternateName\":\"skillbest\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skillbest.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#organization\",\"name\":\"skillbest GmbH\",\"alternateName\":\"skillbest\",\"url\":\"https:\\\/\\\/skillbest.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo_skillbest_transparent.png\",\"contentUrl\":\"https:\\\/\\\/skillbest.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo_skillbest_transparent.png\",\"width\":330,\"height\":98,\"caption\":\"skillbest GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/skillbest.elearning\\\/\",\"https:\\\/\\\/x.com\\\/Skillbest_GmbH\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/skillbest\"],\"description\":\"Als e-Learning Agentur bietet skillbest Unternehmen neuartige und inspirierend kreative L\u00f6sungen rund um die Digitalisierung von Wissen.\",\"email\":\"office@skillbest.com\",\"telephone\":\"+43 316 \\\/34 19 95\",\"legalName\":\"skillbest GmbH\",\"foundingDate\":\"2017-01-01\",\"vatID\":\"ATU72492858\",\"taxID\":\"FN 475032b\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skillbest.com\\\/en\\\/#\\\/schema\\\/person\\\/ad6a195e46df51c40c26d944a34a4ccf\",\"name\":\"G\u00fcnther Veit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dae3667bd488a93ae0404678b3eea479da0948b88bab119624816ac20aec700e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dae3667bd488a93ae0404678b3eea479da0948b88bab119624816ac20aec700e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dae3667bd488a93ae0404678b3eea479da0948b88bab119624816ac20aec700e?s=96&d=mm&r=g\",\"caption\":\"G\u00fcnther Veit\"},\"url\":\"https:\\\/\\\/skillbest.com\\\/en\\\/author\\\/guenther-veit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information security: what should the e-learning include","description":"What should a good information security e-learning include? Best practices for increasing security awareness in the enterprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/","og_locale":"en_US","og_type":"article","og_title":"Information security: what should the e-learning include","og_description":"What should a good information security e-learning include? Best practices for increasing security awareness in the enterprise.","og_url":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/","og_site_name":"skillbest GmbH","article_publisher":"https:\/\/www.facebook.com\/skillbest.elearning\/","article_published_time":"2023-04-19T08:03:53+00:00","article_modified_time":"2023-04-19T08:05:20+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/skillbest.com\/wp-content\/uploads\/2023\/04\/eLearning-Informationssicherheit.jpg","type":"image\/jpeg"}],"author":"G\u00fcnther Veit","twitter_card":"summary_large_image","twitter_creator":"@Skillbest_GmbH","twitter_site":"@Skillbest_GmbH","twitter_misc":{"Written by":"G\u00fcnther Veit","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/#article","isPartOf":{"@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/"},"author":{"name":"G\u00fcnther Veit","@id":"https:\/\/skillbest.com\/en\/#\/schema\/person\/ad6a195e46df51c40c26d944a34a4ccf"},"headline":"Information security: what should the e-learning include","datePublished":"2023-04-19T08:03:53+00:00","dateModified":"2023-04-19T08:05:20+00:00","mainEntityOfPage":{"@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/"},"wordCount":1040,"publisher":{"@id":"https:\/\/skillbest.com\/en\/#organization"},"image":{"@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/#primaryimage"},"thumbnailUrl":"https:\/\/skillbest.com\/wp-content\/uploads\/2023\/04\/eLearning-Informationssicherheit.jpg","keywords":["online course","web based trainings","individuelles e-learning","wbt"],"articleSection":["Web Based Trainings","Online courses"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/","url":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/","name":"Information security: what should the e-learning include","isPartOf":{"@id":"https:\/\/skillbest.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/#primaryimage"},"image":{"@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/#primaryimage"},"thumbnailUrl":"https:\/\/skillbest.com\/wp-content\/uploads\/2023\/04\/eLearning-Informationssicherheit.jpg","datePublished":"2023-04-19T08:03:53+00:00","dateModified":"2023-04-19T08:05:20+00:00","description":"What should a good information security e-learning include? Best practices for increasing security awareness in the enterprise.","breadcrumb":{"@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/#primaryimage","url":"https:\/\/skillbest.com\/wp-content\/uploads\/2023\/04\/eLearning-Informationssicherheit.jpg","contentUrl":"https:\/\/skillbest.com\/wp-content\/uploads\/2023\/04\/eLearning-Informationssicherheit.jpg","width":1200,"height":627,"caption":"e-Learning Informationssicherheit"},{"@type":"BreadcrumbList","@id":"https:\/\/skillbest.com\/en\/information-security-what-should-e-learning-contain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/skillbest.com\/en\/e-learning-agency\/"},{"@type":"ListItem","position":2,"name":"Information security: what should the e-learning include"}]},{"@type":"WebSite","@id":"https:\/\/skillbest.com\/en\/#website","url":"https:\/\/skillbest.com\/en\/","name":"skillbest GmbH","description":"e-Learning Agentur","publisher":{"@id":"https:\/\/skillbest.com\/en\/#organization"},"alternateName":"skillbest","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skillbest.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/skillbest.com\/en\/#organization","name":"skillbest GmbH","alternateName":"skillbest","url":"https:\/\/skillbest.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/skillbest.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/skillbest.com\/wp-content\/uploads\/2019\/10\/logo_skillbest_transparent.png","contentUrl":"https:\/\/skillbest.com\/wp-content\/uploads\/2019\/10\/logo_skillbest_transparent.png","width":330,"height":98,"caption":"skillbest GmbH"},"image":{"@id":"https:\/\/skillbest.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/skillbest.elearning\/","https:\/\/x.com\/Skillbest_GmbH","https:\/\/www.linkedin.com\/company\/skillbest"],"description":"Als e-Learning Agentur bietet skillbest Unternehmen neuartige und inspirierend kreative L\u00f6sungen rund um die Digitalisierung von Wissen.","email":"office@skillbest.com","telephone":"+43 316 \/34 19 95","legalName":"skillbest GmbH","foundingDate":"2017-01-01","vatID":"ATU72492858","taxID":"FN 475032b","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/skillbest.com\/en\/#\/schema\/person\/ad6a195e46df51c40c26d944a34a4ccf","name":"G\u00fcnther Veit","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/dae3667bd488a93ae0404678b3eea479da0948b88bab119624816ac20aec700e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dae3667bd488a93ae0404678b3eea479da0948b88bab119624816ac20aec700e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dae3667bd488a93ae0404678b3eea479da0948b88bab119624816ac20aec700e?s=96&d=mm&r=g","caption":"G\u00fcnther Veit"},"url":"https:\/\/skillbest.com\/en\/author\/guenther-veit\/"}]}},"_links":{"self":[{"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/posts\/86225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/comments?post=86225"}],"version-history":[{"count":2,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/posts\/86225\/revisions"}],"predecessor-version":[{"id":86230,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/posts\/86225\/revisions\/86230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/media\/86221"}],"wp:attachment":[{"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/media?parent=86225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/categories?post=86225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skillbest.com\/en\/wp-json\/wp\/v2\/tags?post=86225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}