The IT Security module covers the main skills and knowledge needed for the secure use of ICT in everyday settings, at home and at work.

For individuals and organisations, it is important to understand good practice in maintaining a secure network connection, using the internet safely and securely, and managing data and information. This module covers concepts around secure information and data, physical security, privacy, and identity theft.

As data and information are valuable, having the appropriate knowledge, skills, and awareness to protect them is beneficial in a wide range of job roles. The IT Security module helps workers and employers protect these crucial resources.

Develop the skills needed to protect data and information on computers, devices, and networks.

Module overview

CategorySkill set
Security concepts
  • Data threats
  • Value of information
  • Personal security
  • File security
Malware
  • Definition and function
  • Types
  • Protection
Network security
  • Networks
  • Network connections
  • Wireless security
  • Access control
Secure web use
  • Web browsing
  • Social networking
Communications
  • E-mail
  • Instant messaging
Secure data management
  • Securing and backing-up data
  • Secure destruction

Main learning outcomes

Successful candidates will be able to apply good IT security principles to manage connections, devices, and data effectively and safely. After passing this module, candidates will feel confident keeping information and data secure. They will know how to reduce risk with good practice. They will be able to:

  • understand the key concepts of IT security
  • recognise good practice in protecting computers, devices, and networks
  • understand the types of risk that pose a threat to security
  • know how to use the internet and communication channels securely
  • recognise good practice in secure data management

Why certify with ICDL?

  • ICDL certification is internationally recognised by employers and institutions.
  • ICDL modules are developed with input from computer users, subject matter experts, and practising professionals from all over the world.
  • The regularly updated syllabus content reflects day-to-day tasks and responsibilities typical of job roles.
  • ICDL modules focus on skills acquisition as well as an understanding of concepts.
  • ICDL syllabus content is vendor-independent so that skills and knowledge are transferable.
  • ICDL has rigorous Quality Assurance Standards (QAS) and regular quality audits are conducted internally and externally.

Syllabus

The detailed syllabus for the IT Security module is publicly available, so that there is complete clarity about what is covered.

The syllabus document, which sets out the specific skills and knowledge that you will learn and against which you will be certified, can be downloaded here.


Sample tests

Do you want to better understand the IT Security module and how we test skills and knowledge

Try out the IT Security sample tests here to get a feel for the coverage of the module, or practice before your certification test.

Offer ICDL in your organisation

You can use ICDL as a training centre, a school or college, or for your own staff within your organisation.

To offer ICDL certification, you should contact the local ICDL operator in your country.

You can find contact details for all ICDL operators on our ‘ICDL in your country‘ page.

Find an ICDL course near you

Certifying your digital skills with ICDL is simple:

  1. Assess your existing skills with a Diagnostic Test
  2. Build your skills during a course or through learning in your own time
  3. Certify your skills and earn an ICDL certificate

ICDL Diagnostic Tests, Certification Tests, and courses are available through a network of test centres around Europe.

To get started, find an ICDL Accredited Test Centre near you

SUBSCRIBE TO OUR NEWSLETTER

Why not keep up to date with all our latest news and events?

Click here to register for our monthly newsletter.

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our privacy policy page.