Categories
Information Technology
Discover easy-to-use Information Technology templates and training courses for operation procedures, business continuity plan, risk assessment, and more. Use them to gain practical knowledge, streamline your work, and stay on top of industry best practices. Customize these resources to fit your needs and excel in the Information Technology industry with confidence.
- Course
Cyber Security Awareness
Cyber security is one of the most important measures to take when training new or current employees. The importance of continuously training employees on cyber security comes from the rapid advancement of technology in our digital age, meaning that extra measures must be taken to ensure our information and knowledge are up-to-date. This cyber security course is designed to help you protect yourselves and the company against cyber attacks and threats. This 9-part course aims to empower learners with an up-to-date guide based on how to recognise and mitigate any potential cyber threats. The course begins by introducing injection attacks, explaining broken authentication and session mamangement, cross-site scripting, a review of the 3 most common attacks, broken access control, sensitive data exposure, cross-site request forgery, using components with known vulnerabilities, and underprotected APIs.
by SafetyCultureGetDownloads: 9,828 - Course
Cyber Security
As we live in today's technological age, criminals have found a way to interrupt an organization's operations and even steal valuable information from their victims through cyber attacks. This course provides the information you need to know about the different kinds of cyber attacks and the safety precautions that you can take to avoid them.
by SafetyCultureGetDownloads: 6,134 - Template
Job Safety Analysis (JSA)
Explore the Job Safety Analysis (JSA) template designed to ensure compliance, enhance efficiency and promote safety in your operations.
by SafetyCultureGetDownloads: 5,880 - Course
Effective E-mail Communication
Explore e-mail best practices and tips to up your communication game!
by SafetyCultureGetDownloads: 5,578 - Template
IT Risk Assessment Template
Perform security risk and vulnerability assessments across internal IT technology and systems.
by SafetyCultureGetDownloads: 5,205 - Template
Computer Rollout
Explore the Computer Rollout template designed to ensure compliance, enhance efficiency and promote safety in your operations.
by SafetyCultureGetDownloads: 4,845 - Template
ISO 27001 Checklist
This checklist can be used to assess the readiness of the organization for ISO 27001 certification. Help discover process gaps and review your organization's ISMS based on the ISO 27001:2013 standard.
by SafetyCultureGetDownloads: 3,523 - Course
Getting Started with Microsoft Excel
Microsoft Excel is a spreadsheet tool for storing, organising, and analysing data. From tracking your expenses to preparing an invoice, Microsoft Excel has made it simple to work with various types of information. Help yourself excel with Excel by taking this course!
by SafetyCultureGetDownloads: 3,208 - Course
Phone Etiquette
Calls can often times be the first contact between your customers and your company, which is why having excellent phone etiquette is crucial in setting the right tone and perception about your brand. Take this course to learn the common tips and tricks to improve your phone etiquette and nail those customer interactions one call at a time.
by SafetyCultureGetDownloads: 2,636 - Course
General Data Protection Regulation (GDPR) for Individuals
Learn about how the GDPR affects you.
by SafetyCultureGetDownloads: 2,234 - Template
Business Continuity Plan Template for IT
Prepare backup plans for IT and software development emergencies using this business continuity plan template. Identify the scope, business functions at risk and outline roles and responsibilities of key personnel.
by SafetyCultureGetDownloads: 2,137 - Course
Cybersecurity and Internal Threats
With today's technological boom, it's important to know how you can protect yourself against cyberattacks and insider threats. This course will teach you the concepts of cybersecurity, cyberattacks, insider threats, and some preventive measures to help you stay protected. (Last updated: December 2024)
by SafetyCultureGetDownloads: 2,056 - Template
Information Security Risk Assessment Checklist
This checklist can help Information Security Officers determine the current state of information security in the organization. Determine if an item is High, Medium, Low, or No Risk and assign actions for time-sensitive issues found during assessment. This can be used as a guide to go through the following: Organizational and company practices, Security against physical threats, Data security practices, Information and software integrity, Device security and network protection, Incident response.
by SafetyCultureGetDownloads: 1,777 - Template
Daily/Weekly Server Maintenance Checklist
Use this digitized template when performing your daily or weekly server maintenance. Selecting Daily or Weekly will automatically prompt the appropriate items to check for the day/week.
by SafetyCultureGetDownloads: 1,488 - Template
Computer Maintenance Checklist
Computer maintenance is conducted by IT professionals and managers to help ensure the continuous and optimal working condition of computers. Use this digitized computer maintenance checklists to inspect if the computer's hardware needs cleaning, repair, or replacement, and check if the software and security features are updated and running.
by SafetyCultureGetDownloads: 1,360 - Course
Using Technology to Build a Community
This course provides tech industry professionals with strategies to foster connection, collaboration, and engagement within remote teams. It addresses the importance of workplace communities, techniques for overcoming remote work challenges, and methods for developing virtual team activities and recreating informal interactions. By the end of this course, participants will possess the knowledge and tools to build resilient, cohesive, and highly collaborative remote teams. (Published: January 2025)
by SafetyCultureGetDownloads: 1,308 - Template
Computer System Preventative Maintenance Checklist
Use this Computer Preventative Maintenance checklist to maximize uptime of computer equipment.
by SafetyCultureGetDownloads: 1,245 - Template
Daily IT Operations Checklist
Explore the Daily IT Operations Checklist template designed to ensure compliance, enhance efficiency and promote safety in your operations.
by SafetyCultureGetDownloads: 1,243 - Template
IT Incident Report Form
An IT incident report template is a prerequisite tool submitted to an IT manager to begin an investigation on a specific incident. Use this template to identify the nature of the incident and its potential impact.
by SafetyCultureGetDownloads: 1,219 - Template
Cyber Security Checklist
A cyber security checklist helps assess and record the status of cyber security controls within the organization. It is used by IT professionals to secure the workplace and prevent any threats that may take place and hinder operations.
by SafetyCultureGetDownloads: 1,157 - Template
Network Audit Checklist
A network security audit checklist is used to proactively assess the security and integrity of organizational networks. IT managers and network security teams can use this digitized checklist to help uncover threats by checking the following items: firewall, computers and network devices, user accounts, malware, software, and other network security protocols.
by SafetyCultureGetDownloads: 887 - Course
Computer Numerical Control (CNC) Machining
Learn about the beginnings of CNC machining, its operating process, its essential components, and the difference of each of the most widely used CNC machines today.
by SafetyCultureGetDownloads: 838 - Template
Security Audit Checklist
Download this free security audit checklist to verify the effectiveness of your organization's security measures and controls. Through an in-depth security audit, be able to identify areas for improvement and address security issues.
by SafetyCultureGetDownloads: 622 - Template
Cyber Security Audit Checklist
A cyber security audit checklist is used by IT supervisors to inspect the overall IT security of the organization including hardware, software, programs, people, and data. It is used to assess the organization from potential vulnerabilities caused by unauthorized digital access.
by SafetyCultureGetDownloads: 574