• Online, Self-Paced
Course Description

The word “shadow” doesn’t usually come with anything good attached to it. Nope, we’re more likely to think about lurking monsters and shady characters. So it’s no surprise to learn that Shadow IT is sometimes feared, too, especially by IT teams. To be honest, it can have some pretty scary risks to the business you work for.

But it’s not all black and white. Knowing more about Shadow IT will help you avoid unnecessary security risks and data breaches, which can also mean avoiding huge fines and potential disciplinary action, too. This course has been designed to explain exactly what Shadow IT is and advise about its appropriate use.
By the end of this course, you’ll be able to:
• Define Shadow IT
• Identify when it’s appropriate to use forms of Shadow IT
• Explain the risks of Shadow IT
Why take this course?
Taking this course will help protect you and the company you work for from hackers, potential data breaches, financial liabilities, as well as operational malfunctions in the IT systems. But some Shadow IT can also be handy if used appropriately, so it’s useful to be aware of. If you use a computer for any part of your job, regardless of role, then you won’t be left “in the dark” any longer.

10 mins | SCORM | Infographic

Learning Objectives

Define Shadow IT, Identify when it's appropriate to use forms of Shadow IT, Explain the risks of Shadow IT

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Risk Management
  • Knowledge Management
  • Language Analysis
  • Strategic Planning and Policy
  • Exploitation Analysis