Engage in Learning

elearning courses

We provide high quality elearning courses in a variety of areas: health and safety, legal compliance, management training, soft skills, presentation skills, leadership


  • Editable
  • Customisable
  • Multi language
  • Speed control
  • Themed environments
  • eBooks
  • Downloadable resources
  • Classroom packs
  • Post testing
  • Certificates


  • Improves engagement
  • Encourages participation
  • Accreditations
  • Consistency of approach
  • Active participation
  • Quickly manage content on the move


£30.0 per licence

  • Free trial available

Service documents


G-Cloud 11

Service ID

1 1 7 9 0 0 0 9 6 0 5 8 6 3 5


Engage in Learning

Chris Horseman

01453 796 222


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No
System requirements
  • Modern browser (Chrome, Firefox, Safari, Edge, IE11 and others)
  • H.264 codec for video
  • MP3 codec for audio

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Critical within 8 hours
Standard within 24-48 hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We offer a dedicated and personal support service to our Customers. We supply both a technical account manager as well as a customers success manager to ensure all of our customers.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite training
Offsite training
Course set up
Account Manager virtual meetings
Support desk help

We also provide training o the course editor which enables users to customise their courses
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction End user data is saved to the user's Learning Management System, not in the courses.

Course customisation data (added content) can be provided in JSON format on request.
End-of-contract process Access to chosen content, training, support.

We do not charge additional fees except where the customer wishes to Customise the elearning content with their own

Our courses are uniquely full editable so a large amount of customisation / branding etc is available

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service N/a
Service interface Yes
Description of service interface Course content and post test is accessed through a consistent web interface.
Accessibility standards None or don’t know
Description of accessibility - Transcript of any narration in audio or video is available through the interface.
- Text is designed for readability and is high contrast
- Text is machine readable
- Speed of audio and animation can be increased or decreased to aid comprehension
- Nothing flashes more than three times
- Link text is descriptive of link function
- Headings labels and titles describe topic or purpose.
- Default language can be programatically determined
- Navigation is consistent
- Components with the same functionality are consistently identified
- Labels and instructions are provided for interactive elements
- Validated HTML
Accessibility testing None
Customisation available Yes
Description of customisation End users can select colour scheme and background (theme)
Buyers can create their own theme

Buyers can add custom logo

Buyers can add suplimentary content (rich text or embedded content) to sections - viewing this content can be made mandatory for learners

As an extra service fully customised versions of courses can be created (i.e. changing or removing course content, not just adding to it)


Independence of resources Service load is monitored and scaled up when needed


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Backups are encrypted (AES-256) before being transferred and stored
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach End user data is saved to the user's Learning Management System, not in the courses.

Course customisation data (added content) can be provided in JSON format on request.
Data export formats Other
Other data export formats
  • JSON
Data import formats Other
Other data import formats
  • JPEG
  • PNG
  • GIF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network SSH

Availability and resilience

Availability and resilience
Guaranteed availability Our terms and Conditions refer to this
Approach to resilience Backups are stored in multiple locations
Outage reporting Email alerts are sent during any outages

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Other
Other user authentication Requests for course content must be accompanied by buyer's licence key
Access restrictions in management interfaces and support channels Support is managed through zendesk which requires username and password authentication to access tickets. Multi factor authentication can be enabled per account but isn't mandatory.
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Cyber Essentials
Information security policies and processes All staff undergo Information Security and GDPR training. Our MD is Head of data Protection and all reporting goes direct to him.

Our IT Security Policy refers and is available on request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Changes are tracked using GIT version control
Changes are reviewed by another developer before being made available to the continuous integration system
All builds are logged
Vulnerability management type Supplier-defined controls
Vulnerability management approach Patches are applied to servers at least every 3 months

Developer machines are kept up to date and have antivirus protection
Protective monitoring type Supplier-defined controls
Protective monitoring approach All access attempts to servers are logged

Access over compromised protocols temporarily disabled while permanent solution is investigated and implemented

As soon as we are aware of an incident we will work to stop the incident and inform affected customers
Incident management type Supplier-defined controls
Incident management approach We have predefined processes for common events

users report incidences through the support channel

incident reports are provided to affected customers once we have the necessary information - before this customers will be notified of the incident and predicted timescale for response and report.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £30.0 per licence
Discount for educational organisations No
Free trial available Yes
Description of free trial Free demo access to chosen courses
No limited time period

Service documents

Return to top ↑