Information Security Awareness Training

About the Training Program

All LMU faculty, staff, and student employees with access to university’s information resources are required to complete annual security awareness training on a periodic basis, as stated in the ITS Information Security Policy, section 6.11. To fulfill this requirement, the ITS Information Security team has developed a formal online course in Workday Learning to ensure that all employees can easily participate in and complete the security awareness program.

The course has been designed to provide best practices on how to protect LMU's computer systems, along with its data, people and other assets, from cyber threats or attacks. This course contains five lessons and one mini game and should take no more than 25 minutes to complete. For additional information about each lesson, scroll down to the Lessons Included section.

It is our shared responsibility to safeguard our online and offline presence. With most of our daily interactions involve emails and the Internet, it is important that we continue to practice the best security behavior, to demonstrate our ability to identify possible threats, and to know what to do in the situation. We hope this course and future offering bring security awareness to all LMU faculty, staff, and student employees.

Thank you for keeping LMU safe and compliant! 

Access the Course

  • All LMU faculty, staff, and student employees will be pre-enrolled in this course.
  • On April 3, you will receive an email from Workday with instructions on how to access the course. Be sure to read the email and the instructions first. They provide tips regarding browsers, pop-up window, etc.
  • Complete the course by Friday, May 5.
  • For technical support or content questions, please contact the ITS Service Desk at

Recommendations for Optimal Viewing Experience

Please follow these recommendations for an optimal viewing experience. 

  • This course should take no more than 25 minutes to complete.
  • Enable/allow Pop-up Blocker - Each lesson opens in a new window and you might need to enable/allow the Pop-up Blocker for this site for the first time. Instructions for Chrome, Safari, and Firefox.
  • Supported browsers - Google Chrome, Firefox, Safari, NO Internet Explorer
  • Supported devices - This course is best viewed on a computer/laptop and not on the Workday mobile app.
  • Complete each lesson in one sitting. There is no “Remember Me” option.
  • Take the lesson in order preferably. 
  • Video playback control - You can rewind but you cannot forward the video.
  • Answer the three questions correctly in the quiz. Otherwise, you will be asked to retake the quiz.
  • Identify all 5 emails correctly in the Spot the Phish Mini Game for the lesson to be marked as completed.

Lessons Included

Click the drop-down arrow to learn more about the topic.

  • This lesson explains how cyber attackers are focusing on human risk to gain access to data and information by bypassing technology’s defenses. You are encouraged to build a strong cyber shield and use training to strengthen your cyber detection skills at work and at home.

  • Phishing is an email-based cyber-attack, often targeting many people at once. This lesson explains key methods cyber attackers use to get people to click on the bait in an email message. It also identifies the primary clues that each person can use to detect phishing, and how to safely check links in an email. Finally, the lesson reviews additional safe email behaviors.

  • You will be presented with 5 different emails and asked to identify which email is Safe or Risky. You must correctly identify each email for this lesson to be marked as completed. Good luck!

  • This lesson covers recommendations of strong passwords, the use of passphrases, the importance of layered security with two-step verification, and key password security behaviors that each person should employ to protect information.

  • This lesson describes ways to securely store or process sensitive information, to manage data retention, to follow data policies and processes, as well as to destroy data securely.

  • We hope this course has made you more confident defending yourself against today’s cyber attackers, both at work and for protecting your own personal digital footprint. While technology can help protect you, you are ultimately the best defense. Familiarize yourself with LMU's ITS policies and procedures and follow them at all times.