Access the Course
All students have been enrolled in a Brightspace course and are highly encouraged to complete this 20-minute Information Security course. You can login to Brightspace and click this course on the home page. Please remind your fellow Lions to take this important course.
Recommendations for Optimal Viewing Experience
Please follow these recommendations for an optimal viewing experience.
- This course should take no more than 20 minutes to complete.
- Supported browsers - Google Chrome, Firefox, Safari, NO Internet Explorer
- Supported devices - This course is best viewed on a computer/laptop and not on the Workday mobile app.
- Complete each lesson in one sitting. There is no “Remember Me” option.
- Take the lesson in order preferably.
- Video playback control - You can rewind but you cannot forward the video.
- Answer the three questions correctly in the quiz. Otherwise, you will be asked to retake the quiz.
- Identify all 5 emails correctly in the Spot the Phish Mini Game for the lesson to be marked as completed.
Lessons Included
Click the drop-down arrow to learn more about the topic.
-
This lesson explains how cyber attackers are focusing on human risk to gain access to data and information by bypassing technology’s defenses. You are encouraged to build a strong cyber shield and use training to strengthen your cyber detection skills at work and at home.
-
Phishing is an email-based cyber-attack, often targeting many people at once. This lesson explains key methods cyber attackers use to get people to click on the bait in an email message. It also identifies the primary clues that each person can use to detect phishing, and how to safely check links in an email. Finally, the lesson reviews additional safe email behaviors.
-
You will be presented with 5 different emails and asked to identify which email is Safe or Risky. You must correctly identify each email for this lesson to be marked as completed. Good luck!
-
This lesson covers recommendations of strong passwords, the use of passphrases, the importance of layered security with two-step verification, and key password security behaviors that each person should employ to protect information.
-
We hope this course has made you more confident defending yourself against today’s cyber attackers, both at work and for protecting your own personal digital footprint. While technology can help protect you, you are ultimately the best defense. Familiarize yourself with LMU's ITS policies and procedures and follow them at all times.