Access the Course
This course contains five lessons and one mini game and should take no more than 25 minutes to complete. For additional information about each lesson, scroll down to the Lessons Included section.
All LMU faculty, staff, and student employees have be pre-enrolled in this course. If you missed the original due date of May 5, we highly encourage you to complete this required course as soon as possible. Refer to this email for additional information about the course.
There are different ways to access this course:
- Type "Information Security" on the Search bar, select "Information Security Awareness Training Program" on the search result list.
- Click the Menu on the left bar, select Learning, and click My Learning
- Click the Notifications icon on the top right. NOTE: You will see this if you have not completed the course.
- Check your Outlook Inbox for an email from Workday with detailed information. NOTE: This applies only to new employees.
For technical support or content questions, please contact the ITS Service Desk at servicedesk@lmu.edu.
Recommendations for Optimal Viewing Experience
Please follow these recommendations for an optimal viewing experience.
- This course should take no more than 25 minutes to complete.
- Enable/allow Pop-up Blocker - Each lesson opens in a new window and you might need to enable/allow the Pop-up Blocker for this site for the first time. Instructions for Chrome, Safari, and Firefox.
- Supported browsers - Google Chrome, Firefox, Safari, NO Internet Explorer
- Supported devices - This course is best viewed on a computer/laptop and not on the Workday mobile app.
- Complete each lesson in one sitting. There is no “Remember Me” option.
- Take the lesson in order preferably.
- Video playback control - You can rewind but you cannot forward the video.
- Answer the three questions correctly in the quiz. Otherwise, you will be asked to retake the quiz.
- Identify all 5 emails correctly in the Spot the Phish Mini Game for the lesson to be marked as completed.
Lessons Included
Click the drop-down arrow to learn more about the topic.
-
This lesson explains how cyber attackers are focusing on human risk to gain access to data and information by bypassing technology’s defenses. You are encouraged to build a strong cyber shield and use training to strengthen your cyber detection skills at work and at home.
-
Phishing is an email-based cyber-attack, often targeting many people at once. This lesson explains key methods cyber attackers use to get people to click on the bait in an email message. It also identifies the primary clues that each person can use to detect phishing, and how to safely check links in an email. Finally, the lesson reviews additional safe email behaviors.
-
You will be presented with 5 different emails and asked to identify which email is Safe or Risky. You must correctly identify each email for this lesson to be marked as completed. Good luck!
-
This lesson covers recommendations of strong passwords, the use of passphrases, the importance of layered security with two-step verification, and key password security behaviors that each person should employ to protect information.
-
This lesson describes ways to securely store or process sensitive information, to manage data retention, to follow data policies and processes, as well as to destroy data securely.
-
We hope this course has made you more confident defending yourself against today’s cyber attackers, both at work and for protecting your own personal digital footprint. While technology can help protect you, you are ultimately the best defense. Familiarize yourself with LMU's ITS policies and procedures and follow them at all times.