Cyber Security Training
Please review each of the following training modules. When you have completed all of the required activities, complete the form at the bottom of the page.
Module 1: Phishing
Module 2: Multi-Factor Authentication
-
Video : Intro to Multi-Factor Authentication
-
Link: Why you should use a hardware security key
-
Video: Setting up a Yubikey with Google
-
Using a Yubikey with an iOS device
Module 3: Encrypting computers.
-
Video: Encrypting your Windows device
-
Link: Encrypting your Mac