UITS Security Course Table of Contents

Course progress

  1. Course introduction
    1. Welcome
    2. Course details
  2. Authentication
    1. Introduction
    2. Knowledge check
    3. Authenticating with a username and passphrase
    4. Using multi-factor authentication
    5. Never share your personal IU credentials
    6. Login only at legitimate IU services
    7. Quiz
    8. Wrapping up
  3. Phishing
    1. Introduction
    2. Knowledge check
    3. What is phishing?
    4. Recognize
    5. Rethink
    6. Report
    7. Quiz
    8. Wrapping up
  4. Passphrase and secret management
    1. Introduction
    2. Knowledge check
    3. What is a secret, password, and passphrase?
    4. IU password complexity requirements
    5. Best practices for securing secrets and passphrases
    6. Common shared access situations at IU
    7. Quiz
    8. Wrapping up
  1. Network security
    1. Introduction
    2. Knowledge check
    3. Using IU's network
    4. Working remotely for IU
    5. Quiz
    6. Wrapping up
  2. Data storage and use
    1. Introduction
    2. Knowledge check
    3. IU data classifications
    4. Data storage at IU
    5. Data access considerations
    6. Quiz
    7. Wrapping up
  3. Incident reporting and recovery
    1. Introduction
    2. Knowledge check
    3. Reporting a suspected IT incident
    4. Reporting lost devices or data
    5. University security policy resources
    6. Quiz
    7. Wrapping up
  4. Wrapping up
    1. End of course