Protecting University Accounts and Computers
Tutorial length: approx. 19 minutes, plus 10 question Knowledge Assessment
Please note: Do not use your browser's back button when in the tutorial to avoid restarting the tutorial. Please use the controls contained within the online training module.
The goal of this tutorial is to familiarize you with some of the most common methods used by hackers to compromise your account or computer.
When knowledgeable about these methods you are better armed to prevent your account or computer from being compromised and you are better prepared to respond should it happen.
Login below to begin the 'Protecting University Accounts and Computers' tutorial.
If you have questions or comments about this page please e-mail web maintenance