Difference between revisions of "JHU IT Security"
Line 21: | Line 21: | ||
==JHU-Provided IT Security Online Courses== | ==JHU-Provided IT Security Online Courses== | ||
− | + | <span style="color:#ff0000">NOTE: The following courses are part of the JHU Learnshare system, and therefore, you '''must''' be on the [[VPN_-_JHU | JHU VPN]] in order to access these courses.</span> | |
+ | |||
+ | :[https://lms14.learnshare.com/dashboard/dash.home.aspx?Z=Cvz7rlERBiINCk3kFkMDWtWkTAGCTs%2fZPxff8PHH9jpE3NtAwUrdMyfZVOCTBf2m Course: JHU Electronic Information Security and Data Management] | ||
::A short online course discussing JHU's policies regarding the protection/storage/transfer of Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and other JHU IT Security policies. Well worth the 30 minutes allotted. | ::A short online course discussing JHU's policies regarding the protection/storage/transfer of Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and other JHU IT Security policies. Well worth the 30 minutes allotted. | ||
− | :[https://lms14.learnshare.com/dashboard/dash.home.aspx?Z=e1woSTzpuvT32v70VxOHbMM1EDfTfRjm9962YX%2bhg0o659ZEEY3yZoMjvB7%2bZRJO6qT4EPhRSmUyWu%2f8rO3s1KR8Id%2fnuKobtJkEkpYlCV4%3d Course: IT Security for End Users: IT Security Fundamentals] | + | :[https://lms14.learnshare.com/dashboard/dash.home.aspx?Z=e1woSTzpuvT32v70VxOHbMM1EDfTfRjm9962YX%2bhg0o659ZEEY3yZoMjvB7%2bZRJO6qT4EPhRSmUyWu%2f8rO3s1KR8Id%2fnuKobtJkEkpYlCV4%3d Course: IT Security for End Users: IT Security Fundamentals] |
:: Learn fundamental security concepts as an end user, including general security policies. Course should take less than an hour to complete. | :: Learn fundamental security concepts as an end user, including general security policies. Course should take less than an hour to complete. | ||
[[Category:Security]] | [[Category:Security]] |
Revision as of 21:07, 4 December 2020
JHU has an IT group that oversees computer security for the university. This page provides links to important resources relevant for maintaining a safe computing environment at JHU, including official policies and available online IT security courses
JHU IT's Website
- You can reach JHU IT by visiting: https://it.johnshopkins.edu
JHU IT Security Policies
- JHU has established various policies to ensure acceptable use and security of computing resources within the University. Please visit https://it.johnshopkins.edu/policies for a complete list of these policies. However, we will highlight a few that you should be familiar with.
General JHU IT Use and Security Policies
Protecting Sensitive Information
- Personally Identifiable Information (PII) includes birthdates, social security numbers, financial information, plus more.
- JHU has its own policies regarding protecting, storing, and transferring PII. Please visit: JHU's Personally Identifiable Information Policy
JHU-Provided IT Security Online Courses
NOTE: The following courses are part of the JHU Learnshare system, and therefore, you must be on the JHU VPN in order to access these courses.
- Course: JHU Electronic Information Security and Data Management
- A short online course discussing JHU's policies regarding the protection/storage/transfer of Personally Identifiable Information (PII), reporting related IT security issues, protecting yourself from email Phishing, and other JHU IT Security policies. Well worth the 30 minutes allotted.
- Course: IT Security for End Users: IT Security Fundamentals
- Learn fundamental security concepts as an end user, including general security policies. Course should take less than an hour to complete.