Training & Resources

    Ìý

    Information Security Training for Employees

    ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û Cybersecurity & NetworkingÌýoffers Information Security Training for new and existing employees.Ìý

    for more information or to schedule employee training. Training can be customized for your departmental needs on a variety of information and computer security topics.

      ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û Cybersecurity Awareness TrainingÌý

      Cybersecurity Governance, Risk, & Compliance is excited to offer a Data Security Fundamentals course available to all ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û Faculty, Staff, and Students via the Get Inclusive LMS platform. The course takes approximately 20 minutes to complete.

      We hope this training will help individuals better understand their role as front-line defenders, and the part we all play in protecting the ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û community and information from cyber threats.Ìý

      Additional Training

      • ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û offers Gramm Leach Bliley Act (GLBA) Training throughÌý. To request GLBA training, contactÌýcybersecurity.grc@usnh.edu.ÌýGLBA is a federal law that requires financial institutions to develop, implement, and maintain administrative, technical, and physical safeguards to protect the security, integrity, and confidentiality of customer information.
      • Additional Training is provided by United Educators (UE) - you can register for an account using your ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û emailÌýor login with an existing account .ÌýUE offers a wide variety of training, and a list of available training can be found in UE Learning Programs Overview.
      • To request The Family Educational Rights and Privacy Act (FERPA), or Red Flags: Preventing Identity Theft training, please contact Cybersecurity GRC atÌýcybersecurity.grc@usnh.edu.

      Information Security Resources for Employees

      Information Security Resources for Students

      This DoD Controlled Unclassified Information (CUI) TrainingÌýprovides information on the training requirements for accessing, marking, safeguarding, decontrolling and destroying CUI along with the procedures for identifying and reporting security incidents.

      ×î¿ì¿ª½±Ö±²¥½ÁÖé½á¹û's Phishing Awareness Program

      Disaster Recovery Information

      ÌýInformation Security Resources