Redirection Notice This page should redirect to http://atlas.mit.edu/atlas/Main.action. |
Q: What is Securing the Human?
Answer
"Securing the Human" is a collection of 2-3 minute online training videos intended to give computer users a solid foundation in desktop, internet and data security. These videos have been packaged together by IS&T to form courses for targeted MIT staff.
Whether you are a basic computer user who wants to learn more about the risks of using a computer or you handle sensitive data on a regular basis as an IT administrator/staff member, these courses will provide you with a broad overview of the best practices to make your resources more secure.
Online Courses
Securing the Human courses are available for free through the online MIT Learning Center and can be accessed using an MIT certificate via the links below.
The Firefox browser is recommended for best viewing |
Log in to Securing the Human - Basic Security 1
The chapters in this module include: 1. You Are the Target, 2. Email & Messaging, 3. Browsing, 4. Mobile Devices, 5. Passwords.
The modules in Part 1 of "Basic Security: How to Protect" cover a range of topics for all employees, regardless of your understanding of computer technology or your working experience with sensitive data. It is recommended that all MIT employees take this course to learn the basics of the risks to the Institute. The topics covered include understanding the risks, email attacks, browser-based vulnerabilities, mobile devices, and passwords.
Log in to Securing the Human - Basic Security 2
The chapters in this module include: 1. Social Engineering, 2. Wi-fi Security, 3. Hacked, 4. Insider Threat, 5. Physical Security
The modules in Part 2 of "Basic Security: Know the Threats" cover all the ways your information can fall into the wrong hands. Topics include social engineering, a form of trickery employing web pages or emails, ways a computer can be hacked, insecure wireless networks, the insider threat and physical security.
Log in to Securing the Human - At Home and While Traveling
1. Working Remotely, 2. Protecting Your Personal Computer, 3. Protecting Your Home Network, 4. Protecting Your Kids Online, 5. Social Networking, 6. International Travel, 7. ITAR, 8. Senior Leadership
This course, "At Home and While Traveling," will help you learn how to protect your privacy on social networking web sites, be aware of the risks when working from home and using your home network, understand how to protect your kids when they are on-line, and keep data safe when you're traveling. Security awareness tips for senior management is also included.
Log in to Securing the Human - Data Privacy & Security
The chapters in this module include: 1. Privacy, 2. Sensitive Information, 3. Encryption, 4. Data Destruction 5. Data Retention 6. PII 7. Social Security Numbers
This course covers best practices for ensuring that the data you work with at MIT remains protected. Learn about encryption and why data should be encrypted, which types of data should be protected, which measures to use for protecting data, the importance of secure data destruction and limiting data retention, what information is considered sensitive and confidential, and steps you can take to protect specific information including Social Security numbers and other personal identifiable information.
Log in to Securing the Human - Data Compliance
The chapters in this module include: 1. Sensitive Information, 2. HIPAA, 3. PCI DSS, 4. FERPA, 5. Federal Tax Information, 6. Gramm Leach Bliley, 7. Red Flags Rule, 8. ITAR
This information security awareness course discusses regulations required by Federal or State laws regarding the protection of personal information that, if exposed, could lead to identity theft and fraud. Covered are HIPAA, PCI-DSS, FERPA, Federal Tax, GLBA, Red Flags and ITAR.
Log in to Securing the Human - IT Staff
The chapters in this module include: 1. Introduction, 2. Help Desk, 3. Advanced Persistent Threat, 4. The Cloud
IT staff have privileged access to critical systems. This course teaches IT staff why they are a primary target and how to protect themselves and the systems they have access to or responsibility for. Learn how to properly use personal and administrative accounts, limit the sharing of information, detect and protect against cyber threats, and understand the risks of storing/sharing data within cloud services.
Disclaimer: Policy pronouncements in the videos may not match MIT policy. Official business procedures as suggested in the videos may not match what exists at MIT. Check with your supervisor if you are unsure whether the policies or procedures provided in the videos are accurate regarding your role and responsibility at MIT. |