Required Information Security Awareness Training
To: All UT System Administration employees
From: Barry Moody, Information Security Officer for System Administration
Date: December 12, 2012
Subject: Required IT Security Training - Due March 31, 2013
State law requires all institutions of higher education to provide an ongoing information security awareness education program for all staff and faculty. Additionally, the University of Texas System Information Security policy establishes that all UT institutions will deliver security awareness general compliance training to all IT resource users at least annually.
This year the Office of Systemwide Information Security Compliance has acquired rights to an extensive library of online training materials called “Securing the Human”. This training is provided to you not only to comply with policy, but also as a tool to arm yourself with knowledge for your professional and personal lives. The training content covers a very broad range of topics and is not designed to be taken all at once. Please note: You are not required to review all of the content in this training module. Below is the list of topics available to you: The modules in Bold Type are all required for completion in addition to taking optional courses. Please start with the introduction module.
Please use the main Avatar login page to access your training here: https://utsystem.avatarlms.com/login.html
Table of Contents
- Advance Persistent Threat
- Criminal Justice
- Data Destruction
- Data Protection
- Data Retention
- Email and IM
- Federal Tax Information
- Gramm Leach Bliley Act - EDU
- Gramm Leach Bliley Act - FIN
- Help Desk
- Insider Threat
- International Traffic in Arms Regulations
- IT Staff
- Mobile Devices
- PCI DSS
- Physical Security
- Protecting your computer
- Protecting your home network
- Protecting your kids online
- Red Flags Rule
- Senior Management
- Social Engineering
- Social Networking
- Social Security Numbers
- Telecommuting Working away from home
- Wi Fi Security
- You Are The Target
You may want to begin by reviewing the topics that most interest you. This is a resource that you can come back to as many times as you desire, even past the target completion date. The target for completion of the required modules is March 31, 2013.
You will be automatically registered for this training. Once your registration is complete you will receive a Confirmation of Avatar PDMS Registration email from email@example.com with further instructions on how to log into the training module. Here is a link to the Avatar LMS system in case you lose the email from firstname.lastname@example.org: https://utsystem.avatarlms.com/login.html. After you are logged in to the training module you can select from a list of training topics to enter a brief online presentation followed by a short quiz. Please keep this email for future reference. I will be following up at the end of the target completion date with a training completion survey.
I am happy to answer any questions you may have about the training. Please contact Barry Moody for any questions relating to the training content. If you experience problems getting logged in or have problems with the Avatar learning management system used to deliver the training please send an email to ESC@utsystem.edu and someone from the Office of Employee Services will assist you. I hope you will find the training interesting and valuable.
Thank you for your efforts to ensure the security of UT System Administration information resources.
UT System Information Resources Use and Security Policy
System Administration Information Resources Acceptable Use and Security Policy
Information Resources Security Operations Manual