Skip to main content
Main content

Information Security Training FAQ

The cybersecurity of the University depends on you as a technology user—what you know and the decisions you make based on what you know. Decisions you make every day about email, passwords, and whom to trust—strengthen or weaken the cybersecurity of the University of Chicago. Your access to technology is one of many possible points of entry that a cybercriminal can take advantage of. A system-wide attack can be launched through your computer or account and give cybercriminals access for attacking the University’s networks and systems.

The University’s Information Security Training course is available through Workday and provides guidance to help you remain safe while using the internet and the University’s networks and systems. Security training strengthens your awareness, understanding, and improves your day-to-day decisions-making which can lessen your chances of falling victim to ransomware attacks, phishing scams, hacking, and the like. This ultimately better protects everyone at the University and decreases the chances of data loss, ransom for restored rights, or other breaches.

Frequently Asked Questions about Information Security Training

How much time is there to complete the Information Security Training course?
What can be expected from the Information Security Training course?
How long will it take me to complete the Information Security Training course?
How can a manager determine whether a staff member has completed the required Information Security Training course?
Who should I contact if I have any questions about the Information Security Training course?
I am having difficulties accessing the training. Who should I contact to help?
What if I require special accommodations?
I am a unit leader. How will I know who hasn’t completed the training?
How can I help my unit complete training?