Instructions for Security Training Administrators

Departmental and college IT support staff should request accounts for the unit(s) they support. The IT support staff member making the request will be considered the account admin and is the contact person for employees in their unit, even though the Office of Information Technology creates the accounts and assigns the required training modules.

Once you have submitted your security training request and been defined as an administrator for the University's online security training system, Securing the Human, you will receive a listing of the constituents in your group from Richard Burton in the Office of Information Technology. Please review the list and return it with any additions or subtractions, to Richard as quickly as possible.

Once the list is returned, you will be informed to communicate to your unit that training is being assigned to them and IT will set those people up with an account in the system, allocate seats and assign the required 19 training modules. We ask that you inform your unit that they have 30 days to complete training.

Staff should browse to and login using their Bronco NetID and password.

Required training modules

  • You are the shield
  • Social engineering
  • Email and messaging
  • Browsing
  • Social Networks
  • Mobile devices
  • Passwords
  • Encryption
  • Data security and data destruction
  • Working remotely
  • Protecting Your Personal Computer
  • Protecting Your Home Network
  • Protecting Your Kids Online
  • Hacked
  • PCI Dss
  • Ethics
  • Cloud
  • Data Retention
  • Federal personally indentifiable information

Summary Reports

You may keep up with the status of your members' training by running summary reports. 

  1. In the Reports section, select Summary Reports.
  2. Click Run Report.
  3. Click the numbers shown for further detail.

If you have any questions about the above procedures, or wish to request additional modules, please contact Nancy Kroes at (269) 387-5017.