Training

"Securing the Human" courses are available for free through the online MIT Learning Center and can be accessed using an MIT certificate via the links below.

Each topic is a 2-3 minute video intended to give computer users a solid foundation in desktop, internet and data security. These videos have been packaged together by IS&T to form courses for targeted MIT staff. There is a quiz at the end of each topic to help students to retain what they learned.

Whether you are a basic computer user who wants to learn more about the risks of using a computer or you handle sensitive data on a regular basis as an IT administrator/staff member, these courses will provide you with a broad overview of the best practices to make your resources more secure.

If You Are... You Handle This Type of Data You Should Take this Course Topics Covered
IT Consumer, Student, Staff, Faculty Public Data

Basic Security I and

Basic Security II

  • Course I:
    1. You Are the Target
    2. Email & Messaging
    3. Browsing
    4. Mobile Devices
    5. Passwords
  • Course II:
    1. Social Engineering
    2. Wi-fi Security
    3. Hacked
    4. Insider Threat
    5. Physical Security
Staff and Faculty who work from home or travel, Parents, Students
  • Confidential data (e.g., contractual licensed)
  • Regulated data (e.g., FERPA, PCI, HIPAA)
  • ITAR data (e.g. could cause physical harm)
Security At Home and While Traveling
  1. Working Remotely
  2. Protecting Your Personal Computer
  3. Protecting Your Home Network
  4. Protecting Your Kids Online
  5. Social Networking
  6. International Travel
  7. ITAR
  8. Senior Leadership
Staff and Faculty who work with any type of sensitive data
  • Confidential data (e.g., contractual licensed)
  • Regulated data (e.g., FERPA, PCI, HIPAA)
Data Privacy and Security
  1. Privacy
  2. Sensitive Information
  3. Encryption
  4. Data Destruction
  5. Data Retention
  6. PII
  7. Social Security Numbers
Faculty and Staff who work with regulated data (PII), including: employee data, medical data, credit card data, student data, financial data, research data
  • Confidential data (e.g., contractual licensed)
  • Regulated data (e.g., FERPA, PCI, HIPAA)
  • ITAR data (e.g. could cause physical harm)
Data Compliance
  1. Sensitive Information
  2. HIPAA
  3. PCI DSS
  4. FERPA
  5. Federal Tax Information
  6. Gramm Leach Bliley
  7. Red Flags Rule,
  8. ITAR
IT Partner, IT Support Staff, Manager of IT areas
  • Public Data
  • Confidential data (e.g., contractual licensed)
IT Staff
  1. Introduction
  2. Help Desk
  3. Advanced Persistent Threat
  4. The Cloud