Awareness, Training, and Education

Professional Associations
Many trade, industry, and governmental associations and agencies provide training and guidance. See IT Security & Privacy Professional Associations.

We all have a role to play in protecting U-M's data and the systems that store and handle it. To support that role, we need to educate ourselves and others as outlined in Information Assurance Awareness, Training, and Education (DS-16).

  • Faculty, staff, and students. Take advantage of the resources here on the Safe Computing website and elsewhere to help you learn to protect yourself and the university from cyber threats.
  • U-M units. Require training as appropriate for users of your unit systems and services that store or process sensitive university data.

Resources to Share

  • Be Aware of the most common IT security threats.
  • Digital Signs—IT Security (U-M login required). Digital sign versions of IA security posters are available to the U-M community in a Box at U-M folder.
  • Events related to cybersecurity and privacy sponsored by IA and others.
  • IA Publications to keep you informed about IT security and privacy at U-M.
  • IT Security Posters & Brochures. Post and distribute these to help educate your colleagues, friends, and others about key security issues. 
  • Protect Yourself by securing your devices, managing your passwords, and traveling safely with technology.
  • Safe Computing section of Michigan IT News. Includes tip articles with recommendations for rotecting your devices, recognizing phishing, traveling with technology, and more.

U-M Cybersecurity Basic Training

  • Look Before You Click. Beware of Phishing! (in My LINC) Learn about the practice of phishing, including spear phishing. Recognize clues that reveal phishing emails, inspect links in suspicious emails, identify what to do if you are not sure about an email, and take corrective steps if you take the bait.
  • Don't Fall for Phish! Test your phish detection skills in this U-M online training. You will review email messages and decide which are phishing scams and which are legitimate messages. You'll also get to review the clues that indicate phishiness.
  • Anti-Phishing Education: Simulated Phishing. IA provides consultation, reviews, and approvals for units interested in doing simulated phishing for educational purposes.
  • Using Your Devices Securely with U-M Data. Learn how to set up your device and manage U-M data at home and abroad.
  • Copyright Compliance Quiz. Test your knowledge of what you can and cannot share from your computer and mobile devices.

Data Protection Training

The online training courses below are available to any interested faculty member, staff member, or student at no charge. Some individuals may be required to take them based on the work they do at the university. To have any of these courses required of and assigned to those in your unit, contact info-assurance@umich.edu.

Specialized Cybersecurity Training


Applicable University Policies

You are responsible for complying with the policies and standards below. The requirements on this page help you meet that responsibility.