Skip to main content
The University of Iowa

IT Security & Policy Office

  • Home
    • ISPO Contact Information
  • Incidents
    • FAQ: Turning Off Network Ports
    • Report A Security Incident
    • Request for Change to Departmental NSC Information
    • Know your Responsibilities as an NSC
    • Digital Millennium Copyright Act (DMCA) of 1998
  • Services
    • Computer Data and Media Disposal Policy Training
    • Port Enable Form
    • Finding and Protecting Sensitive Data
    • Credit Card Handling (PCI-DSS) Standards Compliance
      • PCI Compliance FAQs
    • Security Awareness Course
    • UIOWA System Registry
    • Client Certificates
    • Web SSL Certificates
    • Firewall request
    • UI Anywhere
    • Vulnerability Scan Request
    • Penetration Testing
    • Security Consulting and Compliance
  • Resources
    • Core Security Standards
    • Awareness & Education
      • Presentation Resources
      • Multimedia
      • Security Awareness Materials
    • Faculty & Staff
      • Best Practices for Email Attachments
      • Check your security
      • Enteprise Information Security Program
      • Information Security in the Workplace
    • Everyone
      • Zoom Security and Privacy
      • Working Remotely
      • Defense in Depth Security Strategy
      • Best Practices for Instant Messaging
      • COPYING AND DISTRIBUTION OF COPYRIGHTED MATERIAL
      • Compliance
      • Copyright and the University of Iowa
      • Departmentally Managed Campus Computers: Your Responsibilities
      • End User Self-Managed Campus Computers: Your Responsibilities
      • File Sharing
      • Institutional Data Classification Guidelines
      • Protecting your Home Computer and your Privacy
      • ResNet Compromise
      • copyright-info
      • learnaboutsecurity
      • workstation
    • System Administrators and IT Managers
      • Disaster Recovery & Business Continuity Planning
  • University IT Policy
    • Policy Feedback
    • About University IT Policy
    • Best Practices
    • Enterprise IT Policy Process
    • HIPAA
      • FAQs
      • Policies
      • Forms
      • Training & Contact Info.
      • HIPAA-Docs
      • HIPAA Requirements
      • HIPAA Security Samples - Reference ONLY

You are here

  • Home
  • /
  • Resources
  • /
  • Awareness & Education

On-Line Security Tutorials

On-Line Security Tutorials


Faculty and Staff Online Tutorials

Responsible Computing

Acceptable Use of IT Resources
Working with Sensitive Information
Avoiding Malicious E-Mails
Identity Theft
Reporting Security Incidents
Telecommuting (Working Remotely)
Using Files@Iowa Network Storage

HawkID

Creating or Changing HawkID Passwords/Passphrases
Providing Password/Passphrase Hints
Resetting a Forgotten Password/Passphrase
Troubleshooting your HawkID
Sharing Accounts

Windows Security

Armouring your Windows Computer
Monitoring your Windows Computer
Protecting your Windows Computer

Macintosh Security

Armouring your Mac
Monitoring your Mac
Protecting your Mac


Responsible Computing for Students

Responsible Computing in ResNet
Acceptable Use of IT Resources
Netiquette
Backing up your data using Files@Iowa - Network Storage


Student Copyright Tutorials

What is Copyright?
Peer-to-Peer File-sharing
Creating Media

Contact

tel: 319-335-6332
email: it-security@uiowa.edu