Contents
- Overview
- Privileged User Security Series: Privileged Access
- Ethics in Cybersecurity
- Privileged User Security Series: Secure Cloud Administration
- Privileged User Security Series: Secure Windows Administration
- Privileged User Security Series: Secure Linux Administration
- Privileged User Security Series: Secure Database Administration
Overview
The following learning resources are provided to assist faculty, students, staff (including student employees) in identifying cybersecurity learning resources. In addition to being grouped by Content Area or Role, each resource page has content from three sources:
- Internally produced content - primarily identified as Cyber Talks delivered by GW cybersecurity staff
- Third-party produced content - primarily from KnowBe4
- LinkedIn provided content - primarily what is available to employees through Talent@GW
The page references two primary locations for content
- myGW Group CyberSafe GW
- Content will a "location" of myGW Group - CyberSafe GW describe content available through our myGW group that any GW account holder can access. These item's titles will often link directly to the content for authenticated GW users.
- Talent@GW
- Items with a "Location" of Talent@GW will also require authentication and are currently limited to GW employees. Please note that the best way to find these items is searching for them in Talent@GW using the title. Also, these items maybe available in other LinkedIn subscriptions, so searching for them there may also provide access.
Finally, this page includes notes as to the length of the material, type/format, and suggested audiences that would find the information most relevant.
Privileged User Security Series: Privileged Access
- Audience: IT Supervisors and Staff (including student wage)
- Location: Talent@GW
- Duration: 8 minutes
- Type: Video Training
- Description: An introduction to the importance of privileged user access in today’s environment.
Ethics in Cybersecurity
- Audience: IT Supervisors and Staff (including student wage)
- Location: Talent@GW
- Duration: 55 minutes
- Type: Online Class
Description (click to toggle details)Cybersecurity professionals frequently find themselves at the center of moral and ethical debates about what they do and how they go about doing it. This course can help cybersecurity professionals better understand the ethics of working in cybersecurity, the expectations that various stakeholders are likely to have, and the challenging conversations that are needed regarding those ethics. Instructor Jerod Brennen digs into several situations that you may face in your career. Jerod covers situations you may face in the workplace, such as handling sensitive information, hacking back, reporting an ethical violation, and more. Next, he goes into situations tied to research, including responsible disclosure, hacktivism, and social engineering. Jerod discusses the global impact of cybersecurity ethics and the cybersecurity workforce, then finishes up with practical guidance on putting ethics into practice.
Privileged User Security Series: Secure Cloud Administration
- Audience: IT Supervisors and Staff (including student wage)
- Location: Talent@GW
- Duration: 20 minutes
- Type: Video Training
Description (click to toggle details)This module covers important aspects of administering cloud privileges from a non-vendor-specific point of view. Focus is given to some of the major threat vectors that exist when using cloud services and actions an administrator can take to reduce the magnitude of those threats for their organization.
Privileged User Security Series: Secure Windows Administration
- Audience: IT Supervisors and Staff (including student wage)
- Location: Talent@GW
- Duration: 15 minutes
- Type: Video Training
Description (click to toggle details)As a privileged Windows account user, you are likely to have elevated access and control critical resources. If attackers get your credentials, they can do the same things that you can do. This module covers a few important security aspects of Microsoft Windows that will help you do a better job managing the privileges you’ve been granted and help you avoid mistakes that could endanger your organization.
Privileged User Security Series: Secure Linux Administration
- Audience: IT Supervisors and Staff (including student wage)
- Location: Talent@GW
- Duration: 15 minutes
- Type: Video Training
Description (click to toggle details)This course covers several important Linux security aspects, including login security, file permissions, why you should never “run as root,” why and how to watch your command history and other best practice tips. This course is designed to give you a basic overview of Linux security which can be a very complex and advanced topic. It is intended for newer Linux admins or those interested in getting started with Linux administration.
Privileged User Security Series: Secure Database Administration
- Audience: IT Supervisors and Staff (including student wage)
- Location:
- Duration: ## minutes
- Type: Video Training
Coming Soon
This content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.
IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu
