Skip to content

Supervisors – Cybersecurity Learning Content

Overview

The following learning resources are provided to assist faculty, students, staff (including student employees) in identifying cybersecurity learning resources.  In addition to being grouped by Content Area or Role, each resource page has content from three sources:

  • Internally produced content - primarily identified as Cyber Talks delivered by GW cybersecurity staff
  • Third-party produced content - primarily from KnowBe4
  • LinkedIn provided content - primarily what is available to employees through Talent@GW

The page references two primary locations for content

  • myGW Group CyberSafe GW
    • Content will a "location" of myGW Group - CyberSafe GW describe content available through our myGW group that any GW account holder can access.  These item's titles will often link directly to the content for authenticated GW users.
  • Talent@GW
    • Items with a "Location" of Talent@GW will also require authentication and are currently limited to GW employees.  Please note that the best way to find these items is searching for them in Talent@GW using the title.  Also, these items maybe available in other LinkedIn subscriptions, so searching for them there may also provide access.

Finally, this page includes notes as to the length of the material, type/format, and suggested audiences that would find the information most relevant.



Cyber Talk Recording - Professional Development Plans and Cybersecurity Learning 5-15-25

Cyber Talk PowerPoint Presentation Only - Professional Development Plans and Cybersecurity Learning 5-15-25

  • Audience: GW Supervisors, Faculty, Staff (including student employees)
  • Location: myGW Group - CyberSafe GW
  • Duration: 45 minutes
  • Type: Cyber Talk Recording
    This Cyber Talk provides an overview of the Cybersecurity learning Guides. The session also reviews how the items in the guides can be used in professional and personal learning. A portion of the Cyber Talk also shows how to find Cybersecurity Learning Content in the guide on Talent@GW. Two slides speak to supervisors and the features in Talent@GW to find and assign training to direct reports.

Quick Guide - Searching and Selecting Cybersecurity Training on Talent@GW.pdf

  • Audience: Faculty, Staff (including student employees)
  • Location: myGW Group - CyberSafe GW
  • Duration: N/A
  • Type: Document (PDF)
    A guide for supervisors who wish to review training completion status in Talent@GW.

Unofficial Quick Guide - Talent@GW Reviewing Training Completion Status 1-2025.pdf

  • Audience: GW Supervisors
  • Location: myGW Group - CyberSafe GW
  • Duration: N/A
  • Type: Document (PDF)
    A guide for supervisors who wish to review training completion status in Talent@GW.

 

Al and Sensitive Info Don't Mix

  • Audience: Faculty, Students, Staff
  • Location: myGW Group - CyberSafe GW
  • Duration: 2 minutes
  • Type: Video
    </p> <p>As artificial intelligence (AI) becomes increasingly integrated into our daily lives, the potential risks to sensitive information such as personal data, financial details, and confidential communication are heightening. This module explores the critical importance of protecting sensitive information from AI systems and provides practical guidance on mitigating these risks.</p> <p>

Data Protection

  • Audience: Faculty, Students, Staff
  • Location: myGW Group - CyberSafe GW
  • Duration: 2 minutes
  • Type: Video
  • Description:

Coming Soon


Cybersecurity Awareness: Protect Your Privacy

  • Audience: Faculty / Staff (including student employees)
  • Location: Talent@GW
  • Duration: 1 hour 26 minutes
  • Type: Online Class
    Privacy is an often-overlooked aspect of cybersecurity, but it is a critical piece of your defense to make it harder for bad actors to harm you. In this course, Tate Jarrow teaches the importance of your personal information in your cybersecurity defense, showing you techniques to make it harder for bad ia platforms and tools and the potential consequences of each

Risks of Social Media Sharing

  • Audience: Faculty, Staff (including student employees)
  • Location: Talent@GW
  • Duration: 27 minutes
  • Type: Training Module
    Privacy is an often-overlooked aspect of cybersecurity, but it is a critical piece of your defense to make it harder for bad actors to harm you. In this course, Tate Jarrow teaches the importance of your personal information in your cybersecurity defense, showing you techniques to make it harder for bad ia platforms and tools and the potential consequences of each

Cybersecurity Awareness: Social Engineering

  • Audience: Faculty, Staff (including student employees)
  • Location: Talent@GW
  • Duration: 55 minutes
  • Type: Training Module
    Social engineering is one of the most dangerous forms of hacking because it preys on human nature. Learn how to defend your organization from social engineering by recognizing and thwarting the most common types of attacks. This course provides security teams and professionals with information on common social engineering techniques and safeguards. Instructor Stephanie Ihezukwu—a security analyst and engineer—describes how phishing, vishing, baiting, and physical activities like tailgating all provide entry to bad actors, and explains how training can be the most effective tool to combat these attacks. She also explains how to create policies and procedures; set up controls around passwords, email, and software updates; and conduct tests to see how effective your defenses truly are.

Cybersecurity Foundations: Governance, Risk, and Compliance (GRC)

  • Audience: IT Supervisors and Staff (including student employees)
  • Location: Talent@GW
  • Duration:  1 hour 56 minutes
  • Type: Online Class
    In an increasingly complex regulatory landscape, organizations must build strong Governance, Risk, and Compliance (GRC) programs to protect their assets and ensure long-term success. In this course, cybersecurity expert AJ Yawn provides a comprehensive overview of GRC principles, frameworks, and tools, helping you understand how to align cybersecurity and compliance initiatives with business goals. Learn how to build and scale a GRC program like a product, incorporating key frameworks such as ISO 27001, SOC 2, and ISO 27701 for privacy. Build your understanding of the growing importance of AI governance and gain practical insights into managing AI-related risks and adapting to emerging regulations like the ISO AI certification and NIST AI Risk Management Framework. Whether you’re a cybersecurity professional, risk manager, or business leader, this course will equip you with the skills to implement modern, scalable GRC programs that are ready for the future.

Cybersecurity Maturity Model Certification (CMMC 2.0)

  • Audience: Faculty / Staff (including student employees)
    • Primary Audience - Researchers and support staff working with CUI data
  • Location: Talent@GW
  • Duration:  1 hour 41 minutes
  • Type: Online Class
    The Cybersecurity Maturity Model Certification (CMMC) is an assessment framework enacted by the United States Department of Defense in 2020. It is an assessor certification program designed to increase the trust in measures of compliance to a variety of standards. Any individual or team of individuals who will be responsible for ensuring that prope…

Cyber Talk Recording - Supervisor Training Talent@GW 2-20-2025

  • Audience: GW Supervisors, Faculty, Staff (including student employees)
  • Location: myGW Group - CyberSafe GW
  • Duration: 45 minutes
  • Type: Cyber Talk Recording
    Cyber Talk recording that was delivered to supervisors and staff on accessing Taleent@Gw content.  Supervisors are shown how to assign training to staff, but the majority of the session focuses on finding and accessing training housed in Talent@GW.

unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and  Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu