Skip to McMaster Navigation Skip to Site Navigation Skip to main content
McMaster logo

Office of the AVP & CTO

INFORMATION TECHNOLOGY SECURITY

Information Security Training Program

Message from McMaster’s Director of Information Security Services

Information Box Group

How to enroll

  1. Log in to Avenue to Learn 
  2. Click on “Discover” on the top navigation bar 
  3. Select “McMaster Information Security Training” and Enroll. 
  4. The course will be available from your Avenue to Learn homepage  

Why take the module?

  • Protect sensitive data: Learn to safeguard personal and organizational information from cyber threats.
  • Prevent financial loss: Understand how to avoid costly breaches and cyber-attacks.
  • Stay updated: Keep up with the latest cybersecurity trends and threats.
  • Enhance career prospects: Gain valuable skills that are in high demand.
  • Compliance: Ensure adherence to legal and regulatory requirements.

FAQs

No. However, all students, staff and faculty are encouraged to complete the “Introduction to Information Security” content and assessment. Additionally, some research roles may be required to participate in information security training.

Students can print their assessment scores for personal records. UTS can provide a record of completion for researchers upon request when Information Security Training is required for research grants or partnerships. Future online Information Security courses offering certificates will be linked from this course.

You can view your results and retake the assessment as many times as you like. Individual results are not shared without your consent. Results are used to enhance training and maintain an overview of security awareness at McMaster.

The module typically takes about one hour to complete.

  • The course covers:
    • Essential cyber security resources at McMaster
    • Phishing awareness
    • Password and MFA (Multi-Factor Authentication) guidance
    • Tips for securing laptops, phones, computers, and firewalls
    • Wi-Fi security advice
    • An overview of McMaster’s information security incident response.
  • Additional content is available for researchers, research support, and aspiring researchers, focusing on research data management, publishing, data storage, and more. This content is developed by Research Data Management (RDM) Services staff and is available through on the RDM website and the Digital Commons Research Pilot (DRCP).

This course will help you:

  • Prevent online scams
  • Improve ability to recognize and respond to new threats, like email phishing and smishing (SMS phishing)
  • Enhance understanding of personal data protection and privacy.