Skip to Main Content
A-Z Index Calendar Campus Maps CU Safety Phonebook Webcams
  Services  Support  About Security shield icon   Cybersecurity  Research
Cybersecurity
  • About
  • Awareness & Training
    • Online Training
    • On-Site Training
    • Training Videos
  • Cybersecurity Alerts
  • How To
    • Anti-Virus Software
    • Avoid Text Scams
    • Box Secure Folders
    • Box Storage Guidelines
    • Computer Backups
    • Consulting
    • Deleting Data
    • Duo Authentication
    • Email Encryption
    • Email Phishing Incident
    • Endpoint Security
    • Lost / Stolen Device
    • Protect Yourself
    • Public Wi-Fi
    • Risk Management
    • SecurePoint Storage
    • Secure Your Devices
    • Security Guidelines
    • Security Incident
    • Secure Virtual Desktop
    • Traveling Internationally
    • Usernames & Passwords
    • Working Remotely
  • IT Policy & Procedures
    • Accounts & Passwords
    • Awareness Training
    • Auth & Responsibility
    • Backups
    • CCIT Disk Encryption
    • Change Mgt Policy
    • Communication Access
    • Copyright Infringement
    • Data Center Access
    • Data Classification
    • Encryption Guidelines
    • File Space Provisions
    • File Storage Options
    • Investigation Assistance
    • IT Resources: Employee
    • IT Resources: Student
    • IT Vendor Management
    • Maintenance Windows
    • Network Security
    • Patching Guidelines
    • Print Quotas
    • Security Standards
    • Server Administration
    • Strong Passwords
    • Usernames & Passwords
    • Voice Over IP (VOIP)
  • Operations Center
  • News from CCIT
Home Cybersecurity Awareness & Training Training Videos

”TigerTraining Videos

 

Gift Card Scam Email Spam vs Phishing
Cybersecurity Awareness Training Working Remotely
Email Phishing – Mobile Email Phishing – Desktop
What is Phishing Using Public Wi-Fi
Keep Software Updated Protecting and Handling Data
Ransomware Malware
General Security Tips Two Factor Authentication

Gift Card Scam

Back to Top of Page


Email Spam vs Phishing

Back to Top of Page


Working Remotely

Back to Top of Page


CyberSecurity Awareness Training

Back to Top of Page


Email Phishing – Desktop

Back to Top of Page


Email Phishing – Mobile

Back to Top of Page


Using Public Wi-Fi

Back to Top of Page


What is Phishing

Back to Top of Page


Protecting and Handling Data

Back to Top of Page


Keep Software Updated

Back to Top of Page


Malware

Back to Top of Page


Ransomware

Back to Top of Page


Two Factor Authentication

Back to Top of Page


General Security Tips

Back to Top of Page


Report Security Incident    
Quick Links

Cybersecurity Alerts

Duo: Authentication

Working Remotely

Protect Yourself

Securing Your Device

User Names & Passwords

Copyright © 2022 Clemson University, Clemson, SC. All Rights Reserved. Website Technical Contact: Clemson Computing & Information Technology