Training

Cybersecurity training may be required, but it doesn鈥檛 have to be a chore! The Security Matters team has curated this page with relevant, up鈥憈o鈥慸ate resources to help you protect your data. You鈥檒l also find answers to FAQs about cybersecurity training at UA, details on our different programs, and guidance for navigating our new training platform, KnowBe4. 
Cybersecurity Training @ UA

This Spring, UA transitioned its cybersecurity training from PageUp to KnowBe4. Why KnowBe4? We believe this platform will elevate the training experience both for the employee and their supervisor. Employees will get up-to-date and interesting material, and supervisors will be able to easily track their employees鈥 progress on the same platform.

In addition to the new platform, we are now offering two different options for completing required cybersecurity training: the Annual (Standard) Training Program, and the quarterly Advanced Security Awareness Training Program (ASAP).  Which one is right for you? 

Standard Training

  • Annual
  • Runs from September 1 - October 31
  • Single 20-minute module with broad focus
  • Quarterly simulated phishing tests




 

ASAP Training

  • Quarterly
  • Runs throughout the year
  • Four targeted 5-minute modules, with one released at the beginning of each quarter
  • Simulated phishing tests
  • Monthly newsletter (participation optional)
  • Those who read the newsletter are entered for a chance to win a prize in a monthly raffle

Ready to make the switch to ASAP? Use this to sign up today!

Navigating KnowBe4


If you're having trouble navigating the new platform, or if you just want a little tour before you dive in, you can check out these tutorials to make sure you're in the "know" when it comes to KnowBe4.

Topics of Interest


Looking for more information on a specific topic? KnowBe4 offers training and information on a wide range of cybersecurity issues. The trainings listed below have been selected by the Security Matters team to provide the most current information available, and we've kept them short to make them useful for quick reference. If you don't see the topic you're looking for,  reach out to ua-securityaware@alaska.edu for recommendations.

A strong password is your first line of defense against an attack. UA's Password and Authentication Standard now requires passwords to be at least 16 characters long but, just because it's long doesn't necessarily mean it's secure. Not sure if your password makes the grade? Check out these resources to find out what makes a password "pass" muster:

  • (video module) ~ 3 mins
  • (PDF) 1 pg

QR codes can be convenient, but did you know they can also be dangerous? Phishing attacks that use QR codes are known as "quishing". It may sound silly, but it's no laughing matter. It costs nothing for a bad actor to create a QR code and set up a fake website, but it could end up costing you everything. Not sure how to protect yourself? Watch this short video to learn how you can avoid becoming a victim. If you're curious about how it works, check out the demo to see quishing in action!

  • (video module) ~ 2 mins
  • (video module) ~ 5 mins

Generative Artificial Intelligence (GenAI) is a quickly developing technology with seemingly endless uses, but it has a dark side. Did you know that some AI programs collect the data you enter for their own use - without telling you? It's all in the fine print! And you're not the only one who thinks AI is useful... bad actors are using AI to craft more successful phishing attacks than ever! To learn more about AI and how to protect your data, visit our webpage on Generative Artificial Intelligence (GenAI) at UA and check out the resources below:

  • (video module) ~ 2 mins
  • (video module) ~ 3 mins
  • (PDF) 1 pg

Slow computer? Glitchy app? Maybe it's just an old computer or an app that needs an update. Or... maybe the real culprit is lurking silently in the background, spying on you from the shadows! Malware can be installed on your system without your knowledge, allowing cybercriminals to steal your login information, private documents, and more. And, once your account is compromised, others on your network may be at risk. Learn how to protect yourself and what steps to take if you鈥檙e infected (gross):

  • (video module) ~ 1 min
  • (PDF) 4 pgs

Think phishing emails are easy to spot thanks to misspellings and bad grammar? Think again. With the rise of GenAI, cybercriminals can now craft phishing messages that are more convincing than ever. In fact, as of March 2025, GenAI outperforms humans in creating effective phishing campaigns. UA has made reporting phishing attempts quicker and easier by adding KnowBe4's Phish Alert Button (PAB) Phish Alert Button to our email environments, but you have to recognize the threat before you can report it. Don't let attackers reel you in! Learn the latest phishing tactics and how to avoid getting caught in their net:

  • (video module) ~ 6 mins
  • (video module) ~ 5 mins
  • (PDF) 2 pgs

Ransomware is a type of malware that allows cybercriminals to encrypt a user's data and hold it hostage until their demands are met. Some variants harvest the data before encrypting it, giving the attackers the leverage to threaten public release if you don't pay up. It sounds like something from an action movie, but ransomware is all too real and becoming more common. Don't pay the price for careless downloading... Learn more about ransomware by watching the videos below, and don't forget to check out the malware tab for more info!

  • (video module) ~ 7 mins
  • (video module) ~ 1 min

Passwords are essential for securing your accounts, but they鈥檙e not always enough. Cybercriminals can steal login credentials through data breaches or crack weak passwords with brute-force attacks. Multi-Factor Authentication (MFA) adds an extra layer of protection, and UA uses Duo Security for this service (learn more on the and MFA webpages). You can make MFA even more secure by enabling Verified Push in ELMO鈥檚 security settings. This feature requires you to enter a code displayed on your screen into the Duo app on your phone, ensuring you approve only the logins you intend. Use the resources below to learn more about how MFA can protect your accounts!

  • (PDF) 1 pg
  • (PDF) 1 pg

Frequently Asked Questions