Cybersecurity Minimum for University Employees

A basic set of recommendations for campus safety.

Training provides a summary of fundamental security recommendations and measures. It is primarily intended for employees of Masaryk University and is currently available on a voluntary basis at selected MU workplaces (e.g., FI, FF, ESF) within the training agenda in the školení v IS MU. If you do not see the training in IS MU, please contact us at vzdelavani@csirt.muni.cz, and we will assist you. The content is divided into seven thematic blocks, covering key principles of cybersecurity. In addition to theoretical foundations, it includes practical recommendations and links to guidelines, allowing participants to significantly enhance their digital security in practice. The training was developed in accordance with the requirements of Act No. 181/2014 Coll., on Cybersecurity, and Directive No. 10/2017 on the Use of Information Technologies at MU.

No description

For whom: employees

Format: self-study

Language: CZ / EN

Duration: ~60 minutes

To the training

Course content

  • Secure passwords

    How to manage passwords correctly, why it's important to use different passwords for services, and how a password manager can help you.

  • Multi-factor authentication

    An introduction to MFA methods, their importance to account security, and recommendations on how to effectively protect access to critical services.

  • Device security

    Precautions to protect personal and work devices, including proper screen lock settings, software updates and tool usage.

  • Working with data

    Secure data storage and sharing rules, backup policies and encryption options to help protect sensitive information.

  • Safe communication

    Recommended methods of electronic communication, highlights the security of work emails and the risks associated with using unofficial channels.

  • Phishing

    Recognising fraudulent messages, the risks associated with clicking on unknown links and procedures for verifying the trustworthiness of emails.

  • Incident reporting

    Why it is important to proactively respond to suspicious activity, how to report a incident and where to seek help in the event of a cyber attack.

Frequently asked questions

Will I receive a certificate or certificate of attendance after completing the course?

We do not provide a certificate as the aim of the course is primarily to improve your skills in practice, not to provide a formal certificate.

Will there be materials or tutorials available for me to refer back to after the course?

Yes, all course materials and tutorials remain available so you can refer back to them at any time to review the information you need.

You are running an old browser version. We recommend updating your browser to its latest version.

More info