row of engaged students focus on lecturer

TRAINING TOOLKIT

UCr Gold Line

STUDENT-SPECIFIC TRAINING

 

GENERAL AWARENESS VIDEOS
 

 

 

New Student Account Set-Up

This video explains and demonstrates the steps new students will need to take once their UCR undergraduate application has been received for review.

 

 

Student Technology Overview

This video provides an overview of some of the technology solutions provided by ITS that are available to UCR students.

 

 

Using the UCR Self Service Laptop Checkout Kiosks

This video tutorial provides instruction on how to check out and return a device from the UCR self-service laptop checkout kiosks.

 

Student Access to Software

This video provides students with information on the various ways they can access the software needed to complete their coursework and how to access those resources.

 

 

UCr Gold Line

ITS APPLICATIONS + SYSTEMS

 

GENERAL AWARENESS VIDEOS
 

 

Introduction to UCR ITS

This video is used to introduce staff that are new to UCR to ITS and the services provided.

Introduction to ITS Job Aid
ITS Resources for Staff

 

 

ITS Website and Service Portal Introduction

This video provides an overview of the ITS Website and Service Portal

Using the ITS Service Portal Knowledge Article

 

Accessing ITS Self-help and Training Tools

This video provides an overview of ITS help resources including getting information about technical problems, using the ITS Knowledge Base, accessing ITS support and utilizing training resources. 

 

 

Reporting an IT Problem to ITS

This video provides an overview of how ITS processes problems reported by campus users. 

 

Microsoft Office 365 Introduction

New to MS Office 365? Watch our short introductory video to understand how to access Office 365 and the applications available to you.

 

 

UCR Multi-factor Authentication (MFA): Enrollment Tutorial

This video provides an overview of Multi-Factor authentication at UCR. 

 

 

UCr Gold Line

BUSINESS + CLASSROOM SOFTWARE

 

GUIDANCE DOCUMENTS
 

UCR Google Drive Guide

This guide provides basic information and access to resources that will help you get up and running on Google Drive (R'Docs).

UCR OneDrive Guide

This interactive guide provides an overview of OneDrive functionality including creating and sharing folders, uploading to OneDrive and how to synch OneDrive files with your computer or device.

UCR Microsoft Teams Guide

This interactive guide provides an overview of Microsoft Teams functionality including using chat and teams, creating teams and managing meetings using teams.

UCR SharePoint Guide

This interactive guide provides an overview of SharePoint, including using SharePoint pages, SharePoint Document Libraries, and editing and creating SharePoint pages.

UCR DocuSign Guide

This course provides an overview of DocuSign functionality including the signing and sending of documents, setting up documents for completion and signature and completing and signing received documents.

UCR Power BI Guide 

This course provides an overview of the Power BI Service and Desktop. It introduces you to the various elements of Power BI, as well as how to connect and work with data. The course will also provide you with the basics of building and publishing reports. 

 

UCr Gold Line

CYBERSECURITY

 

GENERAL AWARENESS VIDEOS
 

 

UCR Calls for Cyber Security Superheroes

October is Cyber Security Awareness Month. See what you can do to become a UCR Cyber Security Superhero!

 

 

Security Tips for Keeping Your Data Safe

This video provides information on some simple steps you can take to make sure your data is secure.

 

 

PhishAlarm Introduction

This video introduces PhishAlarm to the UCR campus by explaining what it is, how to use it and how to get additional information.

 

 

ITS Email Phishing Campaign Recap

This video provides a recap of the ongoing email phishing campaign run by ITS from May 2022 - July 2023.

 

 

PHISHING EMAIL EXAMPLE VIDEOS

The videos below provide examples of the types of phishing emails that are received across UCR. Each video highlights what to look out for when verifying whether or not an email is legitimate, where to get additional information and how to report suspicious emails.

Please feel free to share these videos.
 

 

Office 365 Lure

This video provides an example of a phishing email that appears to come from Microsoft. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.

 

 

Credential Compromise Lure

This video provides an example of a phishing email that is designed to trick the recipient into providing their login credentials. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.

 

 

File Sharing Email Lure

This video provides an example of a phishing email that appears to come from a file sharing service. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.

 

 

TurboTax Lure

This video provides an example of a phishing email that appears to come from TurboTax. It also provides some tips on what to look out for during tax season.

 

 

CDC Lure

This video provides an example of a phishing email that appears to provide information about a job opportunity. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.

 

 

Job Offer Lure

This video provides an example of a phishing email that appears to provide information about a job opportunity. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.

 

 

USPS Lure

This video provides an example of a phishing email that appears to come from the USPS. The video explains what to look out for in emails of this type and provides tips on how to prevent yourself from becoming a victim of one of these scams.

 

 

Gift Card Lure

This video provides an example of a phishing email that requests that the recipient buys gift cards on the behalf of another individual. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.

 

 

Google Chrome Lure

This video provides an example of a phishing email that appears to prompt the user to update Google Chrome. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.

 

 

Google Drive Lure

This video provides an example of a phishing email that appears to come from Google Drive. It provides an overview of what to look out for in emails of this type, how to report phishing emails and where to go for help and information.

 

 

DHL Lure

This video provides an example of a phishing email that appears to come from DHL. It provides an overview of what to look out for in emails of this type and where to go for help and information.

 

 

MS Voicenote Lure

This video provides an example of a phishing email that appears to come from Microsoft Voicenote. It provides an overview of what to look out for in emails of this type and where to go for help and information.

 

 

iTunes Lure

This video provides an example of a phishing email that appears to come from iTunes. It provides an overview of what to look out for in emails of this type and where to go for help and information.

 

 

Intuit Lure

This video provides an example of a phishing email that appears to come from Intuit. It provides an overview of what to look out for in emails of this type and where to go for help and information.

 

 

DHL Lure

This video provides an example of a phishing email that appears to come from DHL. It provides an overview of what to look out for in emails of this type and where to go for help and information.

 

 

Zoom Lure

This video provides an example of a phishing email that appears to come from Zoom. The video explains what to look out for in emails of this type and provides tips on what you should expect to see in legitimate emails.

 

 

2 Factor Authentication (Google Email)

This video provides an example of an email that appears to come from Google requiring the completion of a 2 factor authentication setup. The video explains what to lookout for in this type of email to prevent exposure to scams.

 

 

2 Factor Authentication (Outlook Email)

This video provides an example of an email that appears to come from Microsoft requiring the completion of a 2 factor authentication setup. The video explains what to lookout for in this type of email to prevent exposure to scams.

Need More Cybersecurity Information?

For more information on identifying phishing emails, check out of Tips for Spotting Phishing Emails guide.

To get more information and best practices for staying secure, visit our Cybersmart page.

 

 

UCr Gold Line

PROFESSIONAL DEVELOPMENT

As an active student or staff member you have complimentary access to LinkedIn Learning courses!

 

 

UCr Gold Line

PROJECT MANAGEMENT

 

GENERAL AWARENESS VIDEOS
 

 

ITS Project Creation and the Governance Process

This video provides an overview of the processes ITS adheres to in order to create and execute projects.

 

 

ITS Services Overview

This video provides an overview of ITS and the services provided.

 

UCr Gold Line

ADDITIONAL SELF-HELP RESOURCES

 

 

return to top

 

 

Let us help you with your search