Skip to main content
Pepperdine | Community

Security Training

Overview

Pepperdine University has established the Information Security Office (ISO) to assist the community in keeping our data secure and helping to maintain trust in the University by safeguarding student data. The ISO security program includes a variety of training and tips to provide the Pepperdine University community with the best tools to keep you informed on how to keep your data safe and secure.

Conceptual illustration of a classroom atmosphere for an ISO training session.

Schedule an Information Security Training 

In addition to our University-wide training opportunities throughot the academic year, you can request a custom training directly from the Information Security Office. Just email iso@pepperdine.edu for information on training opportunities. 

Security Tips

Learn more about the vital aspects of defending against cyber attacks and how to keep your devices safe.

Cybersecurity

There are certain universal measures you can employ to ensure that you're working securely in the digital universe:

Remote Work

Working remotely means working securely. Here are some tips to keep you safe, wherever you plug in.

Data Classifications

A vital component of understanding information security relies on how we handle data. At Pepperdine University, data is classified into three categories: Public, Confidential, and RESTRICTED (see Information Classification and Protection Policy Schedules):

 

Public Information

This is information is allowed anywhere with no specific protections Examples: Email addresses, Campus Wide IDs, Course Catalog, Event notices.

 

Confidential Information

This information is permitted where protected by a Password Examples: Email messages, Business records, Educational records.

 

RESTRICTED Information

This information is ONLY permitted using University-approved encryption. Examples: Social security numbers, Credit card numbers, Health records.


Mobile Device Secure Computing

Your mobile is a fantastic tool for life and work, but it is extremely vulnerable to loss. Learn how to protect your device by adhering to these security priorities: