www.cmich.edu
Open in
urlscan Pro
2620:1ec:46::63
Public Scan
URL:
https://www.cmich.edu/academics/colleges/college-business-administration/centers-institutes/cybersecurity/resources
Submission: On December 10 via api from US — Scanned from DE
Submission: On December 10 via api from US — Scanned from DE
Form analysis
3 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="suchen" aria-label="suchen" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/de/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Suchfeldeingaben löschen" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>suchen</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="Ergebnisse löschen"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="suchen" aria-label="suchen" id="gsc-i-id2" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/de/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Suchfeldeingaben löschen" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>suchen</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="Ergebnisse löschen"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id3">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id52" class="gstl_52 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti52" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="suchen" aria-label="suchen" id="gsc-i-id3" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/de/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st52" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Suchfeldeingaben löschen" role="button" style="display: none;"><span class="gscb_a" id="gs_cb52" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>suchen</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="Ergebnisse löschen"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
This site uses cookies to improve your experience. Learn more in our Privacy Policy. OK Skip to main content * Apply * Request Info * Visit * Give * Alumni * News * Events sign in × suchen * About * Academics * Admissions and Aid * Research * Student Life * Athletics SEARCH × suchen Apply Request Info Visit Give Alumni News Events Top Searches Academic Calendar Campus Map Careers at CMU CMU Bookstore Commencement Find a Program My Account Scholarships and Financial Aid Tuition and Fees University Library Departments A-Z Back to CMU Home Search × suchen * About * Programs * Departments * Centers & Institutes * Student Resources Apply Request Info Visit Give Alumni News Events Back to Main Menu Home About Programs Departments Centers & Institutes Student Resources College of Business Administration Menu In This Section * AACSB Accreditation * Campus and Facilities * College of Business Administration Dean's Office Staff * College of Business Administration Dean's Welcome * College of Business Administration Strategic Plan * Events * Assurance of Learning * Faculty and Staff Resources Related Links * Alumni and Friends * CBA Creative Services * Scholarships for College of Business Administration Students In This Section Related Links In This Section * Business Information Systems Department * Economics * Entrepreneurship * Finance and Law * Management * Marketing, Hospitality, and Logistics * School of Accounting Related Links * CBA Creative Services * Scholarships for College of Business Administration Students In This Section * Cybersecurity * Isabella Bank Institute for Entrepreneurship * Lean Six Sigma * Michigan Finance Scholars * SAP University Alliance * The HUB Related Links * CBA Creative Services * Scholarships for College of Business Administration Students In This Section * Business Programs * Business Student Organizations * Scholarships for College of Business Administration Students * Student Services and Advising Related Links * Alumni and Friends * CBA Creative Services In This Section Related Links 1. Home 2. ... 3. Academics 4. Colleges 5. College of Business Administration 6. Centers and Institutes 7. Cybersecurity 8. Cybersecurity Resources IN THIS SECTION * Cybersecurity Resources View All Contact Dr. Susan Helser helse1s@cmich.edu 989-774-3853. CYBERSECURITY RESOURCES CENTRAL MICHIGAN UNIVERSITY * Information Security OIT's Office of Information Security and Chief Information Security Officer (CISO) provides information security leadership, guidance, activities, and awareness to protect the confidentiality, integrity, and availability of the University's data, systems, and users. * Phishing Awareness "Phishing" refers to a scammer attempting to trick someone, most commonly over email, to reveal his or her password or personal information. Learn how CMU is protecting its students, faculty, and staff from phishing attempts. U.S. GOVERNMENT * Cybersecurity and Infrastructure Security Agency (CISA) The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future * Department of Homeland Securit (DHS) The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. * Federal Bureau of Investigations (FBI) The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. * Federal Deposit Insurance Corporation (FDIC) The Federal Deposit Insurance Corporation (FDIC) is an independent agency created by Congress to maintain stability and public confidence in the nation's financial system. * Federal Trade Commission (FTC) The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil U.S. antitrust law and the promotion of consumer protection. * Government Accountability Office (GAO) The U.S. Government Accountability Office (GAO) is a legislative branch government agency that provides auditing, evaluation, and investigative services for the United States Congress. It is the supreme audit institution of the federal government of the United States. * Department of Health & Human Services The United States Department of Health and Human Services, also known as the HHS, is a cabinet-level executive branch department of the U.S. federal government created to protect the health of all Americans and providing essential human services. * State of Michigan * National Institute of Standards and Technology (NIST) The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce. Its mission is to promote innovation and industrial competitiveness. * National Security Agency (NSA) National Security Agency (NSA), U.S. intelligence agency within the Department of Defense that is responsible for cryptographic and communications intelligence and security. * Department of Agriculture The U.S. Department of Agriculture is the federal executive department responsible for developing and executing federal laws related to farming, forestry, rural economic development, and food. ORGANIZATIONS * CAE in Cybersecurity Community The CAE in Cybersecurity Community partners with industry to ensure that students entering the next generation cyber workforce have the necessary knowledge, skills, and abilities for a successful career in cyber. * The Colloquium (CISSE) For over twenty years, the Colloquium for Information Systems Security Education (CISSE) has been the sole forum in which the members of the academic field of cybersecurity have gathered to present and discuss new ideas. * The Computer Technology Industry Association (CompTIA) The Computing Technology Industry Association (CompTIA) is a leading voice and advocate for the $5 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage and safeguard the technology that powers the world’s economy. * Center for Cyber Safety and Education The Center for Cyber Safety and Education (Center) is a non-profit charitable trust committed to making the cyber world a safer place for everyone. * Michigan Collegiate Cyber Defense Network (CCDN) A group of network engineers, security experts and educators that work together to improve cyber defense education in the state of Michigan. The Michigan CCDN designs, organizes, conducts, assess and evaluates collegiate cyber defense teams in qualifiers, competitions and other events. * National Cybersecurity Training & Education (NCyTE) The National Cybersecurity Training & Education (NCyTE) Center advances cybersecurity education in the U.S. by investing in technological innovation, resources, professional development and tools to support faculty, community colleges and the workforce pipeline of tomorrow. * Anti-Phishing Working Group (APWG) The Anti-Phishing Working Group is an international consortium that brings together businesses affected by phishing attacks, security products and services companies, law enforcement agencies, government agencies, trade associations, regional international treaty organizations and communications companies. * Phishing.org Phishing.org is a resource for IT professionals and their users to keep informed about the latest phishing threats and how to avoid becoming a victim. * DEF CON The largest hacking and security conference with presentations, workshops, contests, villages and the premier Capture The Flag Contest. * Women in Cybersecurity (WiCyS) WiCyS is a global community of women, male allies and advocates, who are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. * Cyber Seek CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market. * ISACA ISACA helps enterprises thrive with performance improvement solutions and customizable IS/IT training that enable organizations to evaluate, perform, and achieve transformative outcomes and business success. NEWS & MEDIA * CISO Magazine CISO MAG is a widely read & referred cybersecurity magazine and news publication for latest Information Security trends, analysis, webinars, podcasts. * Wired Wired is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. * SC Media SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies. * Security Magazine Security magazine is the security industry’s go-to source for enterprise security trends, metrics, news and more! 1200 S. Franklin St. Mount Pleasant, Mich. 48859 989-774-4000 * Faculty & Staff Directory * Departments A-Z * Maps & Directions * Careers at CMU * News * Events * Giving * Social Media Directory * Nondiscrimination Statement * Privacy Policy * Website Accessibility * Website Feedback * Consumer Information * Sitemap Campus Safety Information and Resources © Copyright Central Michigan University