Protect Your Research Find security practices for protecting research data and information.Protect Your Information and Identity Find tips and best practices for securing your identity, devices, work environment, and more.Avoiding Phishing Find clues for how to identify a phishing attempt.Distributed IT Services provided by School and Department IT units.Software and Applications Campus-licensed software options for purchase or download.Teaching and Learning Canvas Learning Management System, instructional design, and other instructional tools and resources.Information Security Infrastructure and services that provide security, data integrity, and compliance.Research Technologies and Support Specialized research storage and computation, Quest (HPC), visualization, and lab-management systems.Professional Services Consultations services including workflow design, vulnerability assessment, application development, and more.Infrastructure Enterprise-level hardware, software, systems, and network infrastructure.Desktop and Mobile Computing Desktop and mobile device support, software delivery, patching, and other workstation-related support.Communication and Collaboration Email, file-sharing, document storage, telephone services, and mass communication tools.Administrative and Business CATracks system, NUPlans software, reporting via BI System, and more.Resources for Instruction Find resources for instructors, teaching assistants, and course coordinators to enhance instruction.For Students Access technology assistance for incoming, current, and graduating students.For Researchers Explore the specialized resources that IT offers to Northwestern's research community.For Faculty and Staff Access IT resources, tools, and services that enable your work at Northwestern.System Logins Access essential campus systems.IT Service Desk Get help via telephone, email, walk-in, or through the Knowledge Base.Diversity, Equity, and Inclusion Overview.IT Strategic Initiative: Eliminating Oppressive Language.International Center for Advanced Internet Research.Office of the Vice President for Information Technology and Chief Information Officer Overview.Office of the Vice President for Information Technology and Chief Information Officer. Report an Information Security Incident.Protect Your Information and Identity Overview.Administrative Access Review Portal Login.Amazon Web Services Access Portal Login.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |