Summary
All CCE staff are required to complete Cornell University’s Cybersecurity Awareness online training on an annual basis. This article provides instructions for accessing the training, highlights specific guidance for Cornell Cooperative Extension employees, and offers additional resources related to cybersecurity best practices and tools.
Body
We all play a critical role in protecting the privacy of data.
Malicious actors continually probe for weaknesses in our defenses.
Common methods for unauthorized access into our systems are via phishing e-mails, targeting accounts with insecure, reused passwords, and unsecured file storage and devices. Due to the frequency and severity of these attacks, both regulators and cyber liability insurers have mandated that organizations must provide cybersecurity awareness training.
Cornell IT requires all current staff to complete this training on an annual basis. New staff will receive an email within the first two weeks of employment containing a link to complete this course. If you do not receive an e-mail notification nor see this training listed when you log into Workday Learning, please contact the Western IT helpdesk.
Accessing the FY25 Cybersecurity Training and Attestation
- Link to take ITSO 102 FY25 Cybersecurity Training and Attestation
- Information about the required training:
- You will receive an e-mail from Workday Learning <cornell@myworkday.com> when the course has been assigned to you from Cornell.
- You can also find the course by going to Workday Learning and looking for ITSO 102 in the "Required for You" section.
- Be sure to allow popups to open in your web browser.
- Allow 24 hours for your Workday Learning record to show that you completed the course.
- If you do not complete the FY25 Cybersecurity Training and Attestation by the date specified, you will begin to see warnings when you use CUWebLogin to log in to most Cornell services. Non-compliance could ultimately result in an interruption of your access to those services.
- For more information: Annual Cybersecurity Training and Attestation | IT@Cornell
Specific Instructions for Cornell Cooperative Extension Employees
NOTE: This course includes Cornell-specific information that may not apply to Cornell Cooperative Extension employees.
Please review the following guidance carefully.
- Device Security section:
- “Verify Your Certified Desktop(s)” - CCE employees do not use Cornell-owned, certified desktops. You should not see any computers listed on this page since Cornell does not track our CCE-owned computers.
(If a computer is listed, it likely means you are working with a Cornell University program that has allocated a Cornell-owned computer to you.)
For the questions in this section, please select the following options (see screenshot below).
- Question 2 - Select “All the Cornell-issued devices I use are listed above.” (Even though there are no devices listed.)
- Question 3 - Select “None of the above”

- At the end of the training, you have the opportunity to write in a comment. To make it clear that we do not use Cornell owned equipment, feel free to paste in:
- I use an affiliate organization (CCE-owned) device for work, which is joined to the Cornell domain but is not registered to Certified Desktop.
Cornell Resources
CCE Resources
Handouts:
CCE webinars: