Skip Navigation

Human Firewall Training

it header
OU homepage OU IT homepage

For Raising Buttons on Subpages

Skip Side Navigation
Cyber security students reviewing laptop with Aaron Baillio

Human Firewall Training

The Human Firewall program engages end-users to focus attention on cybersecurity and help build digital self-defense skills.

Human Firewall Program

Our Human Firewall program is based on real-world scenarios. You may receive phish tests that look 100% authentic. We promise we're not targeting you for your Amazon packages, but cybercriminals are, so we want you to practice and get it right with us, first!

Human Firewall comes from the idea that security is not just a technology issue but rather a people and process issue. Cybercriminals are increasingly using people-centered attacks that rely on social engineering and human interaction - "the human factor" - the instincts of curiosity and trust that lead the unaware user to click on fake websites, download and install malware, move funds to fraudulent accounts, and more. 

  1. Ransomware has reached a fatal level.
  2. Digital Self-Defense
    • Personal funds of employees and students have been lost.
    • Protection of university funds and reputation.
    • Protection and services for patients.
  3. Policy
    • The University’s Cyber Insurance policy mandates this training program.
    • Federal and state policies require cybersecurity training.
    • Many grants, federal and private agencies, require cybersecurity training to receive funding!
  1. Phish Tests 
    • Simulated from real-world phishing so you get the best practice!
      • If you fail a phishing test by selecting, clicking, downloading, entering data, etc. you will be assigned additional training modules and phish tests, until phish tests are passed on a regular level again.
      • If you don't click, select, download, or enter data, you pass! We don't want you to take extra training if you don't need it!
  2. Annual Training 
    • Stay up-to-date on the most current cybersecurity trends and practices as well as meeting policy and grant requirements. 
  3. Urgent Training 
    • Training is crucial after a real attack and in special circumstances such as the substantial change in technology due to Covid-19.
  4. Role-based Training
    • Escalated/privileged system access or work in specific technology adjacent areas may require more challenging cybersecurity training and updates.  

Over the next few months, we are focusing our efforts on providing training and resources for faculty, staff, and students to spot social engineering attacks that target them through email, social media, and websites.

Look for emails from OU IT about these training opportunities and resources partnered through KnowBe4. In the meantime, you may still have an active KnowBe4 account and can begin familiarizing yourself with the Learner Dashboard, badges, and the competition Leaderboard!

Please select the best option below to help with your request:

  1. I don't know if I have a KnowBe4 account or where to log in to take my training.
  2. I need to know compatible devices and browsers so that my work is saved.
  3. Requests for accommodations on the basis of ability or disability must be made through the Accessibility and Disability Resource Center.
  4. I have other questions not listed and need to submit a ticket request.


We gathered a list of resources to help you navigate losing personal funds and identity theft. Please visit Scam Recovery Resources for recovery process checklists, financial guidance, legal services, mental health services, and other areas of need that may occur after a scam.

Alerts & Recommendations

Review our Phish Examples & Targets page to sharpen your digital self-defense skills.

The resources listed below can be digitally saved or printed for quick reference.