Module 1: Introduction Lesson 1: Purpose and Content of the Training Lesson 2: Why Information Security? Module 2: Your Responsibility Lesson 1: How You Can Help Module 3: Use of State-Owned Resources Lesson 1: Personal Use of State-Owned Resources Lesson 2: Office Equipment Lesson 3: The Internet Lesson 4: E-Mail Module 4: Handling PHI Lesson 1: Responding to E-Mail Requests Containing PHI and PII Module 5: Passwords and Software Lesson 1: Passwords Lesson 2: Software Module 6: Protecting Resources & Information Lesson 1: Protecting Resources Lesson 2: Protecting Information Lesson 3: Media Disposal Lesson 4: Summary Module 7: Assessment