%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 16 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250715145817+00'00') /ModDate (D:20250715145817+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4137 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 195.458 521.469 551.276 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 195.833 520.719 550.526 re S 0.773 0.773 0.773 rg 61.016 211.208 m 550.984 211.208 l 550.984 211.958 l 61.016 211.958 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(INFORMATION SECURITY AWARENESS TRAINING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(May 10,2021)] TJ ET BT 156.578 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 171.086 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Part of living in a connected world is understanding that our )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(private information is more vulnerable. ID theft and data breaches )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(are no longer isolated incidents, they happen every single day.)] TJ ET BT 61.016 595.453 Td /F1 9.0 Tf [(So why would a university be targeted?)] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(Universities hold a great deal of information that could be )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(exploited if it gets into the wrong hands. This information includes )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(personal details and research data.)] TJ ET BT 61.016 533.497 Td /F1 9.0 Tf [(Consequences and why it matters:)] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(Though not all data security incidents will lead to the loss or theft )] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(of information, they will expose information to unwanted risk.)] TJ ET BT 61.016 480.730 Td /F4 9.0 Tf [(A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious )] TJ ET BT 61.016 469.741 Td /F4 9.0 Tf [(incident. Any data security incident could potentially be disastrous for both you and the institution.)] TJ ET BT 61.016 449.752 Td /F4 9.0 Tf [(In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information )] TJ ET BT 61.016 438.763 Td /F4 9.0 Tf [(Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by )] TJ ET BT 61.016 427.774 Td /F4 9.0 Tf [(no means a programme that you will need to have a pass record. This course is strictly informational so that you will have )] TJ ET BT 61.016 416.785 Td /F4 9.0 Tf [(the necessary tools when it comes to Information Security.)] TJ ET BT 61.016 396.796 Td /F4 9.0 Tf [(To access the course, go to)] TJ ET 0.373 0.169 0.255 rg BT 174.074 396.796 Td /F4 9.0 Tf [(https://learn.sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 174.074 395.645 m 262.121 395.645 l S 0.153 0.153 0.153 rg BT 262.121 396.796 Td /F4 9.0 Tf [(. When the SUNLearn main page opens, click on the "Information )] TJ ET BT 61.016 385.807 Td /F4 9.0 Tf [(Security Awareness Training" link and log in with your network username and password. If you're successfully logged in, )] TJ ET BT 61.016 374.818 Td /F4 9.0 Tf [(scroll down and click on the "Enrol me" button to enrol yourself for the course and to access the training material.)] TJ ET BT 61.016 354.829 Td /F4 9.0 Tf [(If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and )] TJ ET BT 61.016 343.840 Td /F4 9.0 Tf [(active, please log a request via)] TJ ET 0.373 0.169 0.255 rg BT 187.079 343.840 Td /F4 9.0 Tf [(https://learnhelp.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 187.079 342.689 m 292.136 342.689 l S 0.153 0.153 0.153 rg BT 292.136 343.840 Td /F4 9.0 Tf [(for SUNLearn support.)] TJ ET BT 61.016 323.851 Td /F4 9.0 Tf [()] TJ ET BT 61.016 303.862 Td /F4 9.0 Tf [()] TJ ET BT 61.016 283.873 Td /F4 9.0 Tf [()] TJ ET BT 61.016 263.884 Td /F4 9.0 Tf [()] TJ ET BT 61.016 243.895 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 225.406 Td /F2 9.0 Tf [(Posted in:News,Notices,Security,Training | | With 0 comments)] TJ ET q 225.000 0 0 150.000 325.984 496.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 174.0737 395.9632 262.1207 405.1207 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://learn.sun.ac.za/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 187.0787 343.0072 292.1357 352.1647 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://learnhelp.sun.ac.za/) >> endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 200 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 17392>> stream JFIF``BExifMM*J PiZ >SONYSLT-A99V '  (00004 0 2015:04:09 14:56:522015:04:09 14:56:52250mm F1.4 }http://ns.adobe.com/xap/1.0/ 2015-04-09T14:56:522015-04-10T13:14:47 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,"N !1AQa"2q#BCR$Sbr%34DETsU&6c,!1AQ#"aq2 ?ʣ#橴) E 8H~Cph3sFUk&Ap efui'IO <غ9(5xK,X홢H8wfz6(J%oG7g%OJ#s{W [pK쾔 _".i>u뵱EID@@0ް.=_8HP*?SR-T^eTnpN9+m CC͑И K`xVlkc͏ k^ީ5_LRmL:wf+cG''^SūsOʓ'Z+N<&| 槩) #U Yu#-f҆O7*-q2$.1b U+ep\y!u7Hahqj+GfJ{BѵHt˷-[w$m#SNڊ3ЌɰU׮wk>`~<>״)H~\D|^E4eѧ5(=vm=ZO$ULn)❧) iKA[女ݢ%B^4dQnoU0_ (U쥠hՔtCƘAJ!ùFXridv)E/Ih= N 훸?SN\Ɔ BzIW|l\ unTݟ!(זZ{y릤]҇FCT+_Ltڅ=,ɇMHRƜ׈ZKjZOna{0*[Q3ALL BM tn(t)yD&DkJM!yv)GN"jn@xǿ"eoW>e1~*N/lY?ho?m H0۩7;D]wS'&)0oHAo1R˿eh'j-f*ʻxK=lշ6ɡ:M@ta^ZG勯D5QͶRtaV)ȭ3ҟt$ zCL*];gNЈ)$okB :Zú6T˰3y~Vgn[jX̵XuX|Ni#ZeE]qں|w&{5on w+\1v*|Zeb] plnГQ/+EDZ2{P3|)zOc W;F%A^2i-tEEqfjY[i&Nл[8@L;fJTxoSWrQ|R˃q[XՕJy6dAɞc_7s> yh--hkĢA&վ e7- R4 C6vED=|c*Bnwh6-Z6#xyÊ繥Ҕ=M.ii'tR ZqM0sTrƑ[mnBu93(I(oCɤV]mMI@XMnK!ぜ>wN(UaP vfَ骨:aΓP8aXXrXCm:y2&baxtawG[YM⚇F)N]K*;'ٲG? +)ۭ)ƞfVMܺesᒷz, (SgbN*X~Z2ء>{aqY7<i3FnI2xR &0d$II0:-%Yxͷ5@=(>*4jGYݫ`10r WݗP#OT42/bC#wyZo,:0W_e[eCh.Ϋ&%cl >^Omi+ߩ~H᙮*KG2 qW( SF^6x^\hJ+ ۬[κ(ۜ3Q8(2D^d*JlX ‰5#,+E(t7;ڎJ0U$=,rVhwX\B=> E: I`G"жŃPA[ nR|cTo0uc)y]LZdm1UI~M')a}`ܦPlOL;zG3J'oR}qMlG6a;+*\|V1TRB@ w{ts╹{Bi"1UcR kpo{Lgnٿ_sOe4ysnrIZ +e*Ta0:,Jhw=:iz.+ϗtKQWJ vF*JFntiPmH惣&mum%c ߍNʥmR\gPCY#FIeu?[_.vc@St{8#/ߑNa,9>6@SWJ0 ~5VAI!/hij.r [V䳶CRΪ4t*Tu1DkZr7-)ʔKA-ƻpc ȫMm9cO>N[hat3 JutѶ?!{"Kρ6nkCw@al &WGlW<Uko//һkyIq]ظe\wnv~lIz~ ?}꥟LZd H8\^>,O DaTćeE1ݔ] Nn#L)6[P?eo17i5eRA ;8 S_5Uhm24ӄζX%dLM.왢TRi٧'3Pu ssz=9mwQ<{!Se|8Fkv[kxYjX%EG%D g2g o% r촻S -`n^X)ќHܽZ[CK+᜜JhT׎)䠈Qm5pH!MMƀxȘH0 jeuϡv㾻hj V*0 wwv`9/c2;u_' &тxZ)}K[ⷀ/Di|C,kTXk`; mUt8ppM\jM\7B\%d\R(Ğ 𶊺u 끌+}Xoٽ\SIh*$N0պFђye Y. Z$kOjdӵ0 ܨvV7kbWGa$2t!/x@0y"C/qCWM2XrJ80O0/[qIa+n}kZ֗h*j?D aP[csF:nM?RZqhhHM1=(fVD'kgn!}4! l( ,ci*?Q/U_k*(5PN?A섯Ɔ3hF򅦆J7׼e7ߑ9qՕh"d/]KLx<?HUk <Σ2Ѻh\0< Wr$ te ƈ;fؚ;0AܻOX`2a81ハI6k-j߄dL598c^WK;ѣMtp h+ga[ pGհ4k{J}MN%vg'՛;?F(ѿ~)hv sO0#uIэ%n0,Xny.zog(-r֣*Sp&CSvcՌ.wkz\I9% 1JCK |g[3[ޕuG) nWDR^g 1y֨Vkwzj _Z5'ԷjX#:xm kG Y.>[А7^խ+<,2Ǵ3Nc=[waNCZio~J_7> QG4 $(+9 3EPAdm+L9[Si%̐cyom#qOKp4ÙSnkˈEC.׊8 \ZMB3y㙿7O`.hʝ$ -7S_ kqڜnGwO n,kq#3nۿoa$3K98,DutuS޳V#ވG%K ϳ[ o8(L޾dBc7vt}oNԘP1ҟ~+˅.tW ?ZS4w۹fU 2>KMH}gJ>tT*i(m-.S6tpAL~K-pu搯k~ Ck>v76^e5E8ɛ!%r48]O*߂6.뭒%p3FLo兘e2Qx,U#~Gw24 sa ${u3L܁)X? oQ,[;fPٶ,S<#tݽHMlE]!Ckj7{ža*WQJb؝lҥ$`c `ќ~e}3ƑU>+:XnQ*.j e}‡B0*OJ6SŕCPBԏ5;zJn\ghC'c9j:L٩trO61\S<"Qjn .=GdKd?EG5S";]s J6]rNأ nNHkQJp3&/KT 3V؍YMIۛ:odRy7tL8P{AFZI|X;~?4QxM+h6žrҾ 9QڳmU[2GZ2Zqy)n~tK LdfQ4Q! [ĬkժS`4;6m:آL K׊Gى$wzӢ[E=;[+w nU59Mlékwqκ"hYQU-^qt u4(sxy3nJmDovrO*M-#fcnԦ-ߖC(mr&8M.4ժg;0w)`_w[P>U{3FԳӢ^qZgz]]qS7 Mun[~!ve8 `[[e2I##w=TI㭤x#GgTsc29)#2 +.n5UV=3tb<04o rלIe+δ}WYE1(xXʑSmрVJۭuq~ॶS5c+c '*Ƒ,w:XA{4 +BXD1c)%`[k$ ΰjӪ 6ݨ$2[jᇘWS* Nvs*XVzJ'ccuK; F۔ts '5~8}6]vZȃV+J2S~JZ8 mcf8O[%>Z噠V޺i|(\_A]O*ӎOZM-|6|dUz8Kޤ4Z cӄr?FI6- =xKiSƪ5Lug/is909'z / (iTʧPSu;͓pd_s':*H2hzr$.F@l}nQ|Fw|pn°?i)dmUc'cUGV̝5F1r}a8kG`Ʒ5uR}X䀼;Ėcx瑪`2ь:hNI&!\]$8`oJjL?C0Se{{dPnQ.\DGY{W9`˓<\'kZ #˒|J(NٛyϐY\E /Qk6:H˓Y8!y=zt3kK DA}r.Vu1%h ɤ\xerc'ꊑiV f?\@TZFx%\Ѯ{``˓tx EPQp h=%`fMi%qQW;B=r8Qbޯc 5X\$0,*ձr3G˓@p ig)K80rhF5M88.\q4B/ endstream endobj xref 0 17 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000596 00000 n 0000004785 00000 n 0000004897 00000 n 0000005012 00000 n 0000005132 00000 n 0000005240 00000 n 0000005368 00000 n 0000005444 00000 n 0000005572 00000 n 0000005652 00000 n trailer << /Size 17 /Root 1 0 R /Info 5 0 R >> startxref 23213 %%EOF Training « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Training

Want to enroll for a course, but don’t know how?

Friday, August 16th, 2013

As you know by now, IT offers various courses for free – all you have to do is enroll. But does the sight of the online registration fill you with dread and in the end you give up and just call the IT Service desk?

Don’t panic, we’ll show you step-by-step how to survive this relatively painless procedure.

STEP 1

Go to the staff portal –  my.sun.ac.za

STEP 2

Click on SUN-e-HR.

STEP 3

Log in with your SU username and password.

Pic4

STEP 4

Click on Training and Development and then Learner Home.

Pic5

STEP 5

Click on Catalog and select Information Technology

Pic6

STEP 6

Select your course

Pic7

For more information on our courses, click here.

Moodle takes over from Vista & Blackboard

Friday, May 24th, 2013

From 2014 Stellenbosch University’s electronic learning management system will switch from Vista and Blackboard to Moodle, an  open source eLearning system. The switch to another system was necessitated from a change in the University’s strategy and shortcomings in the existing system that could not be corrected. The decision was based on a thorough investigation. Henceforth Moodle will be the standard eLearning system of the University.

A task team (Johann Kistner, drs Antoinette van der Merwe & JP Bosman and ms Marinda van Rooyen) facilitated the evaluation, including consulations with academic, administrative and support services staff. The success of systems, as well as the scale on which they were used by other universities, were also looked at. In the end a decision was made based on a set of predefined, weighed criteria. The following was taken into account:

  1. Off-campus access to the system must be reliable, because of the significant growth in the use of e-Learning Technology from outside campus:  service courses,      postgraduate modules, and students working from their homes.
  2. A reliable assessment component, because e-assessment is increasingly  used.
  3. A mobile interface that works on all equipment, due to the huge increase in the use of mobile devices (phones, tablets, laptops) to access the learning        management system.
  4. An accurate tracking system, because the tracking of students’ progress are critical for student success.
  5. Off-line functionality, which is very important in the (South) African context. The system must provide for students learning materials and other information to easily sync to their devices while on campus or via the network, and then to work at home without having to be online all the time.
  6. A more flexible licensing model, because community involvement and working with schools and other universities, especially on the African continent (e.g. in the CHEC courses and schools support) means that restrictive license agreements is not sustainable.

On a practical level this means that Moodle will be used for all modules from January and Vista and Blackboard will only be available for 2013 modules until March 2014. (until after the  last exam opportunity)

The short time span before implementation is planned presents substantial challenges for lecturers to migrate information in time and also for IT to ensure that servers are ready for the change. The project is currently being defined and the team is sticking to a tight time line to ensure that this goal will be achieved.

More information will also be communicated in future editions of Bits & Bytes.

Turnitin clips plagiarism’s wings

Friday, May 24th, 2013

Academic work at a university entails that the student be exposed to the ideas, written material and other intellectual and creative material of others. The intention with academic studies is precisely that the ideas of both the lecturers and the students will be shaped and polished by others. At the same time, students ought to go further than what was devised, written and created by others; he or she should critically evaluate it, provide new and original input or syntheses, and apply these to contemporary and local studies of problems. This is where academic activity becomes satisfying at university level.

Naturally, lecturers can only evaluate the contribution of their students if the contributions of others are clearly distinguished. This takes place through acknowledged systems or the process of acknowledgement and referencing. If these conventions are not adhered to and the required recognition is not given, the basis of the academic work at a university is undermined. Plagiarism is committed when someone else’s work (words, ideas, creations) are taken over and passed off as the writer’s own.

The university uses Turnitin to test plagiarism. Turnitin integrates with the Learning Management System (Webstudies or Ematies). (See more information below) Assignment links are created within the LMS which students use to upload their assignments to. The assignments submitted by students are stored in a database used to check for plagiarism. This prevents one student from using another student’s paper, by identifying matching text between papers. Assignments are also be checked against web pages, books, newspapers and available journals on the net.

The University aims to ensure that mechanisms are in place that will enable lecturers to promote academic integrity and to eliminate plagiarism. The most successful approaches to dealing with student instances of plagiarism allow for a ‘developmental approach’, which implies that cases of plagiarism – with the exception of serious cases – be used as opportunities to instruct the guilty persons as to what is expected and how to handle information. In addition, such a student could be directed to redo the assignment.

For more information on the university’s the Interim Guidelines for dealing with Plagiarism, please visit the CTL website: http://stbweb02.stb.sun.ac.za/ctl/policies.html

Article compilied from the Interim approach to dealing with plagiarism policy by Marinda van Rooyen

 TURNITIN/WebStudies official website

TURNITIN Logon problems & Help

–          If you can’t log in to WebSTudies or Blackboard, Go to www.sun.ac.za/useradm  and change your password.

–          Any other WebSTudies or Blackboard related queries (modules not showing etc.), send an e-mail to WebStudies or Samuel Morris or
call+27(0)21 808-2443

 

 

MS Project for a more organised office

Friday, March 8th, 2013

Does a large portion of your day consist of managing projects and seeing to it that everything runs smoothly? Whether you are a project manager or just closely involved with projects within your department, MS Project could make your task easier.

Microsoft Project (MSP, MSOP or WinProj) is a project management software program, developed and sold by Microsoft, which is designed to assist a project manager in developing aplan, assigning resources to tasks, tracking progress, managing the budget, and analyzing workloads. (SOURCE: Wikipedia)

Information Technology offers free MS Project 2010 Level 1 and 2 courses to staff.  But you’ll have to jump at the opportunity!  

Only two dates are available – 

Microsoft Project Level 1: Stellenbosch –  19 & 20 March

Microsoft Project Level 2: Stellenbosch – 8 & 9 April

 

COURSE INFORMATION

MS Project Level 1

Getting started with Microsoft Project

Creating a Project Plan

Managing Tasks in a Project Plan

Managing Resources in a Project Plan

Finalising a project Plan

   
Ms Project Level 2

Exchanging Project Plan Data with Other Applications

Updating a Project Plan

Managing Project Costs

Reporting Project Data Visually

Reusing Project Plan Information

Enrolling can be done online by signing on at the staff portal and selecting the SUN-e-HR option. E-mail us at itkursus@sun.ac.za for more information. See IT’s selfhelp-wiki for more information.

Free training opportunities for aspiring IT-experts

Wednesday, December 12th, 2012

Microsoft recently announced a training sponsorship for SU staff and their children. CTU Training Solutions, the company currently responsible for training staff, approached Stellenbosch University as one of their three biggest clients, with this offer.

Applicants will have to be able to attend classes every morning for the first year or after hours. Someone from a non-IT environment will still be able to do the course, but have to occupy an IT position in the second year where the information learnt in the first year will be applied on a practical level. During the second year, Microsoft will review the student’s performance.

Children of SU staff are also eligible to complete these courses. Please take note that certain conditions apply. The offer is particularly applicable to staff whose children completed their matric, but do not have the financial means to study further. Disadvantaged and disabled applicants, as well as applicants from households with a single income or single parent will be given preference. Applicants may also be required to submit a written motivation as to why they would qualify for the funding.

The only two requirements are that either the parents or company pay R2000-00 per month for the child’s travel and living expenses and he/she completes and internship during the second year. CTU will assist the student with the placement of interns at an appropriate company.

These courses generally run at a cost of R40 000, which makes this sponsorship a wonderful opportunity for any aspiring IT experts.

Please direct your applications for funded learning to:

Petro Uys by sending an email to:            puys@sun.ac.za

We shall inform applicants of the outcome of their respective application on Friday 11 January 2012.

More information ….

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.