Resources for Assistance and Education
You have completed the NERSC cyber security tutorial.
Below is a recap of the online resources that spell out the NERSC cybersecurity policies and procedures for accessing computational and storage systems.
- General Computer Policy: NERSC Computer Use Policies Form.
- NERSC System Access: Connecting to NERSC.
Thanks for taking this opportunity to review your cybersecurity responsibilities.