Search92 Results
- Knowledge Base
- Center Teaching and Learning Excellence
This article provides step-by-step procedures for accessing your training record, certificates and course materials in Canvas Catalog.
- Knowledge Base
- Information Security
This article will walk you through the steps to remove and manage your Multi-Factor Authentication devices.
- Knowledge Base
- Student FAQs
These are the steps used to check the date on which you are able to register for classes for a specific term/semester.
- Knowledge Base
- Student FAQs
- Video Presentation Tools
Walk through the steps to upload your video to My Media, then add a PowerPoint slide deck creating a Picture-In-Picture presentation.
- Knowledge Base
- Canvas & Learning Technologies
- Canvas for Online Faculty
Walk through all the steps to make sure your Online Canvas course is ready for the semester.
- Knowledge Base
- Student FAQs
- Video Presentation Tools
Walk through the steps to record your presentation, your webcam and submit the video to Canvas using Kaltura Capture.
- Knowledge Base
- Employee Technology Resources
This article will walk you through all the steps you will need to take in order to update your Florida SouthWestern State College online directory listing.
- Knowledge Base
The process of submitting a ticket to request college services can be overwhelming, especially when you need to keep track of your requests. This is where knowing how to view your submitted tickets comes in handy. In this article, we will provide you with a step-by-step guide on how to view your submitted tickets for college services.
- Knowledge Base
- Canvas & Learning Technologies
- NEW Canvas Users
Guidelines for setting up a Canvas course for a face-to-face course. This article outlines the minimum steps required to ensure students consistent access to basic course resources and records.
- Knowledge Base
- Information Security
Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.
- Knowledge Base
- Information Security
This article will walk you through the steps to set up and configure authenticator applications to meet the Multi-Factor Authentication requirements for FSW system access. These are installed and operated on your iOS or Android device.
- Knowledge Base
- Information Security
Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.
- Knowledge Base
- Information Security
This article will walk you through the steps to set up and configure the USB Dongle / Security Key to meet the Multi-Factor Authentication requirements for FSW system access. The security key is needed anytime you need to log in to an FSW system and will need to be carried with you. Security key utilizes NFC for mobile device authentication access.
- Knowledge Base
- Information Security
Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.
- Knowledge Base
- Information Security
Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.