Here is your checklist of tasks to complete by the end of induction week.Moodle
Log on to Moodle, making sure you see the modules on which you expect to be enrolled.
Ensure you can access your university inbox.
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
If you cannot locate the book or journal article you require on the library catalogue or eResources then you can request it as an Interlibrary Loan. This enables the delivery of books or documents from the British Library.How do I request an item?
Print, fill in and sign the...
eduroam is the university's wireless network.
Your eduroam logon credentials can also be used at many other participating universities, colleges and institutions.
To access your university email on a mobile device:
Outlook for Android devices
Outlook for iOS devices (iPhone/iPad)
You can use Microsoft Teams either from the Teams App or by using the web version. You will get the best user experience by using the Desktop App this is installed on all university computers.
If you are joining a meeting or lecture you will be prompted when you click on the meeting or...
Origin is a video game digital distribution platform developed by Electronic Arts. This platform is used by the university to install certain items of software from games to applications. To access this platform, you must have an account. If you already have one you may sign in...
eduroam is our main wireless network:
for example: student: email@example.com or staff: firstname.lastname@example.org
The National Cyber Security Centre (NCSC) has issued an alert following an increased number of ransomware attacks on UK Universities:
It is an unfortunate fact of life that we have to stay vigilant to...