Navigating the LCC Student Portal: A Comprehensive Guide
The LCC (presumably Luzerne County Community College or a similar institution) student portal is a crucial tool for students to manage their academic journey. This guide provides detailed instructions and essential information for effectively utilizing the portal's features, ensuring a smooth and successful college experience.
Registering for Classes
Course Selection
Begin by searching for desired courses. The portal allows students to filter by semester and enter course information to find the relevant classes. For a course description and prerequisite information, click the course title.
Understanding Course Information
When reviewing the list of sections offered for a specific course, pay attention to the following details:
- CRN (Course Reference Number): This unique number identifies each specific section of a course.
- Instructor: The name of the instructor teaching the class. *TBA will be listed if there is no set meeting time.
- Campus: The campus location where the class is held.
- Meeting Times: The days and times the class meets.
Adding Courses to Your Summary
Select the desired sections, noting the CRN for each. Enter all CRNs and add these to your summary.
Completing Registration
Once you've added your desired courses to your summary, click the "Submit" button to complete the registration process.
Read also: Comprehensive ETAR Guide
Addressing Registration Errors
If you encounter errors during registration, such as "Time conflict with CRN…" or "… full," you may need to find another class that is open.
Accessing Your Student Account
TouchNet Student Account Center
The LCC student portal provides access to the TouchNet Student Account Center. This is where you can manage your finances related to your education.
Payment Options
Within the TouchNet Student Account Center, you'll find options that say "Payment Plans" & "Refunds".
Viewing Registered Courses and Costs
The portal displays your registered courses, including the costs as applicable.
Bookstore Access
You can access the online bookstore through the portal.
Read also: Accessing the Cal Poly Portal
Financial Aid and Book Advances
Information regarding financial aid, book advances, and other financial resources can be found within the portal.
Online Safety and Security
Navigating the internet safely is paramount, especially when accessing sensitive information through the student portal or other online platforms. The internet can be a dangerous place. This includes computer viruses, worms, and other types of malware. The following guidelines will help protect you from harm, privacy issues and potential identity theft.
Recognizing and Avoiding Phishing Scams
Phishing attempts are designed to trick you into disclosing your user name and password. Be wary of emails fishing for your private account information.
- Verify the Sender: Be suspicious of unsolicited emails, even if they appear to be from a legitimate source, such as your boss. Remember that even a familiar name can be fraudulent!
- Inspect Links: Before clicking any links, hover your mouse over them to see the actual URL. Does the hover-text link match what's in the text? If the email does not contain an embedded link, that's a good sign, but it doesn't guarantee legitimacy.
- Analyze Content: Look for inconsistencies in grammar, spelling, and formatting. Scrutinize the email address of the sender.
- Never Share Passwords: No legitimate organization, including LCC, will ever ask for your password via email. If they ask for your password (or bank account), they are bogus. Never share your passwords with anyone. Ever.
- Beware of Suspicious Attachments: Scan the attachment using a free online scanning service.
Identifying Legitimate Websites
- Read the URL Carefully: Ensure the URL matches the site you are trying to visit.
- Look for Security Indicators: Check for "https" in the address bar and a padlock icon, indicating a secure connection.
- Use Common Sense: If it looks too good to be true, it probably is. Be wary of offers for a product or service at an unheard of price or an incredible investment opportunity. If the offer looks too good to be true, trust your instincts.
Protecting Personal Information
- Be Cautious About Sharing: Avoid sharing sensitive personal information online unless absolutely necessary and you are certain of the recipient's legitimacy.
- Look for Signs of Legitimacy: Does the website provide contact information and evidence of a real-world presence?
Responding to a Security Breach
- Change Your Password Immediately! Go to my.lcc.edu and select 'Change Password/Manage Account'. If you can't access your account, go to my.lcc.edu and select "forgot my password" to recover it.
- Treat all Communications with Suspicion: Treat any communications you receive after a potential breach with suspicion for the time being.
- Scan for Malware: Scan your computer with an updated anti-virus program.
- Monitor your Accounts: Monitor your bank and credit card accounts immediately. Also, check Everything!
Password Security Best Practices
A strong password is your first line of defense against unauthorized access.
Password Length and Variety: One of the greatest strengths of a password comes from its variety. One of the greatest strengths of a password comes from its length. A strong password combines length, variety and non-predictability.
Read also: Accessing the MUSD Student Portal
- Avoid Common Words: Do not use dictionary words, names, or other easily guessable information.
- Use a Combination of Characters: Incorporate uppercase and lowercase letters, numbers, and symbols.
Password Complexity: Given sufficient time and resources any password can be guessed. A password is only as good as it is unpredictable.
- Passphrase Generation: Instead of trying to create a complex password from scratch, try creating a passphrase. Think of a sentence that is unpredictable, and known only to me". Take the first letter of each of these words to come up with the passphrase "agpilcuakotm". Make substitutions of characters to increase the complexity. The passphrase "agpilcuakotm" is not very complex. "aGP=l,c,u,ak1tm".
- Rememberable Passwords: Think of a lyric or movie line. and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.
Password Management: A password is only good if you are the only person who knows it.
- Never Share Your Passwords: Never share your passwords with anyone.
- Don't Re-use Passwords: If one account is compromised, all accounts using the same password become vulnerable.
Data Backup and Recovery
- Start Backing Up: Regularly back up your important data to an external hard drive, cloud storage, or other secure location. Everything, gone. Yes. That happens sometimes. everything they've done along with everything you've done. And finally, monitor!
Wireless Security
- Be Wary of Public Wi-Fi: If you're using free WiFi hotspots, use them safely. Any spot on the path can load a free sniffer to capture all of your information.
- Use a VPN: Use VPN software to establish a secure network connection.
Phone Security
- Never call to pass the SSN/CCN to the recipient.
USB Drive Encryption
- Create a password encrypted file.
Additional Security Measures
- Keep Software Updated: PC - Win10 comes with Windows Defender. PC - Windows 10 will automatically check for updates.
- Antivirus Software: Keep an anti-virus program on your computer at all times.
- Spyware Scanner: Download a free spyware scanner that specifically targets spyware called Super Spyware, and run a full scan of your computer.
- Malware Scanner: Download a free scanner called Malwarebytes, and run a full scan of your computer.
Social Media Safety
Social media platforms can be valuable tools for communication and networking, but they also present privacy risks.
- Think Before You Post: Remember that the Internet is public and permanent - Only post information you are comfortable with anyone seeing.
- Be Mindful of Oversharing: Avoid posting overly personal details and photos in your profile and in blogs and other forums. Once something is online, you can't retract it.
- Control Your Privacy Settings: Evaluate your settings - Take advantage of a site's privacy settings. Control who has access to your information and what the public can see.
- Be Skeptical: Don't believe everything you read online. Be skeptical - Don't believe everything you read online.
- Limit Contact: Consider limiting the people who are allowed to contact you on these sites.
- Review Application Permissions: Be careful when deciding which applications to enable.
Identity Theft Protection
Identity theft is a serious crime that can have long-lasting consequences.
- Protect Your Social Security Number: Don't give businesses your SSN just because they ask for it.
- Monitor Your Credit Report: Take a look at your Social Security earnings statement each year.
- File a Police Report: When filing a police report, visit the police station nearest to where the crime took place.
- Contact Creditors: Call creditors to let them know the accounts may have been opened fraudulently.
- Freeze Your Credit: Next, freeze your credit file with the major bureaus. This prevents thieves to open new accounts in your name.
- File a Complaint: File a complaint with the Internet Crime Complaint Center (IC3), as most unemployment claims are submitted online (at gov/complaint/).
Spam Prevention
Spam is an increasing problem. These tips will help you manage and minimize unwanted emails.
- Be Cautious About Sharing Your Email Address: Avoid posting your primary email address on public websites or forums, as these attract the most spam.
- Think Before Replying: It is critical that you pause and think before replying to any spam.
- Unsubscribe Carefully: If you subscribe to an email list, look for a clear unsubscribe link (often a box marked Don't send me product updates). If it is not a company you recognize, use your judgment. If the spam is clearly from a disreputable source, never Do not follow the (probably bogus) unsubscribe directions.
- Use a Secondary Email Address: Consider using a secondary email address for online registrations and subscriptions.
- Don't Contribute to the Problem: Do not contribute to the spam problem by producing any of it yourself!
Traveling with Electronic Devices
Traveling with electronic devices requires extra vigilance to protect your data and privacy.
- Minimize Data: Minimize the data contained on the device.
- Encrypt Your Hard Drive: Encrypt your hard drive to protect your data.
- Enable Security Features: Ensure that FileVault is enabled.
- Secure Physical Access: Do NOT leave your device unattended.
- Power Down Completely: Power down your device completely rather than just hibernating it or putting it to sleep.
- Disable Wireless Connections: Turn off your WiFi and bluetooth when not in use.
- Avoid Untrusted Accessories: Do NOT plug in untrusted accessories.
- Use a VPN: Use VPN software to establish a secure network connection.
- Practice Safe Browsing: Practice safe web browsing.
- Be Aware of Local Laws: Don't have an expectation of privacy. Some countries do not have the same protections for electronic communications as the United States.
- Monitor Border Crossings: Look out for border crossings. In some countries, customs officers may temporarily seize your device).
- Change Passwords After Travel: Change your password.
E-commerce Safety
Online shopping is convenient, but requires caution.
- Know Who You're Dealing With: Check out unfamiliar sellers with the Better Business Bureau and your state or local consumer protection agency.
- Get All the Details: Review the seller's history and read feedback from other buyers before you bid.
- Look for Secure Connections: Look for signs that online purchases are secure. Check that the data is being encrypted â turned into code that can only be read by the seller.
- Pay the Safest Way: Use secure payment methods that offer buyer protection in case you don't get what you were promised.
- Never Enter Personal Information in Pop-Up Screens: Be wary of pop-up windows asking for personal information. Legitimate companies don't ask for personal information via pop-up screens.
- Keep Documentation: Keep documentation of your order.
- Know Your Rights: You have the right to get what you ordered on time or, if no delivery time was stated, within 30 days. If it doesn't arrive on time, you can cancel and demand a refund.
- Check Statements Carefully: Check your credit card and bank statements carefully.
- Keep Your Computer Secure: Keep your computer secure for safe shopping and other online activities. Use a firewall, and keep them up to date.
- Contact the Seller Promptly: Contact the seller promptly about any problems with your order.
Additional Security Tips
- Shorten URLs with Caution: Use URL shortening services with caution. Popular services are: bitly, owly, t.co, and goo.gl.
- Secure Smart TVs: Smart TVs are becoming a staple item in many households. If you decide to get rid of it. Many articles caution about security vulnerabilities for smart TVs. Do not reuse an existing password. to complete a factory reset. that you may access, like Netflix, Amazon Prime and YouTube TV. remove all of your personal account information as well as unique password.
tags: #lcc #student #portal #guide

