SecurityTouch: Log in

Cookies must be enabled in your browser

Log in using your account on:

Welcome to SecurityTouch

Available 24x7, this U.S. Department of Education learning management system is used to provide mandatory cybersecurity training to its contractors and new employees. Existing employees should complete training using the FedTalent system

SecurityTouch now REQUIRES the use of multi-factor authentication (MFA).

  • Users with an ED network account and Personal Identity Verification (PIV) card must use PIV authentication.
  • Users without an ED network account and PIV must use account credentials. If you do not currently have a account, visit the Sign-up page to create an account. When creating your account, be sure to enter your email address in all lower case characters. If you have any issues with creating your account, please use's help center.

We recommend that you use the Google Chrome browser to access this campus. If you have problems while using SecurityTouch, please contact the SecurityTouch Help Desk by calling 1-877-612-HELP (4357) or e-mailing for assistance. The Help Desk hours of operation are weekdays 8am-8pm Eastern.

You are accessing a U.S. Federal Government computer system intended to be solely accessed by individual users expressly authorized to access the system by the U.S. Department of Education. Usage may be monitored, recorded, and/or subject to audit. For security purposes and to ensure that the system remains available to all expressly authorized users, the U.S. Department of Education monitors the system to identify unauthorized users. Anyone using this system expressly consents to such monitoring and recording.

Unauthorized use of this information system is prohibited and subject to criminal and civil penalties. Except as expressly authorized by the U.S. Department of Education, unauthorized attempts to access, obtain, upload, modify, change, and/or delete information on this system are strictly prohibited and are subject to criminal prosecution under 18 U.S.C § 1030, and other applicable statutes, which may result in fines and imprisonment. For purposes of this system, unauthorized access includes, but is not limited to: Any access by an employee or agent of a commercial entity, or other third party, who is not the individual user, for purposes of commercial advantage or private financial gain (regardless of whether the commercial entity or third party is providing a service to an authorized user of the system); and Any access in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or any State. If system monitoring reveals information indicating possible criminal activity, such evidence may be provided to law enforcement personnel.