Studying and communicating online
Technology and systems you’ll use
You’ll need access to a laptop, desktop computer, tablet or mobile phone to complete your studies. You’ll use the student web portal OASIS to get to services like Blackboard, the Online Communication Channel and student email, and to access textbooks, plan your study timetable, and view exam timetables. If you’re on campus, you can take your laptop, tablet or mobile phone to lectures and classes to take notes.
Communicating online
There are plenty of ways you can chat, share information and discuss your studies with your tutors, lecturers and fellow students, which can make online studying a fun and interactive experience.
Depending on the unit, you might use online discussion boards or social media channels, or you might communicate via email.
Contact your tutors and lecturers
Need to contact your tutor or lecturer? Use the contact details listed within your unit in Blackboard. Tutors and lecturers usually get back to you within 48 hours during semester.
If your tutor or lecturer doesn’t respond and your query is urgent, you can contact the unit coordinator. Their details will be in your unit outline, or if you know their name you can search the Curtin staff directory.
Curtin’s IT policies exist to keep you safe
Our information security processes and systems are designed to keep you safe while online and on campus, so please take the time to read our key IT policies:
- Information Security & Information & Communication Technology Appropriate Use Policy [.pdf 188kB]
- Information and Communications Technology Appropriate Use Procedures [.pdf 195kB]
If you notice any suspicious activity relating to your Curtin login details or any Curtin systems, contact Curtin IT services immediately on (08) 9266 9000.
Tips for staying safe online
Your information is valuable to cybercriminals, especially things like your credit card, your social media page, and your online account details and passwords.
Defend your data against cybercriminals and make yourself less of a target by:
- Clicking only on links and files that are expected, and only from people you trust.
- Setting your software to auto-update, or installing updates when prompted.
- Creating passwords that are unique and hard to guess.
- Using two-step verification where it’s available.
- Being careful what you share, and securing sensitive data. If you don’t need it, delete it.