-
There are many different ways to verify your identity using two-step verification - choose the one that's right for you! Your options may vary from service to service. Faculty, Staff, and PhD Students Contact your IT Support Representative ...
-
The following article will outline the process of setting up Two-Step Verification for a Google account. Two-Step Verification is required for all Google@Wharton accounts that do not use PennKey authentication, and is heavily recommended for perso...
-
This article is meant to provide guidance if you're unable to access your account because of Two-Step Verification. Your options may vary from service to service. Faculty, Staff, and PhD Students Contact your Wharton Computing Representative...
-
Two-Step Verification provides an added layer of protection for your online accounts. After you log in with your username and password, you'll be prompted to verify your identity – the second step – using a device in your possession, such as a mob...
-
Instruction Center is Wharton's application for faculty management of courses and their overall classroom experience. It includes a range of tools to assist with instruction, which are described in greater detail below. Before You Start Y...
-
If you need students to submit files that are too large to send via email, you may create a Dropbox folder where students can upload files. Before You Start You will need the following before you can complete this task: You must ha...
-
How the Alumni Forwarding Email Address works.
-
Last Updated: 05/08/2026
in Portals & Clubs Student Clubs
In this article, you can find out how to set up an email account and website for your Wharton club. Before You Start You might need one or more of the following before you can complete this task: Google@Wharton account If CampusGroup...
-
Last Updated: 05/07/2026
in Working & Teaching Recordings
Zoom allows you to record meetings in two ways:
Cloud recordings are stored in your Zoom account and are available for streaming from a browser or download to a computer.
Local recordings are saved on your computer and are only avai...
-
Please reference the links below (PennKey login required) to view Information Security slide decks from hosted Lunch and Learn sessions. Lunch and Learn 2025: Data Classification Lunch and Learn 2026: Phishing ...