AWR368 – 7.50 Hours

Schedule

EC AWR368 4Register

Address

TEEX-Internet Moodle Campus

Texas A&M University Systems Building
College Station, TX 77845

Instructor

Diane Cornwell

Start Time

08:00 AM Saturday, February 01, 2020

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at (800) 541-7149 or ke@teex.tamu.edu to get the latest schedule.

Course Description

This course introduces the preparatory skills needed to learn penetration testing and vulnerability assessment, and familiarizes Information Technology support personnel and managers with the tactics, techniques and procedures (TTPs) that are used by attackers and penetration testers. Participants will have an increased knowledge and understanding about the tools used in a cyber-attack and in turn be better able to prepare defenses. The course focuses on the basic skills and knowledge needed to conduct and plan vulnerability assessments and penetration tests as well as show how to legally and ethically conduct tests and assessments. Participants will be introduced to Open Source tools such as Metasploit and Nmap, as well as methodologies for researching vulnerabilities. This course is designed based on research and federal agency reports.

This course was developed by the Norwich University Applied Research Institutes (NUARI) through the DHS/FEMA Homeland Security National Training Program.  

Prerequisites

Participants in this course should be currently serving in an Information Technology support capacity or come from an Information Technology middle management position. Although there are no prerequisites for this course, it is expected that participants have network and internet proficiency, as well as familiarity with both Windows and Linux file and operating systems, as well as basic command line use.

Course Completion Requirements

Participants will require a computer with an Internet connection and a web browser that supports flash or HTML5. Optionally, participants will require speakers or headphones for supplemental audio and video material.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.

Recommended

Broadband connection recommended.

Topics

  • Ethics of Penetration Testing
  • Network and OS Vulnerabilities
  • Social Engineering Tools
  • Network Mapping
  • Packet Analysis (Network Forensics)
  • Introduction to Metasploit

Suggested Audience

The target audience for this course includes Information Technology Support Personnel and technically proficient mid-level management in the public sector. The audience can be comprised of individual participants, as well as organizational divisions or a combination of both. Participants include, but are not limited to, information technology support personnel from the following entities:

  • Law Enforcement
  • Emergency Management 
  • Emergency Medical Services
  • Fire Service
  • Public Safety
  • Governmental Administrative

This course is appropriate for individuals working for state, local, tribal, and territorial organizations, and especially those at decision-making levels, such as line supervisors, and middle management. The course is not designed for firefighters, police officers or EMTs.

Continuing Education And Professional Credits

  • 0.75 CEUs

Government Programs

  • For DHS/FEMA Funded Courses, please contact ke@teex.tamu.edu or call (800) 541-7149

Contact Information

Knowledge Engineering
Phone: (979) 458-6710 | Toll-Free: (800) 541-7149
Email: ke@teex.tamu.edu

Policies

TEEX Policies

My skill level as an investigator is instantly increased as a result of this course.

— Bloodstain Pattern Analysis
Back to top