Examining Advanced Persistent Threats
AWR403 – 4.00 Hours
Schedule
Details Buttons | Dates | Location | Class | Price | Register Buttons |
---|---|---|---|---|---|
11/01/24 – 05/31/25 | College Station, TX | EC AWR403 39 | Register |
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.
Course Description
Today’s advanced persistent threats (APTs) are increasingly sophisticated, varied, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). Inadequate deployment and maintenance of security on these systems could provide opportunities for attackers to harm to the American citizenry through NCISS infrastructure and associated resource disruption.
This online course provides an overview of similarities and differences between traditional systems attacks and APT attacks. At the end of this course, participants should possess a fundamental understanding of the most common attack path for various advanced persistent threats (APTs). The course covers (a) the cyber kill chain model (b) APT cases and attack techniques and tools; and (c) common APT defense strategies
This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the Norwich University Applied Research Institutes (NUARI). The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost.
Prerequisites
Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us for more information on the approval process.
Students must have a FEMA Student Identification Number (SID) to register for this class. To obtain a SID, register online at https://cdp.dhs.gov/femasid.
Course Completion Requirements
Students must earn a minimum score of 70% on all module post-tests to receive their certificate.
Attendance Requirements
To meet attendance requirements, participants must review each training module and complete all required course assignment, activities, quizzes and/or end of course exam.
Recommended
To prevent issues during your online course, the following is recommended:
- Broadband connection
- Current browser updated to the latest version (i.e., Edge, Chrome, Firefox, Safari)
- Pop-ups must be enabled.
- Adobe Acrobat Reader 7 or higher
Upon successful completion, you will be able to:
- Describe APT characteristics and APT attack phases.
- Identify and define the processes and tools used by an APT attacker.
- Discuss the cyber kill chain process and it was used in different industries.
Suggested Audience
The target audience for this course includes Managers, Supervisors and Administrative personnel that oversee IT personnel working in NCISS locations like water treatment and electrical.
Continuing Education And Professional Credits
- State Board for Educator Certification (SBEC)/Texas Education Agency (TEA)
Other Information
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
Government Programs
- For DHS/FEMA Funded Courses, please contact [email protected] or call (800) 541-7149
Contact Information
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]