AWR403 – 4.00 Hours

Schedule

EC AWR403 2 Register

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or bcs@teex.tamu.edu to get the latest schedule.

Course Description

Today’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). Inadequate deployment and maintenance of security on these systems could provide opportunities for attackers to harm to the American citizenry through NCISS infrastructure and associated resource disruption. 

This online course provides an overview of similarities and differences between traditional systems attacks and APT attacks. At the end of this course, participants should possess a fundamental understanding of the most common attack path for various advanced persistent threats (APTs). The course covers (a) the cyber kill chain model (b) APT cases and attack techniques and tools; and (c) common APT defense strategies.

This course was developed by the University of Memphis through the DHS/FEMA Homeland Security National Training Program.  

Prerequisites

  • Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us at bcs@teex.tamu.edu or call (800) 541-7149 for more information on the approval process.

Course Completion Requirements

Students must earn a minimum score of 70% on all module post-tests to receive their certificate.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignment, activities, quizzes and/or end of course exam.

Topics

  • How are APT attacks different from Traditional Attacks
  • Motivation behind APT attack
  • APT Targets
  • APT Attack Kill Chain Process
  • Attack Techniques & Tools
  • Video Game Industry Case Study
  • Healthcare Case Study
  • Government Attack Case Study
  • Citrix Case Study

Suggested Audience

The target audience for this course includes Managers, Supervisors and Administrative personnel that oversee IT personnel working in NCISS locations like water treatment and electrical.

Government Programs

  • For DHS/FEMA Funded Courses, please contact bcs@teex.tamu.edu or call (800) 541-7149

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837 | Toll-Free:
Email: bcs@teex.tamu.edu

This course was above and beyond my expectations.

— Forensic Technician
Back to top