AWR418 – 4.00 Hours
|EC AWR418 2||Register|
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or email@example.com to get the latest schedule.
This four-hour web-based course is an introduction to cybersecurity fundamentals for technologists and Information Technology Managers. Topics addressed will highlight cybersecurity concepts and best practices that are core to a cybersecurity program for an organization. This course will serve as a guide to identify the essential cybersecurity principles needed in an organization, discuss how these principles protect networks and data, it will address current cyber threats confronting organizations today, and will highlight best practices used to protect, defend, respond, and recover from cyber incidents and attacks.
This course was developed by the University of Arkansas System Criminal Justice Institute (CJI) through the DHS/FEMA Homeland Security National Training Program.
- Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us for more information on the approval process.
Course Completion Requirements
This course will contain a pretest and a post-test to assess the learning of each participant. A participant will be required to pass the course’s post-test with a score of at least 70% in order to receive a course completion certificate.
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
- Introduction to cybersecurity
- Introduction to cyber threats and vulnerabilities and their impacts
- Types of Attacks
- Core security principles
- Essential security controls
- Secure network design
- Controlling access
- Awareness programs
- Cybersecurity policies
- Risk management
- Disaster recovery planning
The target audience for this course includes Information Technology Support Personnel and technically proficient mid-level management. The audience can be
comprised of individual participants, as well as organizational divisions or a combination of both.
Participants in this course should be currently serving in an Information Technology support capacity or come from an Information Technology middle management position.