Demystifying Cyber Attacks
AWR421 – 8.00 Hours
Schedule
Details Buttons | Dates | Location | Class | Price | Register Buttons |
---|---|---|---|---|---|
01/14/25 – 01/14/25 | Honolulu, HI | EC AWR421 33 | Register | ||
01/30/25 – 01/30/25 | Corpus Christi, TX | EC AWR421 38 | Register |
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.
Course Description
Through discussion, pre-recorded attacks, and live example attacks, Demystifying Cyber Attacks will explain and demonstrate common cyber attacks for non-technical participants. Participants will also learn how common cyber attacks can be disrupted at various points of the cyber kill chain using mitigation and response strategies.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites
There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.
Course Completion Requirements
- Photo identification on the first day of class. See the Participant Handbook for approved forms of identification and additional guidelines.
- Attend 80% of course hours
- Score 70% or better on the Post-Test
Attendance Requirements
Class attendance is an essential part of the education process and participants in TEEX courses are expected to attend all class sessions and field exercises. This course requires participants to attend a minimum of 80% of the class hours as a component of successful course completion. During the course, your instructor will review any additional attendance requirements, for example a field exercise that cannot be missed
Upon successful completion, you will be able to:
- Identify various cyber actors and threat vectors.
- Explain how common cyber attacks are conducted.
- Identify strategies for mitigating and disrupting various cyber attacks.
Suggested Audience
Non-technical federal, state, local, regional, tribal, and territorial government officials; business leaders; managers; and employees who have an interested in improving cybersecurity in their organizations.
Contact Information
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]