Demystifying Cyber Attacks

AWR421 – 8.00 Hours

Schedule

Details Buttons Dates Location Class Price Register Buttons
01/14/25 – 01/14/25 Honolulu, HI EC AWR421 33 Register
01/30/25 – 01/30/25 Corpus Christi, TX EC AWR421 38 Register

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.

Course Description

US Flag Through discussion, pre-recorded attacks, and live example attacks, Demystifying Cyber Attacks will explain and demonstrate common cyber attacks for non-technical participants. Participants will also learn how common cyber attacks can be disrupted at various points of the cyber kill chain using mitigation and response strategies. 

As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

Prerequisites

There are no prerequisites for this course.

Enrollment Requirements

Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.

Course Completion Requirements

  • Photo identification on the first day of class. See the Participant Handbook for approved forms of identification and additional guidelines.
  • Attend 80% of course hours
  • Score 70% or better on the Post-Test

Attendance Requirements

Class attendance is an essential part of the education process and participants in TEEX courses are expected to attend all class sessions and field exercises. This course requires participants to attend a minimum of 80% of the class hours as a component of successful course completion. During the course, your instructor will review any additional attendance requirements, for example a field exercise that cannot be missed

Upon successful completion, you will be able to:

  • Identify various cyber actors and threat vectors.
  • Explain how common cyber attacks are conducted.
  • Identify strategies for mitigating and disrupting various cyber attacks.

Suggested Audience

Non-technical federal, state, local, regional, tribal, and territorial government officials; business leaders; managers; and employees who have an interested in improving cybersecurity in their organizations. 

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]