AWR431 – 6.00 Hours

Schedule

EC AWR431 1 Register

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.

Course Description

The changing cybersecurity landscape and the Work from Home (WFH) strategies due to the COVID-19 pandemic affected the workforce worldwide. This unexpected pandemic opened the doors to vulnerable cyber-attacks in remote home office environments. Cyber security threats impacted WFH workers and some organizations, requiring them to use different cyber-enabled systems, devices, and services. 

This introductory course provides the participants with general knowledge of complex cyberattacks and prepares the work-from-home (WFH) users to identify and manage emerging threats. This course will address the unique vulnerabilities in the remote working environment and the systems software, hardware, and applications used to support remote workers. The course will also cover user awareness of cyber hygiene for remote home office workers and the workplace. 


This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner University of Memphis Center for Information Assurance. The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost.

University of Memphis

Prerequisites

There are no prerequisites for this course.

Enrollment Requirements

Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasidopens in a new tab; or with TEEX assistance upon arrival for class.

Course Completion Requirements

Participants must complete all course content and score a 70% or better on the Post-Test to receive a course certificate of completion.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignment, activities, quizzes and/or end of course exam.

A basic level of cybersecurity
knowledge.

Upon successful completion, you will be able to:

  • Explain the security challenges of remote work arrangements (i.e., Company Office, Remote Work, Hybrid Working Arrangement).
  • Explain examples of attack vectors.
  • Explain examples of attack surfaces.
  • Explain commonly targeted devices and associated protective controls.
  • Explain various ways to protect remote assets.
  • Explain examples of social engineering techniques and steps to prevent becoming a victim.
  • Explain examples of cyber hygiene best practices.

Suggested Audience

Anyone who has managerial or supervisory responsibility to make or influence decisions or policies regarding the accessibility of digital resources and services.

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]

Back to top