CYB804 – 4.00 Hours

Schedule

Details11/11/20 – 11/11/20Live Online Instructor-Led TrainingEC CYB804 3$190.00Register

Address

Live Online Instructor-Led Training

Instructor

Michael Olden

Start Time

09:00 AM Wednesday, November 11, 2020
Central Daylight Time (CDT)

Details12/02/20 – 12/02/20Live Online Instructor-Led TrainingEC CYB804 4$190.00Register

Address

Live Online Instructor-Led Training

Instructor

Michael Olden

Start Time

09:00 AM Wednesday, December 02, 2020
Central Daylight Time (CDT)

Details12/16/20 – 12/16/20Live Online Instructor-Led TrainingEC CYB804 5$190.00Register

Address

Live Online Instructor-Led Training

Instructor

Michael Olden

Start Time

09:00 AM Wednesday, December 16, 2020
Central Daylight Time (CDT)

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at (800) 541-7149 or ke@teex.tamu.edu to get the latest schedule.

Course Description

Every organization has a unique set of cybersecurity risks which may include local and/or remote employees, computer software and hardware, vendor access, and/or the internet connected equipment necessary for business operations. This course covers key concepts, issues, and considerations for evaluating cybersecurity risks from an organizational perspective.

Prerequisites

There are no prerequisites for this course.

Course Completion Requirements

Important information that you will need for this class:

  • You will need to have a reliable internet connection.
  • Your computer will need speakers or a headphone set to hear the audio.
  • A microphone is not required, but recommended because it will make participation easier for you.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.

Topics

  • Describe common methodologies for assessing cybersecurity vulnerabilities in enterprise IT networks
  • Discuss the development of a vulnerability management program.
  • Understand how to use commonly used tools to perform basic vulnerability assessments against a network, interpreting the results, and presenting remediation recommendations to management.

Suggested Audience

This course is designed for:

IT personnel, risk management and leadership of
businesses in all industries including, but not limited to, manufacturing, restaurant,
retail, banking, insurance and healthcare.

Contact Information

Knowledge Engineering
Phone: (979) 458-6710 | Toll-Free: (800) 541-7149
Email: ke@teex.tamu.edu

The course turned out to be even better than we envisioned. To be able to come together to gain more knowledge of incident command/unified command structure allowed for some real hands-on type training.

— Cathy Haynes, Charleston County, South Carolina
Back to top