End-User Security and Privacy

AWR300 – 4.00 Hours

Schedule

Details Buttons Dates Location Class Price Register Buttons
10/01/24 – 04/30/25 College Station, TX EC AWR300 10 Register

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.

Course Description

National Cybersecurity Preparedness Consortium logo      University of Memphis

This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner University of Memphis Center for Information Assurance. The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost.

The changing cybersecurity landscape along with Work from Home (WFH) strategies has affected the workforce worldwide. The unexpected pandemic of 2020 opened the doors to cyber-attacks in vulnerable remote work environments. Cybersecurity threats impacted remote workers and some organizations, requiring them to use more secure cyber-enabled systems, devices, and services. This new online course provides cybersecurity preparedness training for end-users regarding cybercriminal motivations and tactics. The course equips end-users to adequately configure firewalls, routers, switches, and implement network segmentation. It provides instructions for using device and file locking mechanisms for personal computers and mobile devices; how to set up different types of user accounts; and how to secure cyber-enabled devices on smart home networks. It also informs end-users how to use encryption for data in transit and at rest; precautions about using internet service providers and content providers; and provides examples of cybersecurity best practices and data privacy regulations.

Prerequisites

There are no prerequisites for this course.

Enrollment Requirements

Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.

Course Completion Requirements

Participants must complete all course content and score a 70% or better on the Post-Test to receive a course certificate of completion.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignment, activities, quizzes and/or end of course exam.

To ensure participant success in this course, participants should possess:

  • Basic Microsoft Windows skills. 
  • Basic level of cybersecurity knowledge

Upon successful completion, you will be able to:

  • Explain cybercrime and motivations and tactics of cybercriminals.
  • Explain different types of host-based firewalls, routers, switches, and network segmentation.
  • Explain different types of user accounts and credential sharing.
  • Explain device and locking mechanisms.
  • Explain seamless controlled access to information across different cyber-enabled devices.
  • Explain end-to-end encryption (e.g., VPN, SSH).
  • Explain security threats from Apps and data sharing.
  • Explain online content providers and local Internet Service Providers (ISPs) regarding access rights, unintentional data sharing, and mobile apps.
  • Explain how to be compliant to a NIAP Protection Profile (PP).

Suggested Audience

The target audience is anyone who has managerial or supervisory responsibility to make or influence decisions or policies regarding access to digital resources and services. This course is also beneficial for non-decision and policy makers.

Government Programs

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]