End-User Security and Privacy
AWR300 – 4.00 Hours
Schedule
Details Buttons | Dates | Location | Class | Price | Register Buttons |
---|---|---|---|---|---|
10/01/24 – 04/30/25 | College Station, TX | EC AWR300 10 | Register |
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.
Course Description
This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner University of Memphis Center for Information Assurance. The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost.
The changing cybersecurity landscape along with Work from Home (WFH) strategies has affected the workforce worldwide. The unexpected pandemic of 2020 opened the doors to cyber-attacks in vulnerable remote work environments. Cybersecurity threats impacted remote workers and some organizations, requiring them to use more secure cyber-enabled systems, devices, and services. This new online course provides cybersecurity preparedness training for end-users regarding cybercriminal motivations and tactics. The course equips end-users to adequately configure firewalls, routers, switches, and implement network segmentation. It provides instructions for using device and file locking mechanisms for personal computers and mobile devices; how to set up different types of user accounts; and how to secure cyber-enabled devices on smart home networks. It also informs end-users how to use encryption for data in transit and at rest; precautions about using internet service providers and content providers; and provides examples of cybersecurity best practices and data privacy regulations.
Prerequisites
There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.
Course Completion Requirements
Participants must complete all course content and score a 70% or better on the Post-Test to receive a course certificate of completion.
Attendance Requirements
To meet attendance requirements, participants must review each training module and complete all required course assignment, activities, quizzes and/or end of course exam.
Recommended
To ensure participant success in this course, participants should possess:
- Basic Microsoft Windows skills.
- Basic level of cybersecurity knowledge
Upon successful completion, you will be able to:
- Explain cybercrime and motivations and tactics of cybercriminals.
- Explain different types of host-based firewalls, routers, switches, and network segmentation.
- Explain different types of user accounts and credential sharing.
- Explain device and locking mechanisms.
- Explain seamless controlled access to information across different cyber-enabled devices.
- Explain end-to-end encryption (e.g., VPN, SSH).
- Explain security threats from Apps and data sharing.
- Explain online content providers and local Internet Service Providers (ISPs) regarding access rights, unintentional data sharing, and mobile apps.
- Explain how to be compliant to a NIAP Protection Profile (PP).
Suggested Audience
The target audience is anyone who has managerial or supervisory responsibility to make or influence decisions or policies regarding access to digital resources and services. This course is also beneficial for non-decision and policy makers.
Government Programs
- For DHS/FEMA Funded Courses, please contact [email protected] or call (800) 541-7149
Contact Information
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]