AWR367 – 8.00 Hours
TEEX-Internet Moodle Campus
Texas A&M University Systems Building
College Station, TX 77845
08:00 AM Thursday, October 01, 2020
Central Daylight Time (CDT)
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at (800) 541-7149 or firstname.lastname@example.org to get the latest schedule.
This online course covers topics on social engineering attack techniques and tools, while also equipping learners with a better understanding of how attackers use people as the weakest link to compromise targeted organizations. Participants will learn about social engineering and become familiar with phishing attacks, develop security awareness and take preventive measures.
This course was developed by the University of Memphis, Center for Information Assurance (CfIA) through the DHS/FEMA Homeland Security National Training Program.
There are no prerequisites for this course.
Course Completion Requirements
In addition to a modern computer and internet access, learners require the following software packages (all are available at no cost from their respective manufacturers):
Adobe Flash Player 9 or later and one of the following web-browsers:
- Internet Explorer (v7.0 or later)
- Mozilla Firefox (v188.8.131.52 or later)
- Opera (v9.23 or later)
- Apple Safari (v3.0.3 or later for Windows, v2.0.4 or later for MacOS)
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Broadband connection recommended.
- Introduction to Social Engineering Attacks
- The Psychological Aspects of Social Engineering Attacks
- Types of Social Engineering Attacks
- Social Engineering Tools
- Prevention and Mitigation of Social Engineering Attacks
This course is for Government and Business IT Professionals whose responsibilities include the regular use of computing devices to connect to and perform official duties, such as responding to incidents and events that occur in cyber or in the physical critical infrastructure within the local government, federal, and private industry. These include, but are not limited to people in the following industries:
- Emergency Management Agency
- Finance & Administration
- Health Care and Emergency Medical Services
- Fire Service
- Public health
- Public Safety Communications
- Human Resources
- Information Technology (IT)
- Risk Management
- Law Enforcement
- For DHS/FEMA Funded Courses, please contact email@example.com or call (800) 541-7149