Cybersecurity Fundamentals
AWR418 – 4.00 Hours
Schedule
EC AWR418 28 | Register |
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.
Course Description
This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the University of Arkansas System Criminal Justice Institute (CJI). The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost.
This four-hour web-based course is an introduction to cybersecurity fundamentals for technologists and Information Technology Managers. Topics addressed will highlight cybersecurity concepts and best practices that are core to a cybersecurity program for an organization. This course will serve as a guide to identify the essential cybersecurity principles needed in an organization, discuss how these principles protect networks and data, it will address current cyber threats confronting organizations today, and will highlight best practices used to protect, defend, respond, and recover from cyber incidents and attacks.
Prerequisites
-
There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid
Course Completion Requirements
Participants must complete all course content and score a 70% or better on the Post-Test to receive a course certificate of completion.
Attendance Requirements
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Recommended
To prevent issues during your online course, the following is recommended:
- Broadband connection
- Current browser updated to the latest version (i.e., Edge, Chrome, Firefox, Safari)
- Pop-ups must be enabled.
- Adobe Acrobat Reader 7 or higher
Upon successful completion, you will be able to:
- Explain some cyber threats and vulnerabilities that can affect an organization, and the importance of having written cybersecurity policies and procedures in place
- Explain the core security principles and the essential security controls for protecting the organization and securing data
- Explain the importance of protecting the organization by applying cybersecurity policies, mitigating risks, and planning to recover from cyber-attacks
Suggested Audience
The target audience for this course includes Information Technology Support Personnel and technically proficient mid-level management. The audience can be comprised of individual participants, as well as organizational divisions or a combination of both.
Participants in this course should be currently serving in an Information Technology support capacity or come from an Information Technology middle management position.
Other Information
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
Government Programs
- For DHS/FEMA Funded Courses, please contact [email protected] or call (800) 541-7149
Contact Information
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]