Cyber Readiness Center

The Texas A&M Engineering Extension Service (TEEX), Cyber Readiness Center (CRC) is a premier provider of cybersecurity training and technical assistance services. Our core capabilities are tailored to help you and your organization build resiliency from within through technical assessments, expert guidance, training, and exercise development. Services are provided by a team with decades of experience in private industry, critical infrastructure, military, and government cybersecurity applications. From “in the trenches” technical expertise to leadership, communications, planning, and policy experience, the CRC team has a proven track record of practical solutions for government and private sector organizations. 

Applied Cybersecurity Services

Our enterprise services are tailored to help any organization build and improve cyber resiliency from within. The CRC offers a variety of cybersecurity services including  assessments, penetration testing, planning, custom training, exercises, and technical remediation.  For more information on our Applied Cybersecurity Services, click here.

Cybersecurity Training

No country, industry, community or individual is immune to cyber risks. As a founding member of the National Cybersecurity Preparedness Consortium, TEEX offers a wide range of online and face-to-face cybersecurity training opportunities. For those new to cybersecurity, non-technical introductory courses create basic awareness and explore cybersecurity in a community context by building basic terminology and identifying fundamental cyber threats, vulnerabilities and countermeasures. Classroom-based training provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent, and/or stop operations and emergency responses in a community. The web-based courses are designed to ensure that the privacy, reliability, and integrity of the information systems that power the global economy remain intact and secure. 

These courses are certified by the American Council on Education (ACE) for recommended college credit at the completion of each track.

Searching for virus

Cybersecurity 2


CategoryCourse #Course TitleDescriptionFunding Options & Delivery TypesDivisionLearn More Buttons
Business CybersecurityAWR376Understanding Targeted Cyber Attacks
This course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to, and recover from targeted cyber attacks. This course will fill the gap in threat-specific training for cybersecurity as a community-driven course that focuses on the phases of targeted cyber attacks and the attacker methods used during each phase. Participants will also receive valuable information on cyber attack prevention, mitigation and response.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
This course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to, and recover from targeted cyber attacks. This course will fill the gap…
Show more
DHS/FEMA
Face-to-Face Online Instructor-Led
BCSLearn More about Understanding Targeted Cyber Attacks
Business CybersecurityAWR383Cybersecurity Risk Awareness for Officials and Senior Management
This is a non-technical course meant to develop awareness of cybersecurity risks so that elected officials, appointed officials, and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and senior management work more effectively with their Information Technology (IT) departments to mitigate cyber threats. The training is tailored to government, critical infrastructure, and private sector personnel who have the responsibility for directing and developing policy within their organization.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
This is a non-technical course meant to develop awareness of cybersecurity risks so that elected officials, appointed officials, and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and…
Show more
DHS/FEMA
Face-to-Face
BCSLearn More about Cybersecurity Risk Awareness for Officials and Senior Management
Business CybersecurityAWR395Cybersecurity in the Workplace
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the organization’s data/information is every employee’s responsibility. This course will help students understand the different types of cyber attacks their company may face, the type of information that is at risk, how to recognize cyber attacks, and why it is important for everyone in the organization to participate in cybersecurity.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the…
Show more
DHS/FEMA
Online
BCSLearn More about Cybersecurity in the Workplace
Business CybersecurityAWR399Detecting and Responding to a Cyber Attack
As computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection. This course will introduce students to various types of cyber attacks and how to detect and respond to them in order to protect their data and information.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
As computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to…
Show more

Online
BCSLearn More about Detecting and Responding to a Cyber Attack
Business CybersecurityAWR421Demystifying Cyber Attacks
Through discussion, pre-recorded attacks, and live example attacks, Demystifying Cyber Attacks will explain and demonstrate common cyber attacks for non-technical participants. Participants will also learn how common cyber attacks can be disrupted at various points of the cyber kill chain using mitigation and response strategies. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
Through discussion, pre-recorded attacks, and live example attacks, Demystifying Cyber Attacks will explain and demonstrate common cyber attacks for non-technical participants. Participants will also learn how common cyber attacks can be disrupted at various points of the cyber kill chain…
Show more

Face-to-Face
BCSLearn More about Demystifying Cyber Attacks
Business CybersecurityCYB500Cyber Readiness Summit
Cyber attacks on businesses, manufacturers, cities, school districts, emergency services and infrastructure are on the rise. Prepare you organization for a cyber attack by attending the first annual TEEX Cyber Readiness Summit! The event’s theme will be “Driving a healthy, prosperous, resilient community,” and keynote and session topics will cover all components of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond and Recover. Show less
Cyber attacks on businesses, manufacturers, cities, school districts, emergency services and infrastructure are on the rise. Prepare you organization for a cyber attack by attending the first annual TEEX Cyber Readiness Summit! The event’s theme will be “Driving a healthy, prosperous,…
Show more

Face-to-Face
BCSLearn More about Cyber Readiness Summit
Business CybersecurityMGT303Cybersecurity Vulnerability Assessment
The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities include examining, analyzing, and prioritizing assets, risks, and vulnerabilities to develop a vulnerability assessment report that could be delivered to organizational leadership. This course utilizes active discussions and activities to extend the participant’s understanding of vulnerability assessments.   Show less
The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities…
Show more

Face-to-Face
BCSLearn More about Cybersecurity Vulnerability Assessment
Business CybersecurityPER398Cybersecurity Resiliency in Industrial Control Systems
The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. State, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will…
Show more

Face-to-Face
BCSLearn More about Cybersecurity Resiliency in Industrial Control Systems
Community CybersecurityAWR136Essentials of Community Cybersecurity
The Essentials of Community Cybersecurity (ECCS) course provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent, and/or stop operations and emergency responses in a community. The course also provides a cursory introduction to cybersecurity vulnerabilities, risks, threats, and countermeasures. It explains vulnerabilities of computer systems and networks and how these vulnerabilities can affect communities, organizations, and daily workplace operations. The course introduces actions communities can take in establishing a cybersecurity program. The course provides participants with an awareness of issues. It gives an overview of threats and vulnerabilities, without going into too many details, to highlight the potential impact a cyber attack could have. Participants discuss some of the fundamental activities needed to develop a cybersecurity program, without addressing the technical details of how to secure critical infrastructures. The course introduces the Community Cybersecurity Maturity Model (CCSMM) as a framework for understanding community cybersecurity and offers a brief introduction to low-cost or no-cost approaches to securing a community against cybersecurity threats and attacks. The course sets the stage for further efforts in which a community can build a cybersecurity program.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The Essentials of Community Cybersecurity (ECCS) course provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent, and/or stop operations and emergency responses in a community. The course also provides a cursory introduction to…
Show more
GSADHS/FEMA
Face-to-Face Online Instructor-Led
BCSLearn More about Essentials of Community Cybersecurity
Community CybersecurityAWR353Using the Comm CS Maturity Model to Develop a CS Program
Using the Community Cyber Security Maturity Model to Develop a Cyber Security Program will introduce students to the DHS-supported Community Cyber Security Maturity Model (CCSMM) which can be used as a guide for communities and states in developing their own CCSMM-consistent cybersecurity programs. Students will learn what is required to develop a coordinated, sustained, and viable community cyber security program and the resources available to assist in improving awareness, information sharing, policies, and plans. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner The University of Texas at San Antonio Center for Infrastructure Assurance and Security (UTSA/CIAS).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
Using the Community Cyber Security Maturity Model to Develop a Cyber Security Program will introduce students to the DHS-supported Community Cyber Security Maturity Model (CCSMM) which can be used as a guide for communities and states in developing their own CCSMM-consistent cybersecurity…
Show more
DHS/FEMA
Online
BCSLearn More about Using the Comm CS Maturity Model to Develop a CS Program
Community CybersecurityAWR366Developing a Cyber Security Annex for Incident Response
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018)The National Response Framework describes how preparedness can be achieved by developing an incident annex for each hazard. Incident annexes describe coordinating structures used to deliver core capabilities and support response missions unique to a specific type of incident. Incident annexes describe specialized response teams, resources, roles, responsibilities, and other scenario-specific considerations. At the end of this course, participants should possess the fundamentals needed to design and develop a cyber annex for states, locals, tribes, and/or territories (SLTTs). It addresses what the annex is, how it is used, who should participate in the design, implementation, and execution.     This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner The University of Texas at San Antonio Center for Infrastructure Assurance and Security (UTSA/CIAS).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing…
Show more
DHS/FEMA
Online
BCSLearn More about Developing a Cyber Security Annex for Incident Response
Community CybersecurityAWR367Understanding Social Engineering Attacks
This online course covers topics on social engineering attack techniques and tools, while also equipping learners with a better understanding of how attackers use people as the weakest link to compromise targeted organizations. Participants will learn about social engineering and become familiar with phishing attacks, develop security awareness and take preventive measures. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the University of Memphis, Center for Information Assurance (CfIA).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
This online course covers topics on social engineering attack techniques and tools, while also equipping learners with a better understanding of how attackers use people as the weakest link to compromise targeted organizations. Participants will learn about social engineering and become…
Show more
DHS/FEMA
Online
BCSLearn More about Understanding Social Engineering Attacks
Community CybersecurityAWR368Introduction to Basic Vulnerability Assessment Skills
This course introduces the preparatory skills needed to learn penetration testing and vulnerability assessment, and familiarizes Information Technology support personnel and managers with the tactics, techniques and procedures (TTPs) that are used by attackers and penetration testers. Participants will have an increased knowledge and understanding about the tools used in a cyber-attack and in turn be better able to prepare defenses. The course focuses on the basic skills and knowledge needed to conduct and plan vulnerability assessments and penetration tests as well as show how to legally and ethically conduct tests and assessments. Participants will be introduced to Open Source tools such as Metasploit and Nmap, as well as methodologies for researching vulnerabilities. This course is designed based on research and federal agency reports.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the Norwich University Applied Research Institutes (NUARI).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
This course introduces the preparatory skills needed to learn penetration testing and vulnerability assessment, and familiarizes Information Technology support personnel and managers with the tactics, techniques and procedures (TTPs) that are used by attackers and penetration testers….
Show more
DHS/FEMA
Online
BCSLearn More about Introduction to Basic Vulnerability Assessment Skills
Community CybersecurityAWR376Understanding Targeted Cyber Attacks
This course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to, and recover from targeted cyber attacks. This course will fill the gap in threat-specific training for cybersecurity as a community-driven course that focuses on the phases of targeted cyber attacks and the attacker methods used during each phase. Participants will also receive valuable information on cyber attack prevention, mitigation and response.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
This course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to, and recover from targeted cyber attacks. This course will fill the gap…
Show more
DHS/FEMA
Face-to-Face Online Instructor-Led
BCSLearn More about Understanding Targeted Cyber Attacks
Community CybersecurityAWR381Establishing an Information Sharing and Analysis Organization
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018)The growing Information Sharing and Analysis Organization (ISAO) ecosystem provides an opportunity to empower the nation to become more educated and effective in preventing, detecting, and responding to the increasingly sophisticated landscape of cyber threats. There are considerable challenges with the vast quantity of information, the complexities of analysis, and the uncertainties of sharing data with a large network of organizations.In the 2016 National Preparedness Report, 88% of states and territories indicated a high prioritization of cybersecurity, with only a 13% proficiency in that capability. Likewise, 86% of states and territories ranked intelligence and information sharing as a high priority, with a reported 57% proficiency in that capability. The establishment of an ISAO is a critical step to improve both of these capabilities.Executive Order 13691 encourages the formation of ISAOs, and states that “organizations engaged in the sharing of information related to cybersecurity risks and incidents play an invaluable role in the collective cybersecurity of the United States”. At the end of this course, participants should possess the fundamentals needed to design and develop an Information Sharing and Analysis Organization (ISAO) for states, locals, tribes, and/or territories (SLTTs). It addresses what the ISAO is, how it is used, who should participate in the design, implementation, building, and execution.     This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner The University of Texas at San Antonio Center for Infrastructure Assurance and Security (UTSA/CIAS).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing…
Show more
DHS/FEMA
Online
BCSLearn More about Establishing an Information Sharing and Analysis Organization
Community CybersecurityAWR383Cybersecurity Risk Awareness for Officials and Senior Management
This is a non-technical course meant to develop awareness of cybersecurity risks so that elected officials, appointed officials, and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and senior management work more effectively with their Information Technology (IT) departments to mitigate cyber threats. The training is tailored to government, critical infrastructure, and private sector personnel who have the responsibility for directing and developing policy within their organization.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
This is a non-technical course meant to develop awareness of cybersecurity risks so that elected officials, appointed officials, and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and…
Show more
DHS/FEMA
Face-to-Face
BCSLearn More about Cybersecurity Risk Awareness for Officials and Senior Management
Community CybersecurityAWR384Cyber Identity and Authentication
Despite the fact that passwords have been used in digital systems for over half a century and many standards and best practices have been developed, many organizations simply neglect to adhere to these standards and expose weaknesses for attackers to exploit. This course provides basic digital identity concepts, biometric authentication and multi-factor authentication approaches that can increase security. The learner will explore various authentication standards and techniques that can prevent unauthorized access of digital resources and services. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the University of Memphis, Center for Information Assurance (CfIA).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
Despite the fact that passwords have been used in digital systems for over half a century and many standards and best practices have been developed, many organizations simply neglect to adhere to these standards and expose weaknesses for attackers to exploit. This course provides basic digital…
Show more
DHS/FEMA
Online
BCSLearn More about Cyber Identity and Authentication
Community CybersecurityAWR385Mobile Device Security and Privacy
This course is designed to assist individuals better understand security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Using scenarios, thought challenges and exercises as a framework, students will learn about: The purpose of Enterprise Mobile Management platforms Elements that make mobile networks and operating systems differentMobile malware classifications and detection strategiesMobile architecture data leakage detection and prevention strategies.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the University of Memphis, Center for Information Assurance (CfIA).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
This course is designed to assist individuals better understand security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Using scenarios, thought…
Show more
DHS/FEMA
Online
BCSLearn More about Mobile Device Security and Privacy
Community CybersecurityAWR388Cyber Awareness for Municipal Police Fire & EMS Information Technology Prsnl
This 2 hour, web-based course will cover the basics of cyber awareness for Municipal, Police, Fire and EMS Information Technology personnel. Participants will have an increased knowledge of threats specific to their jurisdiction and an understanding of the processes and procedures needed to develop a cyber-awareness program. This course will focus on the steps involved in being aware of cyber threats and effectively communicating the processes and procedures to protect users against common cyber threats. The participants will apply this knowledge to developing processes and procedures to integrate cyber awareness into routine operations. Participants will gain an understanding and the knowledge needed to start developing and integrating cyber awareness programs in their specific jurisdictions. This course is intended to give managers and technical personnel working in Police, Fire, and EMS IT departments an introduction to becoming aware of cyber threats to their type of agencies. These types of agencies will be aware of threats specifically targeted at them and how to start a cyber-awareness program to combat the threat. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the Norwich University Applied Research Institutes (NUARI).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
This 2 hour, web-based course will cover the basics of cyber awareness for Municipal, Police, Fire and EMS Information Technology personnel. Participants will have an increased knowledge of threats specific to their jurisdiction and an understanding of the processes and procedures needed to…
Show more

Online
BCSLearn More about Cyber Awareness for Municipal Police Fire & EMS Information Technology Prsnl
Community CybersecurityAWR396Network Security for Homes and Small Businesses
The Internet (the world’s largest network) allows us to accomplish tasks more conveniently and efficiently at home, work and on the road! However, there are security risks with networks, and users must be aware and remain vigilant about these risks and how to secure their home or small business network. This course will introduce students to the basics of networks for homes and small businesses and provide them with best practices to secure their networks in order to protect their personal information as well as other (friends, family, customers, vendors, etc.) information that may flow through their network.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The Internet (the world’s largest network) allows us to accomplish tasks more conveniently and efficiently at home, work and on the road! However, there are security risks with networks, and users must be aware and remain vigilant about these risks and how to secure their home or small…
Show more
DHS/FEMA
Online
BCSLearn More about Network Security for Homes and Small Businesses
Community CybersecurityAWR397Cybersecurity for Everyone
The purpose of this course is to provide students a general understanding of cybersecurity risk and best practices for protecting themselves and their devices from cyber attacks. This course will introduce you to the basics of protecting your computer and the data it stores as well as protecting yourself when you are online, on social media, and while using your mobile or smart devices.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The purpose of this course is to provide students a general understanding of cybersecurity risk and best practices for protecting themselves and their devices from cyber attacks. This course will introduce you to the basics of protecting your computer and the data it stores as well as…
Show more
DHS/FEMA
Online
BCSLearn More about Cybersecurity for Everyone
Community CybersecurityAWR402Introduction to Internet of Things
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things (IoT). This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security, and a variety of existing and developing technologies.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by TEEX, a partner in the NCPC. The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things (IoT). This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices,…
Show more
DHS/FEMA
Online
BCSLearn More about Introduction to Internet of Things
Community CybersecurityCYB401Cybersecurity Awareness and Protection for K-12 Educators
K-12 educators around the world are utilizing communication platforms to continue providing educational services and support for their students. This increased online usage has put our educators, their students and their workplace at risk of a cyber attack. In fact, a recent FBI report states that cyber crime has quadrupled since the onset of COVID-19.  Therefore, this course has been created specifically to give educators and their students the knowledge to be safe online.   Show less
K-12 educators around the world are utilizing communication platforms to continue providing educational services and support for their students. This increased online usage has put our educators, their students and their workplace at risk of a cyber attack. In fact, a recent FBI report…
Show more

Face-to-Face
BCSLearn More about Cybersecurity Awareness and Protection for K-12 Educators
Community CybersecurityMGT303Cybersecurity Vulnerability Assessment
The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities include examining, analyzing, and prioritizing assets, risks, and vulnerabilities to develop a vulnerability assessment report that could be delivered to organizational leadership. This course utilizes active discussions and activities to extend the participant’s understanding of vulnerability assessments.   Show less
The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities…
Show more

Face-to-Face
BCSLearn More about Cybersecurity Vulnerability Assessment
Community CybersecurityMGT384Preparing for Cyber Attacks and Incidents
MGT384,  Preparing for Cyber Attacks and Incidents, is designed to prepare organizations and communities for the next cyber attack or incident. During this 16- hour course, participants will analyze cyber threats, vulnerabilities, and initial and cascading impacts of cyber attacks and incidents, evaluate the process for developing a cyber preparedness program, examine the importance and challenges of cyber related information sharing and discover low to no cost resources to help build cyber resilience. This course utilizes a team approach to capitalize on the synergy of traditional emergency response organizations, SLTT governments, military, and public and private operators of critical infrastructure.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.Individuals completing this course in combination with AWR376, AWR169, AWR177, AWR395, AWR399, and AWR176 are awarded the Cybersecurity Awareness Certificate. Show less
MGT384,  Preparing for Cyber Attacks and Incidents, is designed to prepare organizations and communities for the next cyber attack or incident. During this 16- hour course, participants will analyze cyber threats, vulnerabilities, and initial and cascading impacts of cyber attacks and…
Show more
GSADHS/FEMA
Face-to-Face
BCSLearn More about Preparing for Cyber Attacks and Incidents
Community CybersecurityMGT452Physical and Cybersecurity for Critical Infrastructure
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. This course encourages collaboration efforts among individuals and organizations responsible for both physical and cybersecurity toward development of integrated risk management strategies that lead to enhanced capabilities necessary for the protection of our Nation’s critical infrastructure. Participants will identify physical and cybersecurity concerns impacting overall infrastructure security posture, examine integrated physical and cybersecurity incidents and the evolving risks and impacts they pose to critical infrastructure, and explore resources that can be applied to improve security within an organization, business, or government entity. Individuals completing this course in combination with AWR213, MGT310, MGT315, and MGT414 are awarded the TEEX Infrastructure Protection Certificate.This course meets Texas Commission on Law Enforcement (TCOLE) requirements for MGT452 Physical and Cyber Security for Critical Infrastructure course #78401. Show less
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. This course encourages collaboration efforts among individuals and organizations responsible for both physical and cybersecurity toward development of integrated risk…
Show more
DHS/FEMA
Face-to-Face Online Instructor-Led
NERRTCLearn More about Physical and Cybersecurity for Critical Infrastructure
Community CybersecurityMGT456Integration of Cybersecurity Personnel into the EOC for Cyber Incidents
This scenario-based course will guide emergency response organizations and critical infrastructure IT personnel through multiple simulated events to learn how to coordinate efforts during a cyber incident. These real-time exercises are designed to assist jurisdictions with managing cyber response efforts between traditional emergency responders and IT professionals. The use of expert instructors from IT and emergency response fields will offer participants real-world knowledge to successfully integrate cybersecurity personnel into the Emergency Operations Center (EOC). Show less
This scenario-based course will guide emergency response organizations and critical infrastructure IT personnel through multiple simulated events to learn how to coordinate efforts during a cyber incident. These real-time exercises are designed to assist jurisdictions with managing cyber…
Show more
GSADHS/FEMA
Face-to-Face
ESTILearn More about Integration of Cybersecurity Personnel into the EOC for Cyber Incidents
Community CybersecurityMGT465Recovering from Cybersecurity Incidents
This course is designed to provide guidance for the implementation of an effective cybersecurity incident recovery program from a pre-incident and post-incident perspective. The training focuses on connecting IT with emergency management and is intended for government, critical infrastructure, and private sector personnel who have the responsibility for recovering after a cyber incident. Short term tactical and long-term strategic activities are discussed culminating in the development of an action plan.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
This course is designed to provide guidance for the implementation of an effective cybersecurity incident recovery program from a pre-incident and post-incident perspective. The training focuses on connecting IT with emergency management and is intended for government, critical infrastructure,…
Show more
GSADHS/FEMA
Face-to-Face
NERRTCLearn More about Recovering from Cybersecurity Incidents
Community CybersecurityPER398Cybersecurity Resiliency in Industrial Control Systems
The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. State, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will…
Show more

Face-to-Face
BCSLearn More about Cybersecurity Resiliency in Industrial Control Systems
National Cybersecurity Preparedness Consortium-WebAWR389Incident Response for Municipal Police Fire & EMS Information Technology Prsnl
This 2 hour, web-based course introduces the basics of the incident response processes specific to Information Technology personnel in Municipal, Police, Fire or EMS departments. This course focuses on the steps involved in being aware of common cyber incidents, as well as steps in developing an incident response plan. The participants will apply this knowledge by developing a response plan specific to their jurisdiction.The content of the course includes: common cyber incidents occurring in Police, Fire and EMS IT departments, developing a response plan for common cyber incidents, distinguishing tasks for police, fire and EMS IT departments, and processes for future improvements to response plans.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the Norwich University Applied Research Institutes (NUARI).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
This 2 hour, web-based course introduces the basics of the incident response processes specific to Information Technology personnel in Municipal, Police, Fire or EMS departments. This course focuses on the steps involved in being aware of common cyber incidents, as well as steps in developing…
Show more
DHS/FEMA
Online
BCSLearn More about Incident Response for Municipal Police Fire & EMS Information Technology Prsnl
National Cybersecurity Preparedness Consortium-WebAWR398Introduction to Information Sharing and Analysis Organizations
This web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at multiple levels (State, Local, Tribal, Territorial) as well as senior management and decision-makers (including for commercial entities) to the value proposition of sharing cybersecurity information. The content of the course includes: The importance of cyber-security information sharingInformation sharing organizations and what they doSteps for cyber-security information sharing analysisThis course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the Norwich University Applied Research Institutes (NUARI).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
This web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at multiple levels…
Show more
DHS/FEMA
Online
BCSLearn More about Introduction to Information Sharing and Analysis Organizations
National Cybersecurity Preparedness Consortium-WebAWR402Introduction to Internet of Things
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things (IoT). This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security, and a variety of existing and developing technologies.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by TEEX, a partner in the NCPC. The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things (IoT). This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices,…
Show more
DHS/FEMA
Online
BCSLearn More about Introduction to Internet of Things
National Cybersecurity Preparedness Consortium-WebAWR403Examining Advanced Persistent Threats
Today’s advanced persistent threats (APTs) are increasingly sophisticated, varied, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). Inadequate deployment and maintenance of security on these systems could provide opportunities for attackers to harm to the American citizenry through NCISS infrastructure and associated resource disruption. This online course provides an overview of similarities and differences between traditional systems attacks and APT attacks. At the end of this course, participants should possess a fundamental understanding of the most common attack path for various advanced persistent threats (APTs). The course covers (a) the cyber kill chain model (b) APT cases and attack techniques and tools; and (c) common APT defense strategiesThis course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the Norwich University Applied Research Institutes (NUARI).  The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
Today’s advanced persistent threats (APTs) are increasingly sophisticated, varied, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS)….
Show more
DHS/FEMA
Online
BCSLearn More about Examining Advanced Persistent Threats
National Cybersecurity Preparedness Consortium-WebAWR418Cybersecurity Fundamentals
This four-hour web-based course is an introduction to cybersecurity fundamentals for technologists and Information Technology Managers. Topics addressed will highlight cybersecurity concepts and best practices that are core to a cybersecurity program for an organization. This course will serve as a guide to identify the essential cybersecurity principles needed in an organization, discuss how these principles protect networks and data, it will address current cyber threats confronting organizations today, and will highlight best practices used to protect, defend, respond, and recover from cyber incidents and attacks. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the University of Arkansas System Criminal Justice Institute (CJI). The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
This four-hour web-based course is an introduction to cybersecurity fundamentals for technologists and Information Technology Managers. Topics addressed will highlight cybersecurity concepts and best practices that are core to a cybersecurity program for an organization. This course will serve…
Show more
DHS/FEMA
Online
BCSLearn More about Cybersecurity Fundamentals
National Cybersecurity Preparedness Consortium-WebAWR431Remote Home/Office Cybersecurity Preparedness Training
The changing cybersecurity landscape and the Work from Home (WFH) strategies due to the COVID-19 pandemic affected the workforce worldwide. This unexpected pandemic opened the doors to vulnerable cyber-attacks in remote home office environments. Cyber security threats impacted WFH workers and some organizations, requiring them to use different cyber-enabled systems, devices, and services. This introductory course provides the participants with general knowledge of complex cyberattacks and prepares the work-from-home (WFH) users to identify and manage emerging threats. This course will address the unique vulnerabilities in the remote working environment and the systems software, hardware, and applications used to support remote workers. The course will also cover user awareness of cyber hygiene for remote home office workers and the workplace. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner University of Memphis Center for Information Assurance. The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
The changing cybersecurity landscape and the Work from Home (WFH) strategies due to the COVID-19 pandemic affected the workforce worldwide. This unexpected pandemic opened the doors to vulnerable cyber-attacks in remote home office environments. Cyber security threats impacted WFH workers and…
Show more

Online
BCSLearn More about Remote Home/Office Cybersecurity Preparedness Training
Online for Business Professionals (Cyber 301)AWR169Introduction to Cyber Incident Management
Introduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
Introduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with…
Show more
DHS/FEMA
Online
BCSLearn More about Introduction to Cyber Incident Management
Online for Business Professionals (Cyber 301)AWR176Disaster Recovery for Information Systems
Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including: Overview of business continuity and disaster recovery planning Planning process and strategies Implementation and management of a disaster recovery plan Work around procedures  Technical vulnerabilities faced by organizations Legal issues that may confront an organization As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including: Overview of business continuity and disaster recovery planning Planning process and strategies Implementation and management of a…
Show more
DHS/FEMA
Online
BCSLearn More about Disaster Recovery for Information Systems
Online for Business Professionals (Cyber 301)AWR177Information Risk Management
This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis,…
Show more
DHS/FEMA
Online
BCSLearn More about Information Risk Management
Online for Business Professionals (Cyber 301)AWR396Network Security for Homes and Small Businesses
The Internet (the world’s largest network) allows us to accomplish tasks more conveniently and efficiently at home, work and on the road! However, there are security risks with networks, and users must be aware and remain vigilant about these risks and how to secure their home or small business network. This course will introduce students to the basics of networks for homes and small businesses and provide them with best practices to secure their networks in order to protect their personal information as well as other (friends, family, customers, vendors, etc.) information that may flow through their network.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The Internet (the world’s largest network) allows us to accomplish tasks more conveniently and efficiently at home, work and on the road! However, there are security risks with networks, and users must be aware and remain vigilant about these risks and how to secure their home or small…
Show more
DHS/FEMA
Online
BCSLearn More about Network Security for Homes and Small Businesses
Online for Business Professionals (Cyber 301)AWR399Detecting and Responding to a Cyber Attack
As computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection. This course will introduce students to various types of cyber attacks and how to detect and respond to them in order to protect their data and information.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
As computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to…
Show more

Online
BCSLearn More about Detecting and Responding to a Cyber Attack
Online for Everyone – Non-Technical (Cyber 101)AWR168Foundations of Cyber Crimes
 Foundations of Cyber Crimes highlights a range of cyber crimes and the appropriate response by first responders and other local, state, and federal agencies that may encounter them. Participants will identify legislative, organizational, and suggested personal efforts to control or prevent cyber crimes. This course examines cyber and cyber facilitated non-violent white-collar crimes, fraud and financial crimes, and violent crimes. The broad landscape of the cyber crimes discussed in this course illustrates the fact that almost all crimes can either be directly committed or indirectly facilitated through the cyber domain-a result of society’s increasing integration and dependence on the Internet and computers into nearly every aspect of daily life.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
 Foundations of Cyber Crimes highlights a range of cyber crimes and the appropriate response by first responders and other local, state, and federal agencies that may encounter them. Participants will identify legislative, organizational, and suggested personal efforts to control or…
Show more
DHS/FEMA
Online
BCSLearn More about Foundations of Cyber Crimes
Online for Everyone – Non-Technical (Cyber 101)AWR174Cyber Ethics
 This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.? As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
 This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.? As…
Show more
DHS/FEMA
Online
BCSLearn More about Cyber Ethics
Online for Everyone – Non-Technical (Cyber 101)AWR395Cybersecurity in the Workplace
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the organization’s data/information is every employee’s responsibility. This course will help students understand the different types of cyber attacks their company may face, the type of information that is at risk, how to recognize cyber attacks, and why it is important for everyone in the organization to participate in cybersecurity.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the…
Show more
DHS/FEMA
Online
BCSLearn More about Cybersecurity in the Workplace
Online for Everyone – Non-Technical (Cyber 101)AWR397Cybersecurity for Everyone
The purpose of this course is to provide students a general understanding of cybersecurity risk and best practices for protecting themselves and their devices from cyber attacks. This course will introduce you to the basics of protecting your computer and the data it stores as well as protecting yourself when you are online, on social media, and while using your mobile or smart devices.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The purpose of this course is to provide students a general understanding of cybersecurity risk and best practices for protecting themselves and their devices from cyber attacks. This course will introduce you to the basics of protecting your computer and the data it stores as well as…
Show more
DHS/FEMA
Online
BCSLearn More about Cybersecurity for Everyone
Online for IT Professionals (Cyber 201)AWR138Network Assurance
Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. This course also includes information on securing cloud-based networks and applications.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting),…
Show more
DHS/FEMA
Online
BCSLearn More about Network Assurance
Online for IT Professionals (Cyber 201)AWR139Digital Forensics Basics
This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find…
Show more
DHS/FEMA
Online
BCSLearn More about Digital Forensics Basics
Online for IT Professionals (Cyber 201)AWR173Information Security Basics
 Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.  As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
 Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber…
Show more
DHS/FEMA
Online
BCSLearn More about Information Security Basics
Online for IT Professionals (Cyber 201)AWR178Secure Software
This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network…
Show more
DHS/FEMA
Online
BCSLearn More about Secure Software
Online for IT Professionals (Cyber 201)AWR395Cybersecurity in the Workplace
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the organization’s data/information is every employee’s responsibility. This course will help students understand the different types of cyber attacks their company may face, the type of information that is at risk, how to recognize cyber attacks, and why it is important for everyone in the organization to participate in cybersecurity.As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Show less
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the…
Show more
DHS/FEMA
Online
BCSLearn More about Cybersecurity in the Workplace

Contact Us

Email: [email protected]
Phone: (979) 431-4837