As a member of the National Cybersecurity Preparedness Consortium, TEEX develops and delivers no-cost training funded by the Department of Homeland Security/Federal Emergency Management Agency. These grant-funded training opportunities include both instructor-led and online self-paced classes on a variety of topics for both technical and non-technical audiences.
TEEX also offers a variety of other Cybersecurity training, services, and expert advice through the TEEX Cyber Readiness Center.
These courses are certified by the American Council on Education (ACE) for recommended college credit at the completion of each track.
Course Number | Title | Description | Funding Option | Delivery Type | Division |
---|---|---|---|---|---|
AWR136 | Essentials of Community Cybersecurity | Quick View Course Description
AWR136 – Essentials of Community CybersecurityThe Essentials of Community Cybersecurity (ECCS) course provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent, and/or stop operations and emergency responses in a community. The course also provides a cursory introduction to cybersecurity vulnerabilities, risks, threats, and countermeasures. It explains vulnerabilities of computer systems and networks and how these vulnerabilities can affect communities, organizations, and daily workplace operations. The course introduces actions communities can take in establishing a cybersecurity program. The course provides participants with an awareness of issues. It gives an overview of threats and vulnerabilities, without going into too many details, to highlight the potential impact a cyber attack could have. Participants discuss some of the fundamental activities needed to develop a cybersecurity program, without addressing the technical details of how to secure critical infrastructures. The course introduces the Community Cybersecurity Maturity Model (CCSMM) as a framework for understanding community cybersecurity and offers a brief introduction to low-cost or no-cost approaches to securing a community against cybersecurity threats and attacks. The course sets the stage for further efforts in which a community can build a cybersecurity program. Course ObjectivesAt the conclusion of the course, participants will be able to:
Full course information and schedule Contact InformationPhone: |
KE | ||
AWR376 | Understanding Targeted Cyber Attacks | Quick View Course Description
AWR376 – Understanding Targeted Cyber AttacksThis course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to, and recover from targeted cyber attacks. This course will fill the gap in threat-specific training for cybersecurity as a community-driven course that focuses on the phases of targeted cyber attacks and the attacker methods used during each phase. Participants will also receive valuable information on cyber attack prevention, mitigation and response. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR383 | Cybersecurity Risk Awareness for Officials and Senior Management | Quick View Course Description
AWR383 – Cybersecurity Risk Awareness for Officials and Senior ManagementThis is a non-technical course meant to develop awareness of cybersecurity risks so that elected officials, appointed officials, and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and senior management work more effectively with their Information Technology (IT) departments to mitigate cyber threats. The training is tailored to government, critical infrastructure, and private sector personnel who have the responsibility for directing and developing policy within their organization. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR397 | Cybersecurity for Everyone | Quick View Course Description
AWR397 – Cybersecurity for EveryoneComputers, mobile devices, and the Internet of Things (IoT) are a part of our daily lives. By using all of this technology, which makes our lives easier, we have opened ourselves up to the risks of cyber attacks. This course will introduce you to the basics of protecting your computer and the data it stores as well as protecting yourself when you are online, on social media, and while using your mobile or smart devices. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR402 | Introduction to Internet of Things | Quick View Course Description
AWR402 – Introduction to Internet of ThingsThe purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things. This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security, and a variety of existing and developing technologies. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
MGT384 | Community Preparedness for Cyber Incidents | Quick View Course Description
MGT384 – Community Preparedness for Cyber IncidentsMGT 384, Community Preparedness for Cyber Incidents, is designed to provide organizations and communities with strategies and processes to increase cyber resilience. During this 12-hour course, participants will analyze cyber threats and initial and cascading impacts of cyber incidents, evaluate the process for developing a cyber preparedness program, examine the importance and challenges of cyber related information sharing and discover low to no-cost resources to help build cyber resilience. Full course information and schedule Contact InformationPhone: |
KE | ||
MGT452 | Physical and Cybersecurity for Critical Infrastructure | Quick View Course Description
MGT452 – Physical and Cybersecurity for Critical InfrastructureThe national and economic security of the United States depends on the reliable functioning of critical infrastructure. This course encourages collaboration efforts among individuals and organizations responsible for both physical and cybersecurity toward development of integrated risk management strategies that lead to enhanced capabilities necessary for the protection of our Nation’s critical infrastructure. Participants will identify physical and cybersecurity concerns impacting overall infrastructure security posture, examine integrated physical and cybersecurity incidents and the evolving risks and impacts they pose to critical infrastructure, and explore resources that can be applied to improve security within an organization, business, or government entity. This course meets Texas Commission on Law Enforcement (TCOLE) requirements for MGT452 Physical and Cyber Security for Critical Infrastructure course #78401. Note: For deliveries on, or after, January 3, 2022, participants enrolled in an in-person, classroom-based course delivery will need access to a laptop or mobile device/tablet during the class session to complete course testing and evaluations electronically. Note: Participants enrolled in a TEEX-Instructor Led Webinar must have access to a laptop or mobile device/tablet during the class session to participate in all course sessions as well as complete course testing and evaluations electronically. Full course information and schedule Contact InformationNational Emergency Response and Recovery Training Center |
NERRTC | ||
MGT465 | Recovering from Cybersecurity Incidents | Quick View Course Description
MGT465 – Recovering from Cybersecurity IncidentsThis course is designed to provide guidance for the implementation of an effective cybersecurity incident recovery program from a pre-incident and post-incident perspective. The training focuses on connecting IT with emergency management and is intended for government, critical infrastructure, and private sector personnel who have the responsibility for recovering after a cyber incident. Short term tactical and long-term strategic activities are discussed culminating in the development of an action plan. Full course information and schedule Contact InformationNational Emergency Response and Recovery Training Center |
NERRTC | ||
PER398 | Cybersecurity Resiliency in Industrial Control Systems | Quick View Course Description
PER398 – Cybersecurity Resiliency in Industrial Control SystemsThe Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. State, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE |
Course Number | Title | Description | Funding Option | Delivery Type | Division |
---|---|---|---|---|---|
AWR353 | Using the Comm CS Maturity Model to Develop a CS Program | Quick View Course Description
AWR353 – Using the Comm CS Maturity Model to Develop a CS ProgramUsing the Community Cyber Security Maturity Model to Develop a Cyber Security Program will introduce students to the DHS-supported Community Cyber Security Maturity Model (CCSMM) which can be used as a guide for communities and states in developing their own CCSMM-consistent cybersecurity programs. Students will learn what is required to develop a coordinated, sustained, and viable community cyber security program and resources available to assist in improving awareness, information sharing, policies, and plans. This course was developed by the University of Texas at San Antonio Center for Infrastructure Assurance and Security through the DHS/FEMA Homeland Security National Training Program
Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR366 | Developing a Cyber Security Annex for Incident Response | Quick View Course Description
AWR366 – Developing a Cyber Security Annex for Incident ResponseCyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018) The National Response Framework describes how preparedness can be achieved by developing an incident annex for each hazard. Incident annexes describe coordinating structures used to deliver core capabilities and support response missions unique to a specific type of incident. Incident annexes describe specialized response teams, resources, roles, responsibilities, and other scenario-specific considerations. At the end of this course, participants should possess the fundamentals needed to design and develop a cyber annex for states, locals, tribes, and/or territories (SLTTs). It addresses what the annex is, how it is used, who should participate in the design, implementation, and execution. This course was developed by the University of Texas at San Antonio Center for Infrastructure Assurance and Security through the DHS/FEMA Homeland Security National Training Program.Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR367 | Understanding Social Engineering Attacks | Quick View Course Description
AWR367 – Understanding Social Engineering AttacksThis online course covers topics on social engineering attack techniques and tools, while also equipping learners with a better understanding of how attackers use people as the weakest link to compromise targeted organizations. Participants will learn about social engineering and become familiar with phishing attacks, develop security awareness and take preventive measures. This course was developed by the University of Memphis, Center for Information Assurance (CfIA) through the DHS/FEMA Homeland Security National Training Program. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR368 | Introduction to Basic Vulnerability Assessment Skills | Quick View Course Description
AWR368 – Introduction to Basic Vulnerability Assessment SkillsThis course introduces the preparatory skills needed to learn penetration testing and vulnerability assessment, and familiarizes Information Technology support personnel and managers with the tactics, techniques and procedures (TTPs) that are used by attackers and penetration testers. Participants will have an increased knowledge and understanding about the tools used in a cyber-attack and in turn be better able to prepare defenses. The course focuses on the basic skills and knowledge needed to conduct and plan vulnerability assessments and penetration tests as well as show how to legally and ethically conduct tests and assessments. Participants will be introduced to Open Source tools such as Metasploit and Nmap, as well as methodologies for researching vulnerabilities. This course is designed based on research and federal agency reports. This course was developed by the Norwich University Applied Research Institutes (NUARI) through the DHS/FEMA Homeland Security National Training Program. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR381 | Establishing an Information Sharing and Analysis Organization | Quick View Course Description
AWR381 – Establishing an Information Sharing and Analysis OrganizationCyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018) The growing Information Sharing and Analysis Organization (ISAO) ecosystem provides an opportunity to empower the nation to become more educated and effective in preventing, detecting, and responding to the increasingly sophisticated landscape of cyber threats. There are considerable challenges with the vast quantity of information, the complexities of analysis, and the uncertainties of sharing data with a large network of organizations. In the 2016 National Preparedness Report, 88% of states and territories indicated a high prioritization of cybersecurity, with only a 13% proficiency in that capability. Likewise, 86% of states and territories ranked intelligence and information sharing as a high priority, with a reported 57% proficiency in that capability. The establishment of an ISAO is a critical step to improve both of these capabilities. Executive Order 13691 encourages the formation of ISAOs, and states that “organizations engaged in the sharing of information related to cybersecurity risks and incidents play an invaluable role in the collective cybersecurity of the United States”. At the end of this course, participants should possess the fundamentals needed to design and develop an Information Sharing and Analysis Organization (ISAO) for states, locals, tribes, and/or territories (SLTTs). It addresses what the ISAO is, how it is used, who should participate in the design, implementation, building, and execution. This course was developed by the University of Texas at San Antonio Center for Infrastructure Assurance and Security through the DHS/FEMA Homeland Security National Training Program Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR384 | Cyber Identity and Authentication | Quick View Course Description
AWR384 – Cyber Identity and AuthenticationDespite the fact that passwords have been used in digital systems for over half a century and many standards and best practices have been developed, many organizations simply neglect to adhere to these standards and expose weaknesses for attackers to exploit. This course provides basic digital identity concepts, biometric authentication and multi-factor authentication approaches that can increase security. The learner will explore various authentication standards and techniques that can prevent unauthorized access of digital resources and services. This course was developed by the University of Memphis through the DHS/FEMA Homeland Security National Training Program Full course information and schedule Contact InformationPhone: |
KE | ||
AWR385 | Mobile Device Security and Privacy | Quick View Course Description
AWR385 – Mobile Device Security and PrivacyThis course is designed to assist individuals better understand security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Using scenarios, thought challenges and exercises as a framework, students will learn about:
This course was developed by the University of Memphis through the DHS/FEMA Homeland Security National Training Program.Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR388 | Cyber Awareness for Municipal Police Fire & EMS Information Technology Prsnl | Quick View Course Description
AWR388 – Cyber Awareness for Municipal Police Fire & EMS Information Technology PrsnlThis 2 hour, web-based course will cover the basics of cyber awareness for Municipal, Police, Fire and EMS Information Technology personnel. Participants will have an increased knowledge of threats specific to their jurisdiction and an understanding of the processes and procedures needed to develop a cyber-awareness program. This course will focus on the steps involved in being aware of cyber threats and effectively communicating the processes and procedures to protect users against common cyber threats. The participants will apply this knowledge to developing processes and procedures to integrate cyber awareness into routine operations. Participants will gain an understanding and the knowledge needed to start developing and integrating cyber awareness programs in their specific jurisdictions. This course is intended to give managers and technical personnel working in Police, Fire, and EMS IT departments an introduction to becoming aware of cyber threats to their type of agencies. These types of agencies will be aware of threats specifically targeted at them and how to start a cyber-awareness program to combat the threat. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR389 | Incident Response for Municipal Police Fire & EMS Information Technology Prsnl | Quick View Course Description
AWR389 – Incident Response for Municipal Police Fire & EMS Information Technology PrsnlThis 2 hour, web-based course introduces the basics of the incident response processes specific to Information Technology personnel in Municipal, Police, Fire or EMS departments. This course focuses on the steps involved in being aware of common cyber incidents, as well as steps in developing an incident response plan. The participants will apply this knowledge by developing a response plan specific to their jurisdiction. The content of the course includes: common cyber incidents occurring in Police, Fire and EMS IT departments, developing a response plan for common cyber incidents, distinguishing tasks for police, fire and EMS IT departments, and processes for future improvements to response plans. This course was developed by the NUARI through the DHS/FEMA Homeland Security National Training Program. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR398 | Introduction to Information Sharing and Analysis Organizations | Quick View Course Description
AWR398 – Introduction to Information Sharing and Analysis OrganizationsThis 1.5 hour, web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at multiple levels (State, Local, Tribal, Territorial) as well as senior management and decision-makers (including for commercial entities) to the value proposition of sharing cybersecurity information. The content of the course includes:
This course was developed by the NUARI through the DHS/FEMA Homeland Security National Training Program. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR399 | Detecting and Responding to a Cyber Attack | Quick View Course Description
AWR399 – Detecting and Responding to a Cyber AttackAs computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection. This course will introduce students to various types of cyber attacks and how to detect and respond to them in order to protect their data and information. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR402 | Introduction to Internet of Things | Quick View Course Description
AWR402 – Introduction to Internet of ThingsThe purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things. This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security, and a variety of existing and developing technologies. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR403 | Examining Advanced Persistent Threats | Quick View Course Description
AWR403 – Examining Advanced Persistent ThreatsToday’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). Inadequate deployment and maintenance of security on these systems could provide opportunities for attackers to harm to the American citizenry through NCISS infrastructure and associated resource disruption. This online course provides an overview of similarities and differences between traditional systems attacks and APT attacks. At the end of this course, participants should possess a fundamental understanding of the most common attack path for various advanced persistent threats (APTs). The course covers (a) the cyber kill chain model (b) APT cases and attack techniques and tools; and (c) common APT defense strategies. This course was developed by the University of Memphis through the DHS/FEMA Homeland Security National Training Program. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE |
Course Number | Title | Description | Funding Option | Delivery Type | Division |
---|---|---|---|---|---|
AWR169 | Cyber Incident Analysis and Response | Quick View Course Description
AWR169 – Cyber Incident Analysis and ResponseThis course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection, and network/resources repair. The trainee will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response. Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Full course information and schedule Contact InformationPhone: |
KE | ||
AWR176 | Disaster Recovery for Information Systems | Quick View Course Description
AWR176 – Disaster Recovery for Information SystemsDisaster Recovery for Information Systems will train business managers to respond to varying threats that might impact their organization’s access to information. This course provides requisite background theory and recommended best practices needed by managers to keep their offices running during incidents of different types. Topics include an overview of business continuity planning; disaster recovery planning; guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations, and an examination of legal issues that may confront an organization. Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Full course information and schedule Contact InformationPhone: |
KE | ||
AWR177 | Information Risk Management | Quick View Course Description
AWR177 – Information Risk ManagementThis is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies, and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices. Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Full course information and schedule Contact InformationPhone: |
KE | ||
AWR396 | Network Security for Homes and Small Businesses | Quick View Course Description
AWR396 – Network Security for Homes and Small BusinessesThe Internet (the world’s largest network) allows us to accomplish tasks more conveniently and efficiently at home, work and on the road! However, there are security risks with networks, and users must be aware and remain vigilant about these risks and how to secure their home or small business network. This course will introduce students to the basics of networks for homes and small businesses and provide them with best practices to secure their networks in order to protect their personal information as well as other (friends, family, customers, vendors, etc.) information that may flow through their network. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE | ||
AWR399 | Detecting and Responding to a Cyber Attack | Quick View Course Description
AWR399 – Detecting and Responding to a Cyber AttackAs computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection. This course will introduce students to various types of cyber attacks and how to detect and respond to them in order to protect their data and information. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE |
Course Number | Title | Description | Funding Option | Delivery Type | Division |
---|---|---|---|---|---|
AWR168 | Foundations of Cyber Crimes | Quick View Course Description
AWR168 – Foundations of Cyber CrimesThis intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn legislations and organizational efforts to control or prevent such crimes. This course covers intellectual property law (copyright, trade secrets, unfair competition, and unfair business practices), personal jurisdiction, electronic commerce and software contracts, telecommunications, antitrust, privacy, the right to accuracy of information, the right to access information, and the First Amendment. Two credit hours through ACE are provided only if all three courses within the Online for Everyone – Non-Technical (Cyber 101) track are completed. Full course information and schedule Contact InformationPhone: |
KE | ||
AWR174 | Cyber Ethics | Quick View Course Description
AWR174 – Cyber EthicsCyber Ethics is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some of the more pressing concerns related to Internet usage today. Two credit hours through ACE are provided only if all three courses within the Online for Everyone – Non-Technical (Cyber 101) track are completed. Full course information and schedule Contact InformationPhone: |
KE | ||
AWR397 | Cybersecurity for Everyone | Quick View Course Description
AWR397 – Cybersecurity for EveryoneComputers, mobile devices, and the Internet of Things (IoT) are a part of our daily lives. By using all of this technology, which makes our lives easier, we have opened ourselves up to the risks of cyber attacks. This course will introduce you to the basics of protecting your computer and the data it stores as well as protecting yourself when you are online, on social media, and while using your mobile or smart devices. Full course information and schedule Contact InformationBusiness & Cyber Solutions |
KE |
Course Number | Title | Description | Funding Option | Delivery Type | Division |
---|---|---|---|---|---|
AWR138 | Network Assurance | Quick View Course Description
AWR138 – Network AssuranceNetwork Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Full course information and schedule Contact InformationPhone: |
KE | ||
AWR139 | Digital Forensics Basics | Quick View Course Description
AWR139 – Digital Forensics BasicsThis course covers investigative methods and standards for the acquisition, extraction, preservation, analysis, and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators. Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Full course information and schedule Contact InformationPhone: |
KE | ||
AWR173 | Information Security Basics | Quick View Course Description
AWR173 – Information Security BasicsInformation Security Basics is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to providing an introduction to information assurance, trainees will also learn general concepts (terminologies), an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography. Full course information and schedule Contact InformationPhone: |
KE | ||
AWR178 | Secure Software | Quick View Course Description
AWR178 – Secure SoftwareThis course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Full course information and schedule Contact InformationPhone: |
KE |
Contact Us
Email: cyberready@teex.tamu.edu
Phone: (979) 458-6715