Cybersecurity |
AWR138 |
Network Assurance |
Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Show less
Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting),… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Network Assurance |
Cybersecurity |
AWR139 |
Digital Forensics Basics |
This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis, and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Show less
This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis, and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Digital Forensics Basics |
Cybersecurity |
AWR168 |
Foundations of Cyber Crimes |
This intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn legislations and organizational efforts to control or prevent such crimes. This course covers intellectual property law (copyright, trade secrets, unfair competition, and unfair business practices), personal jurisdiction, electronic commerce and software contracts, telecommunications, antitrust, privacy, the right to accuracy of information, the right to access information, and the First Amendment.
Two college credit hours are provided through ACE. Show less
This intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Foundations of Cyber Crimes |
Cybersecurity |
AWR169 |
Introduction to Cyber Incident Management |
This course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection, and network/resources repair. The trainee will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Show less
This course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection, and network/resources repair. The trainee will be presented with real-world examples and scenarios to help provide knowledge,… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Introduction to Cyber Incident Management |
Cybersecurity |
AWR173 |
Information Security Basics |
Information Security Basics is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to providing an introduction to information assurance, trainees will also learn general concepts (terminologies), an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography. Show less
Information Security Basics is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Information Security Basics |
Cybersecurity |
AWR174 |
Cyber Ethics |
Cyber Ethics is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some of the more pressing concerns related to Internet usage today.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone – Non-Technical (Cyber 101) track are completed. Show less
Cyber Ethics is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Cyber Ethics |
Cybersecurity |
AWR176 |
Disaster Recovery for Information Systems |
Disaster Recovery for Information Systems will train business managers to respond to varying threats that might impact their organization’s access to information. This course provides requisite background theory and recommended best practices needed by managers to keep their offices running during incidents of different types. Topics include an overview of business continuity planning; disaster recovery planning; guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations, and an examination of legal issues that may confront an organization.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Show less
Disaster Recovery for Information Systems will train business managers to respond to varying threats that might impact their organization’s access to information. This course provides requisite background theory and recommended best practices needed by managers to keep their offices running… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Disaster Recovery for Information Systems |
Cybersecurity |
AWR177 |
Information Risk Management |
This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies, and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Show less
This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies (such as asset evaluation, business impact analysis,… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Information Risk Management |
Cybersecurity |
AWR178 |
Secure Software |
This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Show less
This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies.
Two… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Secure Software |
Cybersecurity |
AWR353 |
Using the Comm CS Maturity Model to Develop a CS Program |
Using the Community Cyber Security Maturity Model to Develop a Cyber Security Program will introduce students to the DHS-supported Community Cyber Security Maturity Model (CCSMM) which can be used as a guide for communities and states in developing their own CCSMM-consistent cybersecurity programs. Students will learn what is required to develop a coordinated, sustained, and viable community cyber security program and the resources available to assist in improving awareness, information sharing, policies, and plans.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner The University of Texas at San Antonio Center for Infrastructure Assurance and Security (UTSA/CIAS). The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
Using the Community Cyber Security Maturity Model to Develop a Cyber Security Program will introduce students to the DHS-supported Community Cyber Security Maturity Model (CCSMM) which can be used as a guide for communities and states in developing their own CCSMM-consistent cybersecurity… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Using the Comm CS Maturity Model to Develop a CS Program |
Cybersecurity |
AWR366 |
Developing a Cyber Security Annex for Incident Response |
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018)The National Response Framework describes how preparedness can be achieved by developing an incident annex for each hazard. Incident annexes describe coordinating structures used to deliver core capabilities and support response missions unique to a specific type of incident. Incident annexes describe specialized response teams, resources, roles, responsibilities, and other scenario-specific considerations. At the end of this course, participants should possess the fundamentals needed to design and develop a cyber annex for states, locals, tribes, and/or territories (SLTTs). It addresses what the annex is, how it is used, who should participate in the design, implementation, and execution. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner The University of Texas at San Antonio Center for Infrastructure Assurance and Security (UTSA/CIAS). The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Developing a Cyber Security Annex for Incident Response |
Cybersecurity |
AWR367 |
Understanding Social Engineering Attacks |
This online course covers topics on social engineering attack techniques and tools, while also equipping learners with a better understanding of how attackers use people as the weakest link to compromise targeted organizations. Participants will learn about social engineering and become familiar with phishing attacks, develop security awareness and take preventive measures. This course is
offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the University of Memphis, Center for Information
Assurance (CfIA). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
This online course covers topics on social engineering attack techniques and tools, while also equipping learners with a better understanding of how attackers use people as the weakest link to compromise targeted organizations. Participants will learn about social engineering and become… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Understanding Social Engineering Attacks |
Cybersecurity |
AWR368 |
Introduction to Basic Vulnerability Assessment Skills |
This course introduces the preparatory skills needed to learn penetration testing and vulnerability assessment, and familiarizes Information Technology support personnel and managers with the tactics, techniques and procedures (TTPs) that are used by attackers and penetration testers. Participants will have an increased knowledge and understanding about the tools used in a cyber-attack and in turn be better able to prepare defenses. The course focuses on the basic skills and knowledge needed to conduct and plan vulnerability assessments and penetration tests as well as show how to legally and ethically conduct tests and assessments. Participants will be introduced to Open Source tools such as Metasploit and Nmap, as well as methodologies for researching vulnerabilities. This course is designed based on research and federal agency reports.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the Norwich University Applied Research Institutes (NUARI). The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost. Show less
This course introduces the preparatory skills needed to learn penetration testing and vulnerability assessment, and familiarizes Information Technology support personnel and managers with the tactics, techniques and procedures (TTPs) that are used by attackers and penetration testers…. Show more
|
DHS/FEMA Online |
BCS |
Learn More about Introduction to Basic Vulnerability Assessment Skills |
Cybersecurity |
AWR381 |
Establishing an Information Sharing and Analysis Organization |
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018)The growing Information Sharing and Analysis Organization (ISAO) ecosystem provides an opportunity to empower the nation to become more educated and effective in preventing, detecting, and responding to the increasingly sophisticated landscape of cyber threats. There are considerable challenges with the vast quantity of information, the complexities of analysis, and the uncertainties of sharing data with a large network of organizations.In the 2016 National Preparedness Report, 88% of states and territories indicated a high prioritization of cybersecurity, with only a 13% proficiency in that capability. Likewise, 86% of states and territories ranked intelligence and information sharing as a high priority, with a reported 57% proficiency in that capability. The establishment of an ISAO is a critical step to improve both of these capabilities.Executive Order 13691 encourages the formation of ISAOs, and states that “organizations engaged in the sharing of information related to cybersecurity risks and incidents play an invaluable role in the collective cybersecurity of the United States”. At the end of this course, participants should possess the fundamentals needed to design and develop an Information Sharing and Analysis Organization (ISAO) for states, locals, tribes, and/or territories (SLTTs). It addresses what the ISAO is, how it is used, who should participate in the design, implementation, building, and execution.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner The University of Texas at San Antonio Center for
Infrastructure Assurance and Security (UTSA/CIAS). The course is funded
through the DHS/FEMA Homeland Security National Training Program and is offered
at no cost. Show less
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Establishing an Information Sharing and Analysis Organization |
Cybersecurity |
AWR384 |
Cyber Identity and Authentication |
Despite the fact that passwords have been used in digital systems for over half a century and many standards and best practices have been developed, many organizations simply neglect to adhere to these standards and expose weaknesses for attackers to exploit. This course provides basic digital identity concepts, biometric authentication and multi-factor authentication approaches that can increase security. The learner will explore various authentication standards and techniques that can prevent unauthorized access of digital resources and services. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the University of Memphis, Center for Information
Assurance (CfIA). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
Despite the fact that passwords have been used in digital systems for over half a century and many standards and best practices have been developed, many organizations simply neglect to adhere to these standards and expose weaknesses for attackers to exploit. This course provides basic digital… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Cyber Identity and Authentication |
Cybersecurity |
AWR385 |
Mobile Device Security and Privacy |
This course is designed to assist individuals better understand security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Using scenarios, thought challenges and exercises as a framework, students will learn about: The purpose of Enterprise Mobile Management platforms Elements that make mobile networks and operating systems differentMobile malware classifications and detection strategiesMobile architecture data leakage detection and prevention strategies.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the University of Memphis, Center for Information
Assurance (CfIA). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
This course is designed to assist individuals better understand security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Using scenarios, thought… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Mobile Device Security and Privacy |
Cybersecurity |
AWR388 |
Cyber Awareness for Municipal Police Fire & EMS Information Technology Prsnl |
This 2 hour, web-based course will cover the basics of cyber awareness for Municipal, Police, Fire and EMS Information Technology personnel. Participants will have an increased knowledge of threats specific to their jurisdiction and an understanding of the processes and procedures needed to develop a cyber-awareness program. This course will focus on the steps involved in being aware of cyber threats and effectively communicating the processes and procedures to protect users against common cyber threats. The participants will apply this knowledge to developing processes and procedures to integrate cyber awareness into routine operations. Participants will gain an understanding and the knowledge needed to start developing and integrating cyber awareness programs in their specific jurisdictions. This course is intended to give managers and technical personnel working in Police, Fire, and EMS IT departments an introduction to becoming aware of cyber threats to their type of agencies. These types of agencies will be aware of threats specifically targeted at them and how to start a cyber-awareness program to combat the threat. This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the Norwich University Applied Research
Institutes (NUARI). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
This 2 hour, web-based course will cover the basics of cyber awareness for Municipal, Police, Fire and EMS Information Technology personnel. Participants will have an increased knowledge of threats specific to their jurisdiction and an understanding of the processes and procedures needed to… Show more
|
Online |
BCS |
Learn More about Cyber Awareness for Municipal Police Fire & EMS Information Technology Prsnl |
Cybersecurity |
AWR389 |
Incident Response for Municipal Police Fire & EMS Information Technology Prsnl |
This 2 hour, web-based course introduces the basics of the incident response processes specific to Information Technology personnel in Municipal, Police, Fire or EMS departments. This course focuses on the steps involved in being aware of common cyber incidents, as well as steps in developing an incident response plan. The participants will apply this knowledge by developing a response plan specific to their jurisdiction. The content of the course includes: common cyber incidents occurring in Police, Fire and EMS IT departments, developing a response plan for common cyber incidents, distinguishing tasks for police, fire and EMS IT departments, and processes for future improvements to response plans.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the Norwich University Applied Research
Institutes (NUARI). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
This 2 hour, web-based course introduces the basics of the incident response processes specific to Information Technology personnel in Municipal, Police, Fire or EMS departments. This course focuses on the steps involved in being aware of common cyber incidents, as well as steps in… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Incident Response for Municipal Police Fire & EMS Information Technology Prsnl |
Cybersecurity |
AWR395 |
Cybersecurity in the Workplace |
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the organization’s data/information is every employee’s responsibility. This course will help students understand the different types of cyber attacks their company may face, the type of information that is at risk, how to recognize cyber attacks, and why it is important for everyone in the organization to participate in cybersecurity.This course is certified by Texas Department of Information Resources to meet the requirements of HB1118. Show less
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Cybersecurity in the Workplace |
Cybersecurity |
AWR396 |
Network Security for Homes and Small Businesses |
The Internet (the world’s largest network) allows us to accomplish tasks more conveniently and efficiently at home, work and on the road! However, there are security risks with networks, and users must be aware and remain vigilant about these risks and how to secure their home or small business network. This course will introduce students to the basics of networks for homes and small businesses and provide them with best practices to secure their networks in order to protect their personal information as well as other (friends, family, customers, vendors, etc.) information that may flow through their network. Show less
The Internet (the world’s largest network) allows us to accomplish tasks more conveniently and efficiently at home, work and on the road! However, there are security risks with networks, and users must be aware and remain vigilant about these risks and how to secure their home or small… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Network Security for Homes and Small Businesses |
Cybersecurity |
AWR397 |
Cybersecurity for Everyone |
Computers, mobile devices, and the Internet of Things (IoT) are a part of our daily lives. By using all of this technology, which makes our lives easier, we have opened ourselves up to the risks of cyber attacks. This course will introduce you to the basics of protecting your computer and the data it stores as well as protecting yourself when you are online, on social media, and while using your mobile or smart devices. Show less
Computers, mobile devices, and the Internet of Things (IoT) are a part of our daily lives. By using all of this technology, which makes our lives easier, we have opened ourselves up to the risks of cyber attacks. This course will introduce you to the basics of protecting your computer and the… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Cybersecurity for Everyone |
Cybersecurity |
AWR398 |
Introduction to Information Sharing and Analysis Organizations |
This 1.5 hour, web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at multiple levels (State, Local, Tribal, Territorial) as well as senior management and decision-makers (including for commercial entities) to the value proposition of sharing cybersecurity information. The content of the course includes: The importance of cyber-security information sharingInformation sharing organizations and what they doSteps for cyber-security information sharing analysisThis course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the Norwich University Applied Research
Institutes (NUARI). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
This 1.5 hour, web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Introduction to Information Sharing and Analysis Organizations |
Cybersecurity |
AWR399 |
Detecting and Responding to a Cyber Attack |
As computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection. This course will introduce students to various types of cyber attacks and how to detect and respond to them in order to protect their data and information. Show less
As computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to… Show more
|
Online |
BCS |
Learn More about Detecting and Responding to a Cyber Attack |
Cybersecurity |
AWR402 |
Introduction to Internet of Things |
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things. This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security, and a variety of existing and developing technologies. Show less
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things. This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security,… Show more
|
Online |
BCS |
Learn More about Introduction to Internet of Things |
Cybersecurity |
AWR403 |
Examining Advanced Persistent Threats |
Today’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). Inadequate deployment and maintenance of security on these systems could provide opportunities for attackers to harm to the American citizenry through NCISS infrastructure and associated resource disruption. This online course provides an overview of similarities and differences between traditional systems attacks and APT attacks. At the end of this course, participants should possess a fundamental understanding of the most common attack path for various advanced persistent threats (APTs). The course covers (a) the cyber kill chain model (b) APT cases and attack techniques and tools; and (c) common APT defense strategiesThis course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the Norwich University Applied Research
Institutes (NUARI). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
Today’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS)…. Show more
|
DHS/FEMA Online |
BCS |
Learn More about Examining Advanced Persistent Threats |
Disaster Recovery |
AWR408 |
Disaster Recovery Awareness |
In this course, participants will identify key elements of disaster recovery guidance, determine methods for planning a successful recovery, and finally, review recovery assistance available to jurisdictions and the community.
In this course, participants will identify key elements of disaster recovery guidance, determine methods for planning a successful recovery, and finally, review recovery assistance available to jurisdictions and the
|
GSADHS/FEMA Online |
ITSI |
Learn More about Disaster Recovery Awareness |
Disaster Recovery |
AWR419 |
Disaster Awareness for Water and Wastewater Utilities, an Introduction |
This course introduces the various natural and human-caused (accidental or intentional) hazards to which water and wastewater systems may be vulnerable and the potential effects of hazards. Planning for and managing incidents are discussed, as well as disaster mitigation, response, and recovery specific to drinking water and wastewater systems. Participants are guided through portions of the Environmental Protection Agency (EPA) Response Protocol Toolbox (RPTB) to identify steps in the response and recovery processes. Scenarios are presented throughout for an all-hazards incident that affects a utility. Show less
This course introduces the various natural and human-caused (accidental or intentional) hazards to which water and wastewater systems may be vulnerable and the potential effects of hazards. Planning for and managing incidents are discussed, as well as disaster mitigation, response, and… Show more
|
GSADHS/FEMA Online |
ITSI |
Learn More about Disaster Awareness for Water and Wastewater Utilities, an Introduction |
Disaster Recovery |
MGT481 |
Disaster Recovery: A Strategic Overview of the Public Assistance Process |
This Disaster Recovery course provides a strategic overview of the FEMA Public Assistance Process that is essential to disaster recovery for local communities. The FEMA Public Assistance Process provides funding for local governments and eligible Private Non-Profit organizations to conduct effective long-term recovery. Unfortunately, many jurisdictions do not have a good understanding of this process and thereby fail to obtain, and retain, all the recovery revenue the community is eligible for. This course will provide senior leaders and staff planners with the key elements, milestones, and pitfalls to avoid when guiding a local jurisdictions recovery plans and operations. Show less
This Disaster Recovery course provides a strategic overview of the FEMA Public Assistance Process that is essential to disaster recovery for local communities. The FEMA Public Assistance Process provides funding for local governments and eligible Private Non-Profit organizations to… Show more
|
Face-to-Face |
ITSI |
Learn More about Disaster Recovery: A Strategic Overview of the Public Assistance Process |
Disaster Recovery |
MGT482 |
Disaster Recovery Public Assistance Programs, An Introduction |
This course will provide an introduction to the FEMA Public Assistance Programs to help local jurisdictions better understand recovery and improve preparedness for the next disaster. Front line jurisdiction leaders and staff members will learn information to better assist their communities and eligible Private Non-Profit partners to prepare for and recover from disasters. Instructors will facilitate an understanding of how to identify and navigate disaster recovery resources by guiding students through the FEMA Public Assistance Process, providing best practices while avoiding major pitfalls. Many local jurisdictions lack a robust understanding of these processes and thereby fail to obtain, and retain, all the recovery revenue the community is eligible for. This course helps prepare communities to maximize recovery resources in a compliant manner thereby ensuring effective long term recovery from disaster. Show less
This course will provide an introduction to the FEMA Public Assistance Programs to help local jurisdictions better understand recovery and improve preparedness for the next disaster. Front line jurisdiction leaders and staff members will learn information to better assist their communities and… Show more
|
Face-to-Face |
ITSI |
Learn More about Disaster Recovery Public Assistance Programs, An Introduction |
National Cybersecurity Preparedness Consortium-Web |
AWR389 |
Incident Response for Municipal Police Fire & EMS Information Technology Prsnl |
This 2 hour, web-based course introduces the basics of the incident response processes specific to Information Technology personnel in Municipal, Police, Fire or EMS departments. This course focuses on the steps involved in being aware of common cyber incidents, as well as steps in developing an incident response plan. The participants will apply this knowledge by developing a response plan specific to their jurisdiction. The content of the course includes: common cyber incidents occurring in Police, Fire and EMS IT departments, developing a response plan for common cyber incidents, distinguishing tasks for police, fire and EMS IT departments, and processes for future improvements to response plans.This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the Norwich University Applied Research
Institutes (NUARI). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
This 2 hour, web-based course introduces the basics of the incident response processes specific to Information Technology personnel in Municipal, Police, Fire or EMS departments. This course focuses on the steps involved in being aware of common cyber incidents, as well as steps in… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Incident Response for Municipal Police Fire & EMS Information Technology Prsnl |
National Cybersecurity Preparedness Consortium-Web |
AWR398 |
Introduction to Information Sharing and Analysis Organizations |
This 1.5 hour, web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at multiple levels (State, Local, Tribal, Territorial) as well as senior management and decision-makers (including for commercial entities) to the value proposition of sharing cybersecurity information. The content of the course includes: The importance of cyber-security information sharingInformation sharing organizations and what they doSteps for cyber-security information sharing analysisThis course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the Norwich University Applied Research
Institutes (NUARI). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
This 1.5 hour, web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at… Show more
|
DHS/FEMA Online |
BCS |
Learn More about Introduction to Information Sharing and Analysis Organizations |
National Cybersecurity Preparedness Consortium-Web |
AWR402 |
Introduction to Internet of Things |
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things. This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security, and a variety of existing and developing technologies. Show less
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things. This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security,… Show more
|
Online |
BCS |
Learn More about Introduction to Internet of Things |
National Cybersecurity Preparedness Consortium-Web |
AWR403 |
Examining Advanced Persistent Threats |
Today’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). Inadequate deployment and maintenance of security on these systems could provide opportunities for attackers to harm to the American citizenry through NCISS infrastructure and associated resource disruption. This online course provides an overview of similarities and differences between traditional systems attacks and APT attacks. At the end of this course, participants should possess a fundamental understanding of the most common attack path for various advanced persistent threats (APTs). The course covers (a) the cyber kill chain model (b) APT cases and attack techniques and tools; and (c) common APT defense strategiesThis course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was
developed by the NCPC partner the Norwich University Applied Research
Institutes (NUARI). The course is funded through the DHS/FEMA Homeland
Security National Training Program and is offered at no cost. Show less
Today’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS)…. Show more
|
DHS/FEMA Online |
BCS |
Learn More about Examining Advanced Persistent Threats |
Response HazMat/EMS/Public Health |
AWR111 |
Internet-Basic EMS Concepts for CBRNE Events |
Is it natural or weaponized? Exposure or contamination, what’s the difference? Why did everyone in the room become sick? Where does Emergency Medical Services (EMS) fit into the Incident Command System (ICS) tree?
Learn the answers to these questions and more by taking the web-based Basic Emergency Medical Services Concepts for Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) course. AWR111-W can be completed by someone initially seeking information about this topic or by a health care provider wanting to enhance their knowledge concerning CBRNE events. Show less
Is it natural or weaponized? Exposure or contamination, what’s the difference? Why did everyone in the room become sick? Where does Emergency Medical Services (EMS) fit into the Incident Command System (ICS) tree?
Learn the answers to these questions and more by taking the… Show more
|
DHS/FEMA Online |
ESTI |
Learn More about Internet-Basic EMS Concepts for CBRNE Events |
Response HazMat/EMS/Public Health |
AWR160 |
WMD/Terrorism Awareness for Emergency Responders Online |
This online course focuses on training responders to meet the requirements established in the National Fire Protection Association (NFPA) 1072 (2017 ed.),”Competencies for Awareness Level Personnel,”(chapter 4) and the Occupational Safety and Health Administration (OSHA) 29 Code of Federal Regulations (CFR) 1910.120 (q) (6) (i) (a-f) “First Responder Awareness Level” competencies.
This course encompasses an all-hazards approach to Hazardous Materials (HazMat) incidents, including acts of terrorism where Weapons of Mass Destruction (WMD) materials may have been used. It provides participants the knowledge to recognize the hazardous material, protect themselves, notify others, and secure the scene. Show less
This online course focuses on training responders to meet the requirements established in the National Fire Protection Association (NFPA) 1072 (2017 ed.),”Competencies for Awareness Level Personnel,”(chapter 4) and the Occupational Safety and Health Administration (OSHA) 29 Code of Federal… Show more
|
GSADHS/FEMA Online |
ESTI |
Learn More about WMD/Terrorism Awareness for Emergency Responders Online |
Response HazMat/EMS/Public Health |
AWR314 |
Medical Countermeasures Awareness for Public Health Emergencies |
The Medical Countermeasures Awareness for Public Health Emergencies course is a web-based course that enhances community preparedness by providing awareness-level training on the roles and responsibilities of the local public health community and its partners. The course covers local and federal resources and capabilities that may exist to help provide post-exposure prophylaxis for a large population in response to a catastrophic CBRNE or other public health event. It also reviews actions taken by a local jurisdiction during a public health emergency that require response at the local level and deployment of the Strategic National Stockpile (SNS). Show less
The Medical Countermeasures Awareness for Public Health Emergencies course is a web-based course that enhances community preparedness by providing awareness-level training on the roles and responsibilities of the local public health community and its partners. The course covers local and… Show more
|
DHS/FEMA Online |
ESTI |
Learn More about Medical Countermeasures Awareness for Public Health Emergencies |
Response HazMat/EMS/Public Health |
AWR375 |
Risk Management for After School Activities and Interscholastic Athletics |
The goal of this course is to enhance the safety and security awareness of individuals responsible for organizing, supervising, and supporting after school activities and interscholastic athletics. This innovative training will provide an online platform for learning while improving the awareness level of security and resilience within school districts and communities hosting special events and interscholastic athletics.
This course was developed in a partnership effort between The University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (USM/NCS4) and the TEEX National Emergency Response and Recovery Training Center (NERRTC). Show less
The goal of this course is to enhance the safety and security awareness of individuals responsible for organizing, supervising, and supporting after school activities and interscholastic athletics. This innovative training will provide an online platform for learning while improving the… Show more
|
DHS/FEMA Online |
NERRTC |
Learn More about Risk Management for After School Activities and Interscholastic Athletics |
Sports and Special Events Management |
AWR375 |
Risk Management for After School Activities and Interscholastic Athletics |
The goal of this course is to enhance the safety and security awareness of individuals responsible for organizing, supervising, and supporting after school activities and interscholastic athletics. This innovative training will provide an online platform for learning while improving the awareness level of security and resilience within school districts and communities hosting special events and interscholastic athletics.
This course was developed in a partnership effort between The University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (USM/NCS4) and the TEEX National Emergency Response and Recovery Training Center (NERRTC). Show less
The goal of this course is to enhance the safety and security awareness of individuals responsible for organizing, supervising, and supporting after school activities and interscholastic athletics. This innovative training will provide an online platform for learning while improving the… Show more
|
DHS/FEMA Online |
NERRTC |
Learn More about Risk Management for After School Activities and Interscholastic Athletics |
THIRA |
AWR401 |
Threat & Hazard Identification & Risk Assess & Stakeholder Preparedness Review |
This course introduces the six-step THIRA/SPR process which includes identifying threats and hazards that stress a community’s capabilities, giving context to those threats and hazards and identifying associated impacts consistent with specific factors, identifying community-specific capability targets, assessing current levels of capability in comparison to those targets, identifying capability gaps and subsequent strategies to close those gaps. Successful completion of the course will assist local emergency responders and stakeholders in generating actionable preparedness data that communities can use to support a variety of emergency management efforts, including planning, training, exercises, and incident response and recovery. THIRA/SPR-informed planning is consistent with and expands on nationally accepted emergency management standards as the basis for planning across the mission areas of prevention, protection, mitigation, response, and recovery.This course meets Texas Commission on Law Enforcement (TCOLE) requirements for Course #77998.
Note: The AWR401 course is not considered an equivalent for the MGT310 Threat and Hazard Identification and Risk Assessment and Stakeholder Preparedness Review course. The AWR401 course is a reduced hour, web-based alternative designed to more quickly reach a broad national audience with information on the updated THIRA/SPR process until an individual can attend a MGT310 course offering. Please contact us at [email protected] if you need assistance with scheduling a MGT310 class for your location. Show less
This course introduces the six-step THIRA/SPR process which includes identifying threats and hazards that stress a community’s capabilities, giving context to those threats and hazards and identifying associated impacts consistent with specific factors, identifying community-specific … Show more
|
Online |
ILEPSE |
Learn More about Threat & Hazard Identification & Risk Assess & Stakeholder Preparedness Review |