Introduction to Information Sharing and Analysis Organizations
AWR398 – 2.00 Hours
Schedule
Details Buttons | Dates | Location | Class | Price | Register Buttons |
---|---|---|---|---|---|
12/01/24 – 06/30/25 | College Station, TX | EC AWR398 42 | Register |
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.
Course Description
This web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at multiple levels (State, Local, Tribal, Territorial) as well as senior management and decision-makers (including for commercial entities) to the value proposition of sharing cybersecurity information. The content of the course includes:
- The importance of cyber-security information sharing
- Information sharing organizations and what they do
- Steps for cyber-security information sharing analysis
This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner the Norwich University Applied Research Institutes (NUARI). The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost.
Prerequisites
Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us for more information on the approval process.
Students must have a FEMA Student Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid.
Course Completion Requirements
Students must earn a minimum score of 70% on all module post-tests to receive their certificate.
Attendance Requirements
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Recommended
To prevent issues during your online course, the following is recommended:
- Broadband connection
- Current browser updated to the latest version (i.e., Edge, Chrome, Firefox, Safari)
- Pop-ups must be enabled.
- Adobe Acrobat Reader 7 or higher
Upon successful completion, you will be able to:
- Identify the role information sharing plays in the DHS Cyber-Security Strategy to protect, defend and respond to cyber-security incidents
- Recall the sequence of events leading to the establishment of Cyber Information Sharing organizations
- Explain how to join or establish an ISAO/ISAC
Suggested Audience
The target audience for this course includes:
-
Decision Makers
- Managers
- Governors
- Legislators
- Senior Decision Makers
- State Leaders
The audience can be comprised of individual participants, as well as organizational divisions or a combination of both. This course is appropriate for individuals working for state, local, tribal, and territorial organizations, and especially those at decision-making levels.
Other Information
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
Government Programs
- For DHS/FEMA Funded Courses, please contact [email protected] or call (800) 541-7149
Contact Information
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]