Information Security Basics

AWR173 – 13.00 Hours


EC AWR173 148 Register

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.

Course Description

US Flag Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography. 

As part of a Department of Homeland Security/Federal
Emergency Management Agency (DHS/FEMA) cooperative agreement training program,
this course is available at no direct cost to state, county, and local
government agencies.


There are no prerequisites for this course.

Enrollment Requirements

Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website:; or with TEEX assistance upon arrival for class.

Course Completion Requirements

Participants are required to complete all course content and
score a 70% or better on the Post-Test in order to receive a course certificate
of completion.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.

Broadband connection recommended.

Upon successful completion, you will be able to:

  • Explain the goals of the information security professional and attackers to include the four basic types of attacks most likely to be encountered.
  • Explain Confidentiality, Integrity, and access controls as they apply to the Biba Integrity and Bell-LaPuda Confidentiality Models.
  • Explain the use of a layered architecture model to design and secure a TCP/IP Network.
  • Identify the common techniques of offensive attacks as well as defensive tactics and appliances available to include wireless vulnerabilities.
  • Explain the vulnerabilities of current operating systems and the solutions to guard against common exploits.
  • Implement secure browsing, email and instant messaging practices.

Suggested Audience

  • This course is designed for participants with some knowledge related to information technology seeking to learn about information security/cybersecurity.
  • Continuing Education And Professional Credits

    • 2.00 hours – American Council on Education (ACE)
    • State Board for Educator Certification (SBEC)/Texas Education Agency (TEA)

    Other Information

    In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.

    Government Programs

    Contact Information

    Business & Cyber Solutions
    Phone: (979) 431-4837
    Email: [email protected]