Remote Home/Office Cybersecurity Preparedness Training
AWR431 – 6.00 Hours
Schedule
Details Buttons | Dates | Location | Class | Price | Register Buttons |
---|---|---|---|---|---|
DetailsRemote Home/Office Cyber
|
10/01/24 – 04/30/25 | College Station, TX | EC AWR431 7 | Register |
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.
Course Description
The changing cybersecurity landscape and the Work from Home (WFH) strategies due to the COVID-19 pandemic affected the workforce worldwide. This unexpected pandemic opened the doors to vulnerable cyber-attacks in remote home office environments. Cyber security threats impacted WFH workers and some organizations, requiring them to use different cyber-enabled systems, devices, and services.
This introductory course provides the participants with general knowledge of complex cyberattacks and prepares the work-from-home (WFH) users to identify and manage emerging threats. This course will address the unique vulnerabilities in the remote working environment and the systems software, hardware, and applications used to support remote workers. The course will also cover user awareness of cyber hygiene for remote home office workers and the workplace.
This course is offered by the National Cybersecurity Preparedness Consortium (NCPC) and was developed by the NCPC partner University of Memphis Center for Information Assurance. The course is funded through the DHS/FEMA Homeland Security National Training Program and is offered at no cost.
Prerequisites
There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid or with TEEX assistance upon arrival for class.
Course Completion Requirements
Participants must complete all course content and score a 70% or better on the Post-Test to receive a course certificate of completion.
Attendance Requirements
To meet attendance requirements, participants must review each training module and complete all required course assignment, activities, quizzes and/or end of course exam.
Recommended
A basic level of cybersecurity knowledge.
Upon successful completion, you will be able to:
- Explain the security challenges of remote work arrangements (i.e., Company Office, Remote Work, Hybrid Working Arrangement).
- Explain examples of attack vectors.
- Explain examples of attack surfaces.
- Explain commonly targeted devices and associated protective controls.
- Explain various ways to protect remote assets.
- Explain examples of social engineering techniques and steps to prevent becoming a victim.
- Explain examples of cyber hygiene best practices.
Suggested Audience
Anyone who has managerial or supervisory responsibility to make or influence decisions or policies regarding access to digital resources and services.
Contact Information
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]