AWR353 |
Using the Comm CS Maturity Model to Develop a CS Program |
Quick View Course Description
AWR353 – Using the Comm CS Maturity Model to Develop a CS Program
Using the Community Cyber Security Maturity Model to Develop a Cyber Security Program will introduce students to the DHS-supported Community Cyber Security Maturity Model (CCSMM) which can be used as a guide for communities and states in developing their own CCSMM-consistent cybersecurity programs. Students will learn what is required to develop a coordinated, sustained, and viable community cyber security program and resources available to assist in improving awareness, information sharing, policies, and plans.
This course was developed by the University of Texas at San Antonio Center for Infrastructure Assurance and Security through the DHS/FEMA Homeland Security National Training Program
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR366 |
Developing a Cyber Security Annex for Incident Response |
Quick View Course Description
AWR366 – Developing a Cyber Security Annex for Incident Response
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018)
The National Response Framework describes how preparedness can be achieved by developing an incident annex for each hazard. Incident annexes describe coordinating structures used to deliver core capabilities and support response missions unique to a specific type of incident. Incident annexes describe specialized response teams, resources, roles, responsibilities, and other scenario-specific considerations.
At the end of this course, participants should possess the fundamentals needed to design and develop a cyber annex for states, locals, tribes, and/or territories (SLTTs). It addresses what the annex is, how it is used, who should participate in the design, implementation, and execution.
This course was developed by the University of Texas at San Antonio Center for Infrastructure Assurance and Security through the DHS/FEMA Homeland Security National Training Program.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR367 |
Understanding Social Engineering Attacks |
Quick View Course Description
AWR367 – Understanding Social Engineering Attacks
This online course covers topics on social engineering attack techniques and tools, while also equipping learners with a better understanding of how attackers use people as the weakest link to compromise targeted organizations. Participants will learn about social engineering and become familiar with phishing attacks, develop security awareness and take preventive measures.
This course was developed by the University of Memphis, Center for Information Assurance (CfIA) through the DHS/FEMA Homeland Security National Training Program.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR368 |
Introduction to Basic Vulnerability Assessment Skills |
Quick View Course Description
AWR368 – Introduction to Basic Vulnerability Assessment Skills
This course introduces the preparatory skills needed to learn penetration testing and vulnerability assessment, and familiarizes Information Technology support personnel and managers with the tactics, techniques and procedures (TTPs) that are used by attackers and penetration testers. Participants will have an increased knowledge and understanding about the tools used in a cyber-attack and in turn be better able to prepare defenses. The course focuses on the basic skills and knowledge needed to conduct and plan vulnerability assessments and penetration tests as well as show how to legally and ethically conduct tests and assessments. Participants will be introduced to Open Source tools such as Metasploit and Nmap, as well as methodologies for researching vulnerabilities. This course is designed based on research and federal agency reports.
This course was developed by the Norwich University Applied Research Institutes (NUARI) through the DHS/FEMA Homeland Security National Training Program.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR381 |
Establishing an Information Sharing and Analysis Organization |
Quick View Course Description
Cyber-attacks occur more frequently and have become increasingly sophisticated. Cybersecurity events now have the potential to significantly disrupt the business operations of government and critical infrastructure services. Public and private sectors, in the United States, are at increasing and continual risk of surprise attacks from nation-state and non-state actors. (Burgess, 2018)
The growing Information Sharing and Analysis Organization (ISAO) ecosystem provides an opportunity to empower the nation to become more educated and effective in preventing, detecting, and responding to the increasingly sophisticated landscape of cyber threats. There are considerable challenges with the vast quantity of information, the complexities of analysis, and the uncertainties of sharing data with a large network of organizations.
In the 2016 National Preparedness Report, 88% of states and territories indicated a high prioritization of cybersecurity, with only a 13% proficiency in that capability. Likewise, 86% of states and territories ranked intelligence and information sharing as a high priority, with a reported 57% proficiency in that capability. The establishment of an ISAO is a critical step to improve both of these capabilities.
Executive Order 13691 encourages the formation of ISAOs, and states that “organizations engaged in the sharing of information related to cybersecurity risks and incidents play an invaluable role in the collective cybersecurity of the United States”. At the end of this course, participants should possess the fundamentals needed to design and develop an Information Sharing and Analysis Organization (ISAO) for states, locals, tribes, and/or territories (SLTTs). It addresses what the ISAO is, how it is used, who should participate in the design, implementation, building, and execution.
This course was developed by the University of Texas at San Antonio Center for Infrastructure Assurance and Security through the DHS/FEMA Homeland Security National Training Program
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR384 |
Cyber Identity and Authentication |
Quick View Course Description
AWR384 – Cyber Identity and Authentication
Despite the fact that passwords have been used in digital systems for over half a century and many standards and best practices have been developed, many organizations simply neglect to adhere to these standards and expose weaknesses for attackers to exploit. This course provides basic digital identity concepts, biometric authentication and multi-factor authentication approaches that can increase security. The learner will explore various authentication standards and techniques that can prevent unauthorized access of digital resources and services. This course was developed by the University of Memphis through the DHS/FEMA Homeland Security National Training Program
Full course information and schedule
Contact Information
Phone: Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR385 |
Mobile Device Security and Privacy |
Quick View Course Description
AWR385 – Mobile Device Security and Privacy
This course is designed to assist individuals better understand security and privacy issues associated with mobile devices and infrastructure; including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Using scenarios, thought challenges and exercises as a framework, students will learn about:
- The purpose of Enterprise Mobile Management platforms
- Elements that make mobile networks and operating systems different
- Mobile malware classifications and detection strategies
- Mobile architecture data leakage detection and prevention strategies.
This course was developed by the University of Memphis through the DHS/FEMA Homeland Security National Training Program.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR388 |
Cyber Awareness for Municipal Police Fire & EMS Information Technology Prsnl |
Quick View Course Description
This 2 hour, web-based course will cover the basics of cyber awareness for Municipal, Police, Fire and EMS Information Technology personnel. Participants will have an increased knowledge of threats specific to their jurisdiction and an understanding of the processes and procedures needed to develop a cyber-awareness program. This course will focus on the steps involved in being aware of cyber threats and effectively communicating the processes and procedures to protect users against common cyber threats. The participants will apply this knowledge to developing processes and procedures to integrate cyber awareness into routine operations. Participants will gain an understanding and the knowledge needed to start developing and integrating cyber awareness programs in their specific jurisdictions. This course is intended to give managers and technical personnel working in Police, Fire, and EMS IT departments an introduction to becoming aware of cyber threats to their type of agencies. These types of agencies will be aware of threats specifically targeted at them and how to start a cyber-awareness program to combat the threat.
This course was developed by Norwich University Applied Research Institutes through the DHS/FEMA Homeland Security National Training Program.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR389 |
Incident Response for Municipal Police Fire & EMS Information Technology Prsnl |
Quick View Course Description
This 2 hour, web-based course introduces the basics of the incident response processes specific to Information Technology personnel in Municipal, Police, Fire or EMS departments.
This course focuses on the steps involved in being aware of common cyber incidents, as well as steps in developing an incident response plan. The participants will apply this knowledge by developing a response plan specific to their jurisdiction.
The content of the course includes: common cyber incidents occurring in Police, Fire and EMS IT departments, developing a response plan for common cyber incidents, distinguishing tasks for police, fire and EMS IT departments, and processes for future improvements to response plans.
This course was developed by the NUARI through the DHS/FEMA Homeland Security National Training Program.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR398 |
Introduction to Information Sharing and Analysis Organizations |
Quick View Course Description
This 1.5 hour, web-based course introduces the basics of the cybersecurity information sharing processes. Participants will gain knowledge of cybersecurity information sharing and an understanding of how to join or establish an ISAO/ISAC. This course introduces elected officials at multiple levels (State, Local, Tribal, Territorial) as well as senior management and decision-makers (including for commercial entities) to the value proposition of sharing cybersecurity information. The content of the course includes:
- The importance of cyber-security information sharing
- Information sharing organizations and what they do
- Steps for cyber-security information sharing analysis
This course was developed by the NUARI through the DHS/FEMA Homeland Security National Training Program.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR399 |
Detecting and Responding to a Cyber Attack |
Quick View Course Description
AWR399 – Detecting and Responding to a Cyber Attack
As computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection. This course will introduce students to various types of cyber attacks and how to detect and respond to them in order to protect their data and information.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR402 |
Introduction to Internet of Things |
Quick View Course Description
AWR402 – Introduction to Internet of Things
The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things. This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security, and a variety of existing and developing technologies.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |
AWR403 |
Examining Advanced Persistent Threats |
Quick View Course Description
AWR403 – Examining Advanced Persistent Threats
Today’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive, and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). Inadequate deployment and maintenance of security on these systems could provide opportunities for attackers to harm to the American citizenry through NCISS infrastructure and associated resource disruption.
This online course provides an overview of similarities and differences between traditional systems attacks and APT attacks. At the end of this course, participants should possess a fundamental understanding of the most common attack path for various advanced persistent threats (APTs). The course covers (a) the cyber kill chain model (b) APT cases and attack techniques and tools; and (c) common APT defense strategies.
This course was developed by the University of Memphis through the DHS/FEMA Homeland Security National Training Program.
Full course information and schedule
Contact Information
Business & Cyber Solutions Phone: (979) 431-4837 Email: bcs@teex.tamu.edu
|
|
|
KE |