AWR-136 Essentials of Community Cybersecurity
4 Hours
The Essentials of Community Cybersecurity (ECCS) course provides individuals, community leaders, and first responders with information on how cyber attacks can impact, prevent, and/or stop operations and emergency responses in a community. The course also provides a cursory introduction to cybersecurity vulnerabilities, risks, threats and countermeasures. It explains vulnerabilities of computer systems and networks and how these vulnerabilities can affect communities, organizations and daily workplace operations. The course introduces actions communities can take in establishing a cybersecurity program. The course provides participants with an awareness of issues. It gives an overview of threats and vulnerabilities, without going into too many details, to highlight the potential impact a cyber attack could have. Participants discuss some of the fundamental activities needed to develop a cybersecurity program, without addressing the technical details of how to secure critical infrastructures. The course introduces the Community Cyber Security Maturity Model (CCSMM) as a framework for understanding community cybersecurity and offers a brief introduction to low-cost or no-cost approaches to securing a community against cybersecurity threats and attacks. The course sets the stage for further efforts in which a community can build a cybersecurity program.
Click Here for More Information or to Register
AWR-176 Disaster Recovery For Information Systems
10 Hours
Disaster Recovery for Information Systems will train business managers to respond to varying threats that might impact their organization's access to information. This course provides requisite background theory and recommended best practices needed by managers to keep their offices running during incidents of different types. Topics include an overview of business continuity planning; disaster recovery planning; guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations, and an examination of legal issues that may confront an organization.
Click Here for More Information or to Register
AWR-344-W Cybersecurity and Cyber Incident Awareness: Knowing Yourself & Knowing the Enemy
2 Hours
Cybersecurity and Cyber Incident Knowing Yourself and Knowing Your Enemy is designed to raise your awareness of the importance to improve critical infrastructure cybersecurity. This self-paced two hour course will introduce cybersecurity organizational awareness themes which are of shared concern for both the senior executive management level and information technology department. This course consists of 7 modules or lessons. You will also complete a pre-test, an organizational profile, a course evaluation and a post-test. You will receive a certificate of completion at the end of the course as well as direction for use of your Organizational Profile. Central course topics for this course will help you develop a greater awareness of the roles, responsibilities and capabilities within your organization and systems; the enemies/threats to your organization and systems; and NIST’s Cybersecurity Framework and how to use the document as a guide and resource for gauging your current and target cybersecurity posture.
Click Here for More Information or to Register
Coming Soon – AWR-353-W Developing a Community Cyber Security Program
2 Hours
A new online course that will enable community leaders, network/security personnel and those individuals involved in developing or maintaining plans used for and throughout the community. This course will assist participants to understand what is required to develop a coordinated, sustained, and viable community cyber security program. The course will introduce participants at all levels to the DHS-supported Community Cyber Security Maturity Model (CCSMM) and can be used to guide communities and states in developing their own CCSMM-consistent cybersecurity programs. Participants will be introduced to different resources that can be used for a community program.
MGT-384 Community Preparedness for Cyber Incidents
12 Hours
Community Preparedness for Cyber Incidents is designed to provide organizations and communities with strategies and processes to increase cyber resilience. During this 12-hour course, participants will analyze cyber threats and initial and cascading impacts of cyber incidents, evaluate the process for developing a cyber preparedness program, examine the importance and challenges of cyber related information sharing and discover low to no-cost resources to help build cyber resilience.
Click Here for More Information or to Register
MGT-385 Community Cyber Security Exercise Planning
12 Hours
This course is designed to introduce cyber to exercise planners to help them recognize the nature and reach of cyber, so they can better help their communities prevent, detect, respond to, and recover from cyber incidents. Participants will recognize how cyber can be incorporated into exercises in a meaningful way. Participants will be introduced to cyber topics and how cyber can impact the business operations of an organization and community. Lecture and activities will explore objectives, players, cyber injects and challenges to incorporating cyber into exercises. Participants will be exposed to many possible injects and scenarios that can be used in an exercise. Participants will begin development of a community cybersecurity tabletop exercise. The Community Cybersecurity Maturity Model will be used to examine the contribution of exercises to a community’s overall cybersecurity posture. This course teaches planning personnel how to include cyber components in their regular planning process. Participants will be given the opportunity to plan cyber components for future community cybersecurity exercises.
Click Here for More Information or to Register
Coming Soon - Implementing an Information Sharing Program
16 Hours
This instructor-led course will explore current information sharing programs and address the need for establishing programs in states and communities. Students will learn how to create an information sharing program, continue to develop and evolve it over time, and will be provided a plan to implement information sharing programs that can be modified to fit local needs and requirements.
Coming Soon - Recovering from Cybersecurity Incidents
8 Hours
This one-day course, to be developed by TEEX, will train jurisdictional IT and management personnel to identify and prioritize recovery activities following a severe cyber incident, including planning for long-term recovery with the application of lessons learned, and collection of forensic evidence. The course is for IT jurisdictional staff including upper level managers, emergency management coordinators and government administrators.
AWR-135 Promoting Community Cybersecurity
6 Hours
The Promoting Community Cybersecurity (PCCS) course is designed to give participants an introduction to cybersecurity topics, methods, and processes, and to explore organizational responsibilities in the context of the community, state and nation. The course provides an overview of the steps taken within organizations to protect their cyber resources. The course also looks at that protection within the context of the broader community. Participants will explore the impact of the interconnections and dependencies introduced by information technology. Basic concepts of cybersecurity, network connectivity, threats, types of attacks, and the structure of the Community Cyber Security Maturity Model (CCSMM) will be discussed. The basic characteristics of communities and organizations that exhibit good cybersecurity are examined through the use of case studies within the context of each CCSMM dimension. In addition, the interrelationships between the dimensions of the CCSMM and the dependency on each dimension for good cybersecurity are also discussed.
Click Here for More Information or to Register
AWR-169-W Cyber Incident Analysis and Response
10 Hours
This course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection, and network/resources repair. The trainee will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.
Click Here for More Information or to Register
AWR-177-W Information Risk Management
13 Hours
This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies, and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
Click Here for More Information or to Register
MGT-452 Physical & Cybersecurity for Critical Infrastructure
8 Hours
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. This course encourages collaboration efforts among individuals and organizations responsible for both physical and cybersecurity toward development of integrated risk management strategies that lead to enhanced capabilities necessary for the protection of our Nation’s critical infrastructure. Participants will identify physical and cybersecurity concerns impacting overall infrastructure security posture, examine integrated physical and cybersecurity incidents and the evolving risks and impacts they pose to critical infrastructure, and explore resources that can be applied to improve security within an organization, business, or government entity.
Click Here for More Information or to Register
MGT-456 - Integration of Cybersecurity Personnel into the Emergency Operations Center for Cyber Incidents
24 Hours
The course is designed to assist jurisdictions with coordinating and managing response efforts between emergency response organizations and critical infrastructure cybersecurity personnel, necessary as a result of a cyber incident. The course will help to ensure that traditional emergency management personnel and cybersecurity personnel recognize the importance of working together to mitigate the effects of a cyber incident. This course utilizes the Emergency Management Exercise System (EM*ES) incident simulation software which provides many features that resemble or imitate actual incident management systems. Delivered with Texas A&M Engineering Extension Service / National Emergency Response and Rescue Training Center (TEEX/NERRTC)
Coming Soon - Developing a Cyber Annex
3 Hours
The course is designed to assist those organizations and agencies responsible for developing and maintaining incident response plans at the local and state levels to incorporate cyber incident response into community emergency response plans. The goal of the course is to walk participants through the process of integrating cybersecurity incident response into existing community and/or state physical incident response plans. The course closely follows guidance provided by the Community Cyber Security Maturity Model (CCSMM), which helps communities and states assess their overall level(s) of cyber security maturity in accordance with specific metrics.
Coming Soon - Information Sharing Organization
4 Hours
This web-based course will assist communities of interest to establish an Information Sharing and Analysis Organization (ISAO). The course will introduce the value proposition of creating an ISAO and provide considerations to joining an existing ISAO. The course will closely follow the guidance provided by the ISAO Standards Organization (ISAO SO), whose mission is to “improve the Nation’s cybersecurity posture by identifying standards and guidelines for robust and effective information sharing and analysis related to cybersecurity risks, incidents, and best practices”
Coming Soon - Introduction to Basic Vulnerability Assessment Skills
12 Hours
This introductory course is intended to help prepare learners for the technical challenges associated with conducting vulnerability assessments and/or penetration testing. The six course modules introduce the basic skills learners will need to begin mastering in order to conduct or manage vulnerability assessments. These skills range from the “soft skills” of the ethics involved in vulnerability assessments, to the more technical skills of network scanning and packet analysis. In addition, learners are provided with an introduction to a common, open source tool, Metasploit, which is used by red teams, as well as blue teams to test networks. The content covered in this course provides learners with an understanding of the skills and knowledge needed to successfully learn how to conduct assessments in future, more technical and hands-on courses.