Courses

DHS & FEMA This program is supported by Cooperative Agreement Number EMW-2013-CA-K00146, administered by the U.S. Department of Homeland Security, National Training and Education Division. Points of view or opinions in this program are those of the author(s) and do not represent the position or policies of the U.S. Department of Homeland Security.

Network Assurance

AWR138

US Flag Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. This course also includes information on securing cloud-based networks and applications.

As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

On-Location Course Details
Class Number
EC AWR138

Description:

US Flag Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. This course also includes information on securing cloud-based networks and applications.

As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



Prerequisites:

There are no prerequisites for this course.

Enrollment Requirements

Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.



Topics:
  • Explain layered defense in depth that includes firewalls, intrusion detection and preventions systems and the most current cryptographic standards for data protection.
  • Explain data logging, auditing, authentication and authorization, as well as the benefits of honeypots.
  • Explain the common techniques of implementing security for cloud based and virtual networks to include vulnerabilities.
  • Explain server and database security.
  • Explain best practices for network security.,

  • Audience:

    • IT and cybersecurity staff interested in furthering their knowledge base regarding network security and assurance.
    • Individuals interested in learning about network security and assurance.



    Other Information:

    In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.



    Digital Forensics Basics

    AWR139

    US FlagThis course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

    On-Location Course Details
    Class Number
    EC AWR139

    Description:

    US FlagThis course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



    Prerequisites:

    There are no prerequisites for this course.

    Enrollment Requirements

    Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.



    Topics:
  • Explain the basic concepts of behind digital forensics.
  • Identify how computers, mobile devices and gaming systems store data in relation to digital forensics.
  • Explain the basic concepts of collecting digital evidence.
  • Understand the basic concepts of analyzing digital forensic data.
  • Explain concepts related to digital forensic reporting.
  • Explain concepts related to evidentiary requirements in digital forensics.
  • Explain the roles and responsibilities of a digital forensics expert witness.,

  • Audience:
  • IT staff and law enforcement officers and/or agents interested in furthering their knowledge regarding digital forensics.


  • Other Information:

    In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.



    Foundations of Cyber Crimes

    AWR168

    US Flag Foundations of Cyber Crimes highlights a range of cyber crimes and the appropriate response by first responders and other local, state, and federal agencies that may encounter them. Participants will identify legislative, organizational, and suggested personal efforts to control or prevent cyber crimes. This course examines cyber and cyber facilitated non-violent white-collar crimes, fraud and financial crimes, and violent crimes. The broad landscape of the cyber crimes discussed in this course illustrates the fact that almost all crimes can either be directly committed or indirectly facilitated through the cyber domain–a result of society’s increasing integration and dependence on the Internet and computers into nearly every aspect of daily life.

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

    On-Location Course Details
    Class Number
    EC AWR168

    Description:

    US Flag Foundations of Cyber Crimes highlights a range of cyber crimes and the appropriate response by first responders and other local, state, and federal agencies that may encounter them. Participants will identify legislative, organizational, and suggested personal efforts to control or prevent cyber crimes. This course examines cyber and cyber facilitated non-violent white-collar crimes, fraud and financial crimes, and violent crimes. The broad landscape of the cyber crimes discussed in this course illustrates the fact that almost all crimes can either be directly committed or indirectly facilitated through the cyber domain–a result of society’s increasing integration and dependence on the Internet and computers into nearly every aspect of daily life.

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



    Prerequisites:

    There are no prerequisites for this course.

    Enrollment Requirements

    Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.



    Topics:
  • Explain basic concepts related to cyber laws, regulations, and protections.
  • Differentiate between various types of cyber crimes.
  • Explain various types of white-collar crimes.
  • Describe various types of cyber-facilitated crimes.
  • Describe procedures for collecting, preserving, and utilizing evidence by cyber law enforcement entities and agencies.
  • Explain methods for mitigating cyber crimes against businesses and individuals.,

  • Audience:

    This course is applicable to any participant interested in learning more about cyber crimes.



    Other Information:

    In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, contact us.



    Introduction to Cyber Incident Management

    AWR169

    US FlagIntroduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

    On-Location Course Details
    Class Number
    EC AWR169

    Description:

    US FlagIntroduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



    Prerequisites:

    There are no prerequisites for this course.

    Enrollment Requirements

    Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.



    Topics:
  • Explain the concepts of cyber incident management.
  • Explain the preparation phase of cybersecurity incident management.
  • Explain the detection and analysis phase of cybersecurity incident management.
  • Explain cyber incident containment, eradication and recovery.
  • Explain the post incident activities of cybersecurity incident management.
  • Relate the cyber incident management process to common cyber incidents.,

  • Audience:

  • This course is for IT professionals responsible for identifying and responding to cyber events, including local government, private industry, and critical infrastructure representatives. 


  • Other Information:

    In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.



    Information Security Basics

    AWR173

    US Flag Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

    On-Location Course Details
    Class Number
    EC AWR173

    Description:

    US Flag Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



    Prerequisites:

    There are no prerequisites for this course.

    Enrollment Requirements

    Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.



    Topics:
  • Explain the goals of the information security professional and attackers to include the four basic types of attacks most likely to be encountered.
  • Explain Confidentiality, Integrity, and access controls as they apply to the Biba Integrity and Bell-LaPuda Confidentiality Models.
  • Explain the use of a layered architecture model to design and secure a TCP/IP Network.
  • Identify the common techniques of offensive attacks as well as defensive tactics and appliances available to include wireless vulnerabilities.
  • Explain the vulnerabilities of current operating systems and the solutions to guard against common exploits.
  • Implement secure browsing, email and instant messaging practices.,

  • Audience:

    This course is designed for participants with some knowledge related to information technology seeking to learn about information security/cybersecurity.



    Other Information:

    In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.



    Cyber Ethics

    AWR174

    US Flag This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.? 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

    On-Location Course Details
    Class Number
    EC AWR174

    Description:
    US Flag This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.? 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



    Prerequisites:

    There are no prerequisites for this course.

    Enrollment Requirements

    Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.



    Topics:
  • Evaluate key concepts related to cyber ethics and ethical practices.
  • Explain the ethics of personal privacy.
  • Evaluate the ethical use of electronic information.?
  • Analyze key concepts related to professional ethics.
  • Discuss free speech online from a legal and ethical perspective.?
  • Differentiate between various types of cyber criminals and hackers.?,

  • Audience:
  • This course is intended for all computer users.


  • Other Information:

    In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.



    Information Security for Everyone

    AWR175

    Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.

    Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed.

    On-Location Course Details
    Class Number
    EC AWR175

    Description:

    Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.

    Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed.



    Prerequisites:
    There are no prerequisites for this class

    Topics:
  • Safe internet usage
  • Securing a clean computer
  • Securing a corrupted computer
  • Protecting your computer and its contents
  • Securing computer networks
  • Secure communications and information security best practices
  • Maintaining Privacy Guidelines for maintaining privacy while surfing the internet,

  • Audience:
  • Emergency management agency
  • Emergency medical services
  • Fire service
  • Governmental administrative
  • Law enforcement
  • Healthcare
  • Public health
  • Public safety communications
  • Public works
  • Hazardous materials personnel

    Other Information:

    In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.



  • Disaster Recovery for Information Systems

    AWR176

    US Flag Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including: 

    • Overview of business continuity and disaster recovery planning 
    • Planning process and strategies 
    • Implementation and management of a disaster recovery plan 
    • Work around procedures  
    • Technical vulnerabilities faced by organizations 
    • Legal issues that may confront an organization 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

    On-Location Course Details
    Class Number
    EC AWR176

    Description:

    US Flag Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including: 

    • Overview of business continuity and disaster recovery planning 
    • Planning process and strategies 
    • Implementation and management of a disaster recovery plan 
    • Work around procedures  
    • Technical vulnerabilities faced by organizations 
    • Legal issues that may confront an organization 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



    Prerequisites:

    There are no prerequisites for this course.

    Enrollment Requirements

    Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.



    Topics:
  • Organize personnel and information to begin the disaster recovery planning process.
  • Identify assets, vulnerabilities that might impact them and controls used to protect them.
  • Explain how to conduct a business impact analysis.
  • Identify the steps necessary to handle an incident from identification through recovery.
  • Develop a process for testing, reviewing, maintaining and updating the disaster recovery plan. ,

  • Audience:

    • Emergency management
    • Planners
    • Decision makers
    • Information technology managers of private and public sector organizations and state, local, tribal and territorial governments. 



    Other Information:

    In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.



    Information Risk Management

    AWR177

    US Flag This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

    On-Location Course Details
    Class Number
    EC AWR177

    Description:

    US Flag This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



    Prerequisites:

    There are no prerequisites for this course.

    Enrollment Requirements

    Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class.



    Topics:
  • Identify key concepts of information security risk management.
  • Describe IT assets for a business impact analysis.
  • Describe how to identify risks, hazards, and cyber threats.
  • Identify different forms of risk threats and cyber risks quantification based on vulnerabilities, impact, and likelihood.
  • Explain how to use risk controls to mitigate or eliminate identified risks.,

  • Audience: Managers and other decision makers who need an understanding of how to mitigate risks from IT sources. Also, IT personnel that require an understanding of formal risk management and mitigation theory.

    Other Information:

    In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.



    Secure Software

    AWR178

    US Flag This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.

    On-Location Course Details
    Class Number
    EC AWR178

    Description:

    US Flag This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. 

    As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.



    Prerequisites:

    There are no prerequisites for this course.

    Enrollment Requirements

    Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid;or with TEEX assistance upon arrival for class.



    Topics:
  • Recognize fundamental concepts of developing secure software.
  • Identify the need for secure software design and explain how these techniques are used to create more robust and reliable software.
  • Identify secure programming methods for mobile devices.
  • Identify commonly used secure software development methodologies.,

  • Audience:

    Software developers and IT staff interested in furthering their knowledge regarding the development of secure software. 



    Other Information:

    In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.

    After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.