Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. This course also includes information on securing cloud-based networks and applications. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. | On-Location Course DetailsDescription: Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. This course also includes information on securing cloud-based networks and applications. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Prerequisites: There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class. Topics: Explain layered defense in depth that includes firewalls, intrusion detection and preventions systems and the most current cryptographic standards for data protection.Explain data logging, auditing, authentication and authorization, as well as the benefits of honeypots.Explain the common techniques of implementing security for cloud based and virtual networks to include vulnerabilities.Explain server and database security.Explain best practices for network security.,Audience: - IT and cybersecurity staff interested in furthering their knowledge base regarding network security and assurance.
- Individuals interested in learning about network security and assurance.
Other Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course. Enrollment RequirementsParticipants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class. Topics: Explain the basic concepts of behind digital forensics.Identify how computers, mobile devices and gaming systems store data in relation to digital forensics.Explain the basic concepts of collecting digital evidence.Understand the basic concepts of analyzing digital forensic data.Explain concepts related to digital forensic reporting.Explain concepts related to evidentiary requirements in digital forensics.Explain the roles and responsibilities of a digital forensics expert witness.,Audience: IT staff and law enforcement officers and/or agents interested in furthering their knowledge regarding digital forensics.Other Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
Foundations of Cyber Crimes highlights a range of cyber crimes and the appropriate response by first responders and other local, state, and federal agencies that may encounter them. Participants will identify legislative, organizational, and suggested personal efforts to control or prevent cyber crimes. This course examines cyber and cyber facilitated non-violent white-collar crimes, fraud and financial crimes, and violent crimes. The broad landscape of the cyber crimes discussed in this course illustrates the fact that almost all crimes can either be directly committed or indirectly facilitated through the cyber domain–a result of society’s increasing integration and dependence on the Internet and computers into nearly every aspect of daily life.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: Foundations of Cyber Crimes highlights a range of cyber crimes and the appropriate response by first responders and other local, state, and federal agencies that may encounter them. Participants will identify legislative, organizational, and suggested personal efforts to control or prevent cyber crimes. This course examines cyber and cyber facilitated non-violent white-collar crimes, fraud and financial crimes, and violent crimes. The broad landscape of the cyber crimes discussed in this course illustrates the fact that almost all crimes can either be directly committed or indirectly facilitated through the cyber domain–a result of society’s increasing integration and dependence on the Internet and computers into nearly every aspect of daily life.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course. Enrollment RequirementsParticipants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class. Topics: Explain basic concepts related to cyber laws, regulations, and protections.Differentiate between various types of cyber crimes.Explain various types of white-collar crimes.Describe various types of cyber-facilitated crimes.Describe procedures for collecting, preserving, and utilizing evidence by cyber law enforcement entities and agencies.Explain methods for mitigating cyber crimes against businesses and individuals.,Audience: This course is applicable to any participant interested in learning more about cyber crimes. Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, contact us. |
Introduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: Introduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response. As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course. Enrollment RequirementsParticipants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class. Topics: Explain the concepts of cyber incident management.Explain the preparation phase of cybersecurity incident management.Explain the detection and analysis phase of cybersecurity incident management.Explain cyber incident containment, eradication and recovery.Explain the post incident activities of cybersecurity incident management.Relate the cyber incident management process to common cyber incidents.,Audience: This course is for IT professionals responsible for identifying and responding to cyber events, including local government, private industry, and critical infrastructure representatives. Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. | On-Location Course DetailsDescription: Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Prerequisites: There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class. Topics: Explain the goals of the information security professional and attackers to include the four basic types of attacks most likely to be encountered.Explain Confidentiality, Integrity, and access controls as they apply to the Biba Integrity and Bell-LaPuda Confidentiality Models.Explain the use of a layered architecture model to design and secure a TCP/IP Network.Identify the common techniques of offensive attacks as well as defensive tactics and appliances available to include wireless vulnerabilities.Explain the vulnerabilities of current operating systems and the solutions to guard against common exploits.Implement secure browsing, email and instant messaging practices.,Audience: This course is designed for participants with some knowledge related to information technology seeking to learn about information security/cybersecurity. Other Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.? As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.? As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class. Topics: Evaluate key concepts related to cyber ethics and ethical practices.Explain the ethics of personal privacy.Evaluate the ethical use of electronic information.?Analyze key concepts related to professional ethics.Discuss free speech online from a legal and ethical perspective.?Differentiate between various types of cyber criminals and hackers.?,Audience: This course is intended for all computer users.Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed. | On-Location Course DetailsDescription: Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed. Prerequisites: There are no prerequisites for this class Topics: Safe internet usageSecuring a clean computerSecuring a corrupted computerProtecting your computer and its contentsSecuring computer networksSecure communications and information security best practicesMaintaining Privacy Guidelines for maintaining privacy while surfing the internet,Audience: Emergency management agency
Emergency medical services
Fire service
Governmental administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous materials personnel
Other Information:
In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
|
Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including: - Overview of business continuity and disaster recovery planning
- Planning process and strategies
- Implementation and management of a disaster recovery plan
- Work around procedures
- Technical vulnerabilities faced by organizations
- Legal issues that may confront an organization
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including: - Overview of business continuity and disaster recovery planning
- Planning process and strategies
- Implementation and management of a disaster recovery plan
- Work around procedures
- Technical vulnerabilities faced by organizations
- Legal issues that may confront an organization
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class. Topics: Organize personnel and information to begin the disaster recovery planning process.Identify assets, vulnerabilities that might impact them and controls used to protect them.Explain how to conduct a business impact analysis.Identify the steps necessary to handle an incident from identification through recovery.
Develop a process for testing, reviewing, maintaining and updating the disaster recovery plan.
,Audience: - Emergency management
- Planners
- Decision makers
- Information technology managers of private and public sector organizations and state, local, tribal and territorial governments.
Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid; or with TEEX assistance upon arrival for class. Topics: Identify key concepts of information security risk management.Describe IT assets for a business impact analysis.Describe how to identify risks, hazards, and cyber threats.Identify different forms of risk threats and cyber risks quantification based on vulnerabilities, impact, and likelihood.Explain how to use risk controls to mitigate or eliminate identified risks.,Audience: Managers and other decision makers who need an understanding of how to mitigate risks from IT sources. Also, IT personnel that require an understanding of formal risk management and mitigation theory. Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid;or with TEEX assistance upon arrival for class. Topics: Recognize fundamental concepts of developing secure software.Identify the need for secure software design and explain how these techniques are used to create more robust and reliable software.Identify secure programming methods for mobile devices.Identify commonly used secure software development methodologies.,Audience: Software developers and IT staff interested in furthering their knowledge regarding the development of secure software. Other Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |