Cybersecurity threats targeting networks are rapidly
increasing and evolving, presenting significant risks to national security,
public safety, economic stability, and community resilience. Recent incidents
involving networks have demonstrated vulnerabilities that, if exploited, could
disrupt essential services and cause widespread harm. To address these emerging
threats, there is a critical need for comprehensive training that equips
government officials, infrastructure operators, emergency management professionals,
and community stakeholders with the knowledge and skills necessary to prevent,
detect, respond to, and recover from cyber incidents involving networks. This
course directly addresses this gap, enhancing network security and assurance.
This course Network Assurance focuses on securing networked systems
against attacks through firewalls, intrusion detection/prevention, encryption,
AAA (authentication, authorization, and accounting) protocols, and secure
policy implementation. The course also covers server/client security and
cloud-based network protection.
| On-Location Course DetailsDescription: Cybersecurity threats targeting networks are rapidly
increasing and evolving, presenting significant risks to national security,
public safety, economic stability, and community resilience. Recent incidents
involving networks have demonstrated vulnerabilities that, if exploited, could
disrupt essential services and cause widespread harm. To address these emerging
threats, there is a critical need for comprehensive training that equips
government officials, infrastructure operators, emergency management professionals,
and community stakeholders with the knowledge and skills necessary to prevent,
detect, respond to, and recover from cyber incidents involving networks. This
course directly addresses this gap, enhancing network security and assurance.
This course Network Assurance focuses on securing networked systems
against attacks through firewalls, intrusion detection/prevention, encryption,
AAA (authentication, authorization, and accounting) protocols, and secure
policy implementation. The course also covers server/client security and
cloud-based network protection. Prerequisites: There are no prerequisites for this course.
Enrollment RequirementsYou must be a United States citizen to register for this
class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or
call (979) 431-4837 for more information on the approval process. Participants
must have a FEMA Participant Identification Number (SID) to register for this
class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Identify various layered-defense strategies using the most current cryptographic standards for data protection.Recognize methods of data logging, auditing, authentication and authorization, as well as the benefits of honeypots.Identify the common techniques of implementing security for cloud based and virtual networks to include vulnerabilities.Recognize web server security and principles of securing databases.Recognize router and network security, and best practices for safe network operations.,Audience: Other Information: You’re on Your Way to a Technical Cybersecurity
Certificate! This course is part of the following Cybersecurity
Certificate Program: Technical
Cybersecurity Certificate
Once you have completed all courses in the program,
complete the Cybersecurity Certificate Application and return the form
to bcs@teex.tamu.edu to
receive the certificate. |
This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course. Enrollment RequirementsYou must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Explain the basic concepts of behind digital forensics.Identify how computers, mobile devices and gaming systems store data in relation to digital forensics.Explain the basic concepts of collecting digital evidence.Understand the basic concepts of analyzing digital forensic data.Explain concepts related to digital forensic reporting.Explain concepts related to evidentiary requirements in digital forensics.Explain the roles and responsibilities of a digital forensics expert witness.,Audience: IT staff and law enforcement officers and/or agents interested in furthering their knowledge regarding digital forensics. Other Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. You're on Your Way to a Cybersecurity Essentials Certificate!Students who finish all five courses within three years are eligible for a printed Cybersecurity Essentials Certificate. To claim yours, complete the Cybersecurity Essentials Certificate Application and send it to business.cybersolutions@teex.tamu.edu. |
Foundations of Cyber Crimes is an
eLearning course that provides participants with a comprehensive introduction
to the modern landscape of cyber‑enabled and cyber‑dependent criminal activity.
As society becomes increasingly reliant on computers, mobile devices, and
networked technologies, nearly every category of crime now has a digital
dimension. This course equips learners with the knowledge needed to recognize,
understand, and respond to these evolving threats.
Participants will examine the full spectrum of cyber crimes,
from non‑violent white‑collar offenses and financial fraud to cyber‑facilitated
violent crimes, and explore how emerging technologies, including artificial
intelligence, are used both to perpetrate and to prevent criminal activity. The
course also highlights the roles and responsibilities of first responders and
local, state, tribal, territorial, and federal agencies in addressing cyber
incidents.
Through an exploration of legislative frameworks,
organizational practices, and recommended personal security measures, participants
will gain a foundational understanding of how cyber crimes occur and what can
be done to mitigate them. By the end of the course, participants will be
prepared to identify common cyber threats, explain how they unfold, and
describe effective strategies for prevention and response.
As part of a Department of Homeland Security/Federal
Emergency Management Agency (DHS/FEMA) cooperative agreement training program,
this course is available at no direct cost to state, county, and local
government agencies. | On-Location Course DetailsDescription: Foundations of Cyber Crimes is an
eLearning course that provides participants with a comprehensive introduction
to the modern landscape of cyber‑enabled and cyber‑dependent criminal activity.
As society becomes increasingly reliant on computers, mobile devices, and
networked technologies, nearly every category of crime now has a digital
dimension. This course equips learners with the knowledge needed to recognize,
understand, and respond to these evolving threats.
Participants will examine the full spectrum of cyber crimes,
from non‑violent white‑collar offenses and financial fraud to cyber‑facilitated
violent crimes, and explore how emerging technologies, including artificial
intelligence, are used both to perpetrate and to prevent criminal activity. The
course also highlights the roles and responsibilities of first responders and
local, state, tribal, territorial, and federal agencies in addressing cyber
incidents.
Through an exploration of legislative frameworks,
organizational practices, and recommended personal security measures, participants
will gain a foundational understanding of how cyber crimes occur and what can
be done to mitigate them. By the end of the course, participants will be
prepared to identify common cyber threats, explain how they unfold, and
describe effective strategies for prevention and response.
As part of a Department of Homeland Security/Federal
Emergency Management Agency (DHS/FEMA) cooperative agreement training program,
this course is available at no direct cost to state, county, and local
government agencies. Prerequisites: There are no prerequisites for this course. Enrollment RequirementsYou must be a United States citizen to register for this
class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or
call (979) 431-4837 for more information on the approval process. Participants
must have a FEMA Participant Identification Number (SID) to register for this
class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Recognize foundational concepts related to cyber laws, regulations, protections, and the implications of emerging technologies.Differentiate between various types of cyber crimes and analyze their evolving nature in the context of emerging technologies.Recognize various types of white-collar crimes.Identify various types of cyber facilitated crimes.Identify procedures for collecting, preserving, and utilizing evidence by cyber law enforcement entities and agencies.Recognize methods for mitigating cyber crimes against businesses and individuals and understand best practices for reporting such crimes.,Audience: This course is designed for SLTT government personnel, law
enforcement officers, and private-sector professionals seeking to expand their
understanding of cyber crimes and their impact on public safety and
organizational security. Other Information: You’re on Your Way to an Awareness Cybersecurity
Certificate!
This course is part of the following Cybersecurity
Certificate Program:
Cybersecurity
Awareness
Once you have completed all courses in a program, complete
the Cybersecurity Certificate Application and return the form to bcs@teex.tamu.edu to
receive the certificate. |
Introduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: Introduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course. Enrollment RequirementsYou must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Explain the concepts of cyber incident management.Explain the preparation phase of cybersecurity incident management.Explain the detection and analysis phase of cybersecurity incident management.Explain cyber incident containment, eradication and recovery.Explain the post incident activities of cybersecurity incident management.Relate the cyber incident management process to common cyber incidents.,Audience: This course is for IT professionals responsible for identifying and responding to cyber events, including local government, private industry, and critical infrastructure representatives. Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. You're on Your Way to a Cybersecurity Certificate!Students who finish all five courses within three years are eligible for a printed Cybersecurity Risk Management Certificate or Cybersecurity Preparedness Certificate. To claim yours, complete the application and send it to bcs@teex.tamu.edu. |
Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. | On-Location Course DetailsDescription: Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies. Prerequisites: There are no prerequisites for this course.
Enrollment RequirementsYou must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Explain the goals of the information security professional and attackers to include the four basic types of attacks most likely to be encountered.Explain Confidentiality, Integrity, and access controls as they apply to the Biba Integrity and Bell-LaPuda Confidentiality Models.Explain the use of a layered architecture model to design and secure a TCP/IP Network.Identify the common techniques of offensive attacks as well as defensive tactics and appliances available to include wireless vulnerabilities.Explain the vulnerabilities of current operating systems and the solutions to guard against common exploits.Implement secure browsing, email and instant messaging practices.,Audience: This course is designed for participants with some knowledge related to information technology seeking to learn about information security/cybersecurity. Other Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. You're on Your Way to a Cybersecurity Essentials Certificate!Students who finish all five courses within three years are eligible for a printed Cybersecurity Essentials Certificate. To claim yours, complete the Cybersecurity Essentials Certificate Application and send it to business.cybersolutions@teex.tamu.edu. |
This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.?
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription:  This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.? As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course.
Enrollment RequirementsYou must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Evaluate key concepts related to cyber ethics and ethical practices.Explain the ethics of personal privacy.Evaluate the ethical use of electronic information.?Analyze key concepts related to professional ethics.Discuss free speech online from a legal and ethical perspective.?Differentiate between various types of cyber criminals and hackers.?,Audience: This course is intended for all computer users.Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. You're on Your Way to a Cybersecurity Essentials Certificate!Students who finish all five courses within three years are eligible for a printed Cybersecurity Essentials Certificate. To claim yours, complete the Cybersecurity Essentials Certificate Application and send it to business.cybersolutions@teex.tamu.edu. |
Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed. | On-Location Course DetailsDescription: Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed. Prerequisites: There are no prerequisites for this class Topics: Safe internet usageSecuring a clean computerSecuring a corrupted computerProtecting your computer and its contentsSecuring computer networksSecure communications and information security best practicesMaintaining Privacy Guidelines for maintaining privacy while surfing the internet,Audience: Emergency management agency
Emergency medical services
Fire service
Governmental administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous materials personnel
Other Information:
In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
|
Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including:
- Overview of business continuity and disaster recovery planning
- Planning process and strategies
- Implementation and management of a disaster recovery plan
- Work around procedures
- Technical vulnerabilities faced by organizations
- Legal issues that may confront an organization
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including:
- Overview of business continuity and disaster recovery planning
- Planning process and strategies
- Implementation and management of a disaster recovery plan
- Work around procedures
- Technical vulnerabilities faced by organizations
- Legal issues that may confront an organization
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course.
Enrollment RequirementsYou must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Organize personnel and information to begin the disaster recovery planning process.Identify assets, vulnerabilities that might impact them and controls used to protect them.Explain how to conduct a business impact analysis.Identify the steps necessary to handle an incident from identification through recovery.
Develop a process for testing, reviewing, maintaining and updating the disaster recovery plan.
,Audience: - Emergency management
- Planners
- Decision makers
- Information technology managers of private and public sector organizations and state, local, tribal and territorial governments.
Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. You're on Your Way to a Cybersecurity Essentials Certificate!Students who finish all five courses within three years are eligible for a printed Cybersecurity Essentials Certificate. To claim yours, complete the Cybersecurity Essentials Certificate Application and send it to business.cybersolutions@teex.tamu.edu. |
This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course.
Enrollment RequirementsYou must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Identify key concepts of information security risk management.Describe IT assets for a business impact analysis.Describe how to identify risks, hazards, and cyber threats.Identify different forms of risk threats and cyber risks quantification based on vulnerabilities, impact, and likelihood.Explain how to use risk controls to mitigate or eliminate identified risks.,Audience: Managers and other decision makers who need an understanding of how to mitigate risks from IT sources. Also, IT personnel that require an understanding of formal risk management and mitigation theory. Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. You're on Your Way to a Cybersecurity Essentials Certificate!Students who finish all five courses within three years are eligible for a printed Cybersecurity Essentials Certificate. To claim yours, complete the Cybersecurity Essentials Certificate Application and send it to business.cybersolutions@teex.tamu.edu. |
This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
| On-Location Course DetailsDescription: This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites: There are no prerequisites for this course.
Enrollment RequirementsYou must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid. Topics: Recognize fundamental concepts of developing secure software.Identify the need for secure software design and explain how these techniques are used to create more robust and reliable software.Identify secure programming methods for mobile devices.Identify commonly used secure software development methodologies.,Audience: Software developers and IT staff interested in furthering their knowledge regarding the development of secure software. Other Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. You're on Your Way to a Cybersecurity Essentials Certificate!Students who finish all five courses within three years are eligible for a printed Cybersecurity Essentials Certificate. To claim yours, complete the Cybersecurity Essentials Certificate Application and send it to business.cybersolutions@teex.tamu.edu. |