• Skip to main content
  • Skip to footer

Texas Defense Aerospace Manufacturing Community

TDAMC

  • About
    • Our Reach
    • Our Team
    • Our Region
  • Resources
    • Assistance & Consulting
    • Roadmapping
    • Learning Lounge
  • Learning Lounge
  • Events
  • Join the Community!
You are here: Home / Learning Lounge / Cybersecurity

Cybersecurity

Courses

Introduction to Cybersecurity Maturity Model

America’s Cutting Edge

In this introduction to Cybersecurity Maturity Model Certification (CMMC), you will study each layer of the TCP/IP protocols, the vulnerabilities in its design and implementation, and how to exploit vulnerabilities in attacks.

Online

Register

Fundamentals of Cybersecurity

Texas A&M High Performance Research Computing

This course introduces students to the introductory concepts and terminology of cybersecurity. This includes fundamental security principles and the historical cybersecurity attacks.

Students should gain familiarity with general security concepts and principles. They should understand the role of people in security and the best defenses against social engineering. Students should also understand the types of attacks on computer systems and networks and the auditing process.

Online

Register

CompTIA Network+ Certification Preparation

Texas A&M Cybersecurity Center

CompTIA Network+ exam covers IT infrastructure, including troubleshooting, configuring, managing, and securing networks. This foundation will help you move into cybersecurity certifications like CompTIA Security+. Successful completion of the course will also earn you 2 Continuing Education Units (CEUs) from the Texas A&M Cybersecurity Center.

Online

Register

CompTIA Security+ Certification Preparation

Texas A&M Cybersecurity Center

CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required in any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US Department of Defense to meet directive 8140/8570.01-M requirements. Successful completion of the course will also earn you 3 Continuing Education Units (CEUs) from the Texas A&M Cybersecurity Center.

Online

Register

Cisco Networking Academy – The Cybersecurity Threat Landscape

CYMANII

Cisco Senior Threat Researcher, Earl Carter, shares how attackers keep upping their game and how Cisco responds. Offers a good description of the types of jobs in the field of cybersecurity.

Online

Register

CyManII Cybersecurity Awareness

CYMANII

CyManII’s Cybersecurity Awareness Training is an all-in-one solution that combines engaging & personalized training, streamlined phishing, and insightful reporting to change individuals’ cybersecurity behavior. Our attack vector-based training keeps employees aware of the latest cyber threats, while our new behavioral science-based training focuses on the social engineering tactics that exploit fundamental human emotions. Our training solution includes a proprietary risk algorithm that identifies users’ social engineering vulnerabilities based on phishing simulation data and informs content delivery. Our vision is to make everyone unhackable.

Online

Register

Cyber Threat Management

CYMANII

This course explores governance in cybersecurity and threat management. Learn to develop policies and ensure your organization complies with ethics standards and legal and regulatory frameworks. You will also gain skills for managing threats, such as how to assess a network for vulnerabilities, manage risks, and respond to security incidents.

Online

Register

Cyber Threat Landscape

CYMANII

This is a overview of the Course Cyber Threat Landscape.

Online

Register

Introduction to Cybersecurity

CYMANII

You’ve been hacked, or even only suspect you’ve been hacked. Now what? Labs in this category guide you through approaches to addressing and managing the aftermath of an attack or security breach. You’ll get to experience actual attacks, within a controlled environment, so that the first time you see ransomware isn’t on your critical systems. The labs in this category focus on the technical aspects of incident response, mitigation, and recovery, versus site-specific organizational policies or procedures.

Online

Register

AWR174-Cyber Ethics

Texas A&M Engineering Extension Service

This course is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some of the more pressing concerns related to internet usage today.

Online

Register

AWR169-Cyber Incident Analysis and Response

Texas A&M Engineering Extension Service

This 10-hour course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection and network/resources repair. Trainees will be presented with real-world examples and scenarios to help provide knowledge, understanding and capacity for effective cyber incident analysis and response.

Online

Register

AWR383-Cybersecurity Awareness for Officials and Senior Management

Texas A&M Engineering Extension Service

This is a non-technical course meant to develop an awareness of cybersecurity risks so that elected officials, appointed officials and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and senior management work more effectively with their Information Technology departments to mitigate cyber threats.

Online

Register

AWR395-Cybersecurity in the Workplace

Texas A&M Engineering Extension Service

This course will help students understand the different types of cyber attacks their company may face, the type of information that is at risk, how to recognize cyber attacks, and why it is important for everyone in the organization to participate in cybersecurity.

Online

Register

AWR397-Cybersecurity for Everyone

Texas A&M Engineering Extension Service

This two-hour course teaches that by using technology, which makes our lives easier, we have opened ourselves up to the risks of cyberattacks. This course will introduce you to the basics of protecting your computer and the data it stores, as well as protecting yourself when you are online and while using your mobile or smart devices.

Online

Register

AWR399-Detecting and Responding to a Cyber Attack

Texas A&M Engineering Extension Service

This four hour course will introduce students to various types of cyberattacks and how to detect and respond to them in order to protect their data and information. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection.

Online

Register

AWR139-Digital Forensics Basics

Texas A&M Engineering Extension Service

This seven-hour course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. The course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.

Online

Register

AWR176-Disaster Recovery for Information Systems

Texas A&M Engineering Extension Service

This course will train business managers to respond to varying threats that might impact their organization’s access to information. This 10-hour course provides requisite background theory and recommended best practices needed by managers to keep their offices running during different types of incidents. Topics include an overview of business continuity planning, disaster recovery planning, guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations and an examination of legal issues that may confront an organization.

Online

Register

AWR168-Foundations of Cyber Crimes

Texas A&M Engineering Extension Service

This 10-hour intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn legislations and organizational efforts to control or prevent such crimes. This course covers intellectual property law, personal jurisdiction, electronic commerce and software contracts, telecommunications, antitrust, privacy, the right to accuracy of information, the right to access information and the First Amendment.

Online

Register

AWR177-Information Risk Management

Texas A&M Engineering Extension Service

This 13-hour intermediate course covers topics on information assets, identifying risks and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.

Online

Register

AWR173-Information Security Basics

Texas A&M Engineering Extension Service

This course is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this 13-hour course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to providing an introduction to information assurance, trainees will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security and basic cryptography.

Online

Register

AWR138-Network Assurance

Texas A&M Engineering Extension Service

This course covers the secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics in this five-hour course include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization and accounting), server and client security, and secure policy generation.

Online

Register

AWR178-Secure Software

Texas A&M Engineering Extension Service

This nine-hour course covers the secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies.

Online

Register

AWR376-Understanding Targeted Cyber Attacks

Texas A&M Engineering Extension Service

This course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to, and recover from targeted cyber attacks.

Online

 

Footer

Texas A&M Engineering Experiment Station
  • Accessibility
  • State Links and Policies
  • Privacy Policy
  • Website Feedback

Copyright © 2025 · Texas A&M Engineering Experiment Station · All Rights Reserved