Courses
In this introduction to Cybersecurity Maturity Model Certification (CMMC), you will study each layer of the TCP/IP protocols, the vulnerabilities in its design and implementation, and how to exploit vulnerabilities in attacks.
Online
This course introduces students to the introductory concepts and terminology of cybersecurity. This includes fundamental security principles and the historical cybersecurity attacks.
Students should gain familiarity with general security concepts and principles. They should understand the role of people in security and the best defenses against social engineering. Students should also understand the types of attacks on computer systems and networks and the auditing process.
Online
CompTIA Network+ exam covers IT infrastructure, including troubleshooting, configuring, managing, and securing networks. This foundation will help you move into cybersecurity certifications like CompTIA Security+. Successful completion of the course will also earn you 2 Continuing Education Units (CEUs) from the Texas A&M Cybersecurity Center.
Online
CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required in any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US Department of Defense to meet directive 8140/8570.01-M requirements. Successful completion of the course will also earn you 3 Continuing Education Units (CEUs) from the Texas A&M Cybersecurity Center.
Online
Cisco Senior Threat Researcher, Earl Carter, shares how attackers keep upping their game and how Cisco responds. Offers a good description of the types of jobs in the field of cybersecurity.
Online
CyManII’s Cybersecurity Awareness Training is an all-in-one solution that combines engaging & personalized training, streamlined phishing, and insightful reporting to change individuals’ cybersecurity behavior. Our attack vector-based training keeps employees aware of the latest cyber threats, while our new behavioral science-based training focuses on the social engineering tactics that exploit fundamental human emotions. Our training solution includes a proprietary risk algorithm that identifies users’ social engineering vulnerabilities based on phishing simulation data and informs content delivery. Our vision is to make everyone unhackable.
Online
This course explores governance in cybersecurity and threat management. Learn to develop policies and ensure your organization complies with ethics standards and legal and regulatory frameworks. You will also gain skills for managing threats, such as how to assess a network for vulnerabilities, manage risks, and respond to security incidents.
Online
This is a overview of the Course Cyber Threat Landscape.
Online
You’ve been hacked, or even only suspect you’ve been hacked. Now what? Labs in this category guide you through approaches to addressing and managing the aftermath of an attack or security breach. You’ll get to experience actual attacks, within a controlled environment, so that the first time you see ransomware isn’t on your critical systems. The labs in this category focus on the technical aspects of incident response, mitigation, and recovery, versus site-specific organizational policies or procedures.
Online
This course is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some of the more pressing concerns related to internet usage today.
Online
This 10-hour course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection and network/resources repair. Trainees will be presented with real-world examples and scenarios to help provide knowledge, understanding and capacity for effective cyber incident analysis and response.
Online
This is a non-technical course meant to develop an awareness of cybersecurity risks so that elected officials, appointed officials and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and senior management work more effectively with their Information Technology departments to mitigate cyber threats.
Online
This course will help students understand the different types of cyber attacks their company may face, the type of information that is at risk, how to recognize cyber attacks, and why it is important for everyone in the organization to participate in cybersecurity.
Online
This two-hour course teaches that by using technology, which makes our lives easier, we have opened ourselves up to the risks of cyberattacks. This course will introduce you to the basics of protecting your computer and the data it stores, as well as protecting yourself when you are online and while using your mobile or smart devices.
Online
This four hour course will introduce students to various types of cyberattacks and how to detect and respond to them in order to protect their data and information. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection.
Online
This seven-hour course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. The course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
Online
This course will train business managers to respond to varying threats that might impact their organization’s access to information. This 10-hour course provides requisite background theory and recommended best practices needed by managers to keep their offices running during different types of incidents. Topics include an overview of business continuity planning, disaster recovery planning, guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations and an examination of legal issues that may confront an organization.
Online
This 10-hour intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn legislations and organizational efforts to control or prevent such crimes. This course covers intellectual property law, personal jurisdiction, electronic commerce and software contracts, telecommunications, antitrust, privacy, the right to accuracy of information, the right to access information and the First Amendment.
Online
This 13-hour intermediate course covers topics on information assets, identifying risks and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
Online
This course is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this 13-hour course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to providing an introduction to information assurance, trainees will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security and basic cryptography.
Online
This course introduces the preparatory skills needed to learn penetration testing and vulnerability assessment, and familiarizes Information Technology support personnel and managers with the tactics, techniques and procedures (TTPs) that are used by attackers and penetration testers. Participants will have an increased knowledge and understanding about the tools used in a cyber-attack and in turn be better able to prepare defenses.
Online
This course covers the secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics in this five-hour course include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization and accounting), server and client security, and secure policy generation.
Online
This nine-hour course covers the secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies.
Online
This course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to, and recover from targeted cyber attacks.
Online