expand your cyber security horizon. · expand your cyber security horizon. training from these...

2
Expand your cyber security horizon. Training from these resources can help. Free Training Resources The Center for Infrastructure Assurance and Security Voice and Data Security: An Introduction to Information Assurance4-day lecture and hands-on training course provides an introduction to information assurance and general security practices. The lectures and hands-on lab exercises cover a broad range of topics related to information assurance and information security issues. www.cias.utsa.edu/dhs_courses.html CERT/Coordination Center, Carnegie Mellon University CERT/CC Virtual Training Environmentweb-based, presentation-style course. Topics range from technical to simple, and some courses include demonstrations. www.vte.cert.org/vteweb/Library/Library.aspx Massachusetts Institute of Technology Network and Computer Securityan upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857- network-and-computer-security-fall-2003/ Training works. This flyer provides numerous resources for free or low-cost training in a wide variety of cyber security disciplines. For a complete listing of CIAS- provided training, please visit our web site: http://cias.utsa.edu Additional training resources (free and fee-based) are listed on the reverse of this flyer.

Upload: others

Post on 08-Jul-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Expand your cyber security horizon. · Expand your cyber security horizon. Training from these resources can help. Free Training Resources The Center for Infrastructure Assurance

Expand your cyber security horizon. Training from these resources can help.

Free Training Resources

The Center for Infrastructure Assurance and Security Voice and Data Security: An Introduction to Information Assurance—4-day lecture and hands-on training course provides an introduction to information assurance and general security practices. The lectures and hands-on lab exercises cover a broad range of topics related to information assurance and information security issues. www.cias.utsa.edu/dhs_courses.html

CERT/Coordination Center, Carnegie Mellon University CERT/CC Virtual Training Environment—web-based, presentation-style course. Topics range from technical to simple, and some courses include demonstrations. www.vte.cert.org/vteweb/Library/Library.aspx

Massachusetts Institute of Technology Network and Computer Security—an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857-network-and-computer-security-fall-2003/

Training works. This flyer provides numerous resources for free or low-cost training in a wide variety of cyber security disciplines. For a complete listing of CIAS-provided training, please visit our web site: http://cias.utsa.edu Additional training resources (free and fee-based) are listed on the reverse of this flyer.

Page 2: Expand your cyber security horizon. · Expand your cyber security horizon. Training from these resources can help. Free Training Resources The Center for Infrastructure Assurance

Free Training Resources

(Continued)

Adaptive Cyber-Security Training Online (ACT-

Online) Information Security for Everyone—designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage. http://www.teexwmdcampus.com/user_defined_content.k2?contentID=6

Cyber Ethics—designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet. Topics covered include privacy, intellectual property, professional codes of ethics, freedom of speech on the Internet, and issues related to ethical hacking. http://www.teexwmdcampus.com/user_defined_content.k2?contentID=6

Information Security Basics—designed to teach entry and mid-level IT workers the technological fundamentals of information security. In addition to providing an introduction to information assurance, trainees will also learn general concepts (terminologies), an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography. http://www.teexwmdcampus.com/user_defined_content.k2?contentID=6

Business Information Continuity—designed to train business managers to respond to varying threats that might impact their organization’s access to information. Topics include an overview of business information continuity, guides for implementing and managing a business information continuity plan, a discussion of technical vulnerabilities faced by organizations, and an examination of legal issues that may confront an organization. http://www.teexwmdcampus.com/user_defined_content.k2?contentID=6

The Cyberterrorism Defense Initiative (CDI) Comprehensive Cyberterrorism Defense—four-and-a-half day course that will expose participants to potential attack methods from cyberterrorists. After an introduction to cyberterrorism, participants will learn how to protect network systems by survey of the following: planning and preparation of defenses; installation and administration of defenses; hardening network defenses; administration of defenses; monitoring defenses; and testing and modifying defenses—followed by a review of cyberterrorism defenses and emerging trends. www.cyberterrorismcenter.org/ccd.html

Cyberterrorism First Responder—designed to prepare first responders to effectively and efficiently act to counter any type of cyber-based terror attack against our nation’s internet, communications, and network-based infrastructure. This is an intense, hands-on course for skilled technical personnel who meet specific technical prerequisites, and are responsible for responding to agency assistance calls for potential cyberterrorism activity. www.cyberterrorismcenter.org/cfr.html

Cybersecurity: Prevention, Deterrence, & Recovery—concepts in securing public safety networks. Specific system attacks are analyzed, including data repository, mobile data terminal, emergency responder communication, and internet-based attacks. Participants will learn attack preparation, identification, and active defense techniques. www.cyberterrorismcenter.org/pdr.html

Cybersecurity: Incident Handling and Response—proper actions and investigative procedures for dealing with critical incidents involving network infrastructure. www.cyberterrorismcenter.org/ihr.html

Fee-based Training Resources

SANS Institute SANS Institute Security Awareness Training—A wide variety of security awareness courses, from software to network security, are offered by the SANS Institute. www.sans.org/security_awareness.php

SANS Institute On-site Training—The SANS On-site Training Program is available for class sizes of 15 students or more and is available in the following formats: Live-in, Virtual, or Partnership. www.sans.org/onsite/

SANS Institute Partnership Training—The SANS Partnership Series is an outreach program created to provide deeply discounted training to support constituencies that have: 1. a clear impact on national security, 2. large numbers of information security practitioners, and 3. budget constraints that limit access to necessary training. www.sans.org/partnership/