Thank you for your interest. Many of these cybersecurity courses are online and you are able to complete them at your own pace. In addition to earning certificates, by completing several of these courses together, you can also earn college credit. For more information, please send an e-mail toTRAIN@tamu.edu or call us at 956-524-5984.
CompTIA Network+ Certification Preparation
CompTIA Network+ exam covers IT infrastructure, including troubleshooting, configuring, managing, and securing networks. This foundation will help you move into cybersecurity certifications like CompTIA Security+. Successful completion of the course will also earn you 2 Continuing Education Units (CEUs) from the Texas A&M Cybersecurity Center.
CompTIA Security+ Certification Preparation
CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required in any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US Department of Defense to meet directive 8140/8570.01-M requirements. Successful completion of the course will also earn you 3 Continuing Education Units (CEUs) from the Texas A&M Cybersecurity Center.
This course is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some of the more pressing concerns related to internet usage today.
AWR169-Cyber Incident Analysis and Response
This 10-hour course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection and network/resources repair. Trainees will be presented with real-world examples and scenarios to help provide knowledge, understanding and capacity for effective cyber incident analysis and response.
AWR383-Cybersecurity Awareness for Officials and Senior Management
This is a non-technical course meant to develop an awareness of cybersecurity risks so that elected officials, appointed officials and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and senior management work more effectively with their Information Technology departments to mitigate cyber threats.
CYB201-Cybersecurity for Business Executives
This classroom-based course provides awareness-level training specifically to the owners, C-suite executives and upper management of private sector businesses. The course will provide information on the cybersecurity threats, regulations and impacts a business is exposed to in today’s interconnected operations.
AWR397-Cybersecurity for Everyone
This two-hour course teaches that by using technology, which makes our lives easier, we have opened ourselves up to the risks of cyberattacks. This course will introduce you to the basics of protecting your computer and the data it stores, as well as protecting yourself when you are online and while using your mobile or smart devices.
OGT627-Cybersecurity Resiliency in Industrial Control Systems
The purpose of this 8-hour course is to provide an understanding of cybersecurity resiliency and industrial control systems (ICS). The course will review the Internet of Things, vulnerabilities to cyber attack within ICSs, methods of detecting and responding to cyber attacks in the ICS, and tips and tools to mitigate these attacks.
CYB802-Cybersecurity Risk Management for Business
This course discusses how to manage cybersecurity risk. While most businesses apply risk management strategies to aspects of their financial and operational activities, many have not fully considered the risks of a cyber incident.
AWR399-Detecting and Responding to a Cyber Attack
This four hour course will introduce students to various types of cyberattacks and how to detect and respond to them in order to protect their data and information. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection.
AWR139-Digital Forensics Basics
This seven-hour course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. The course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
AWR176-Disaster Recovery for Information Systems
This course will train business managers to respond to varying threats that might impact their organization’s access to information. This 10-hour course provides requisite background theory and recommended best practices needed by managers to keep their offices running during different types of incidents. Topics include an overview of business continuity planning, disaster recovery planning, guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations and an examination of legal issues that may confront an organization.
AWR168-Foundations of Cyber Crimes
This 10-hour intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn legislations and organizational efforts to control or prevent such crimes. This course covers intellectual property law, personal jurisdiction, electronic commerce and software contracts, telecommunications, antitrust, privacy, the right to accuracy of information, the right to access information and the First Amendment.
AWR177-Information Risk Management
This 13-hour intermediate course covers topics on information assets, identifying risks and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
AWR173-Information Security Basics
This course is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this 13-hour course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to providing an introduction to information assurance, trainees will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security and basic cryptography.
AWR175-Information Security for Everyone
This 10-hour course is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks and safe internet usage.
CYB801 — Introduction to Vulnerability Assessment
This course examines the basics of utilizing paid and open-source vulnerability assessment tools, interpreting results, and presenting significant findings to non-technical management. A key component for developing good cybersecurity hygiene within an organization is an effective vulnerability assessment program.
This course covers the secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics in this five-hour course include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization and accounting), server and client security, and secure policy generation.
This nine-hour course covers the secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies.
AWR376-Understanding Targeted Cyber Attacks
This course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to, and recover from targeted cyber attacks.