Bite-Sized Cybersecurity Training for Busy Professionals
The CIAS Microtraining Program delivers short, impactful cybersecurity learning designed to fit any schedule while building real workforce readiness.
Through SkillBytes, KnowledgeBytes, and LeaderBytes, CIAS offers flexible learning experiences tailored to technical practitioners, general audiences, and organizational decision‑makers. Sessions range from 15 minutes to 3 hours, enabling participants to build knowledge and skills at their own pace.
SkillBytes
Short, focused technical trainings for cybersecurity practitioners, covering both offensive and defensive readiness. SkillBytes emphasize hands‑on techniques, tools, and tactics that directly support operational security roles.
KnowledgeBytes
Accessible cybersecurity learning for everyone, regardless of technical background. KnowledgeBytes build foundational understanding of cyber risks, best practices, and shared responsibility, supporting a stronger organizational security culture.
LeaderBytes
Coming Soon: Strategic, decision‑focused training for executives, managers, and policymakers. LeaderBytes address governance, risk management, resilience, and informed decision‑making to help leaders guide cybersecurity priorities with confidence.
SkillBytes
Each Training Includes:
- Hands-on browser-based labs (no installation
required) - Step-by-step instructions and exercises
- Real-world scenarios for practical application
About
Avg. 60 Minutes, Instructor-Led Session Focused on Single Technical Topic
Designed to
Strengthen technical foundations, boost workplace efficiency, stay current with technology
Audience
Developers, Analysts, IT Professionals, Anyone in a Technical Role
Class Size
Max. 50 Participants
Featured SkillBytes Courses
Our microtrainings cover essential cybersecurity tools and practices. Popular sessions include:
Essentials Tool Series
A hands-on Skill Byte series introducing the Defense Fundamentals Toolkit — Wireshark, Nmap, Syslog, Windows Event Viewer, SpiderFoot, Suricata, Windows Defender, and Windows Process Explorer — to build workforce skills in monitoring, detection, system analysis, and endpoint defense.
Objectives:
Learners can perform simple tasks (e.g., capture packets in Wireshark, run a basic Nmap scan, view logs in Event Viewer) and understand what the outputs mean. Specifically, at the end of this tier, learners will have:
General IT literacy — Comfortable using a computer, navigating operating systems (Windows/Linux), and basic networking concepts (IP addresses, ports, protocols).
Basic security awareness — Familiarity with concepts like malware, phishing, firewalls, and logs is helpful but not mandatory.
No prior cybersecurity tool experience required — Learners don’t need to have used Wireshark, Nmap, Suricata, etc. Before.
- Wireshark Essentials
Learn how to capture, examine and analyze live network traffic using Wireshark. - Port Scanning Essentials
Master Nmap to identify open ports, services and interpret scan results effectively. - Windows Event Logs Essentials
Gain the skills to access, search and analyze Windows workstation and server event logs.
- Syslog Essentials
Explore Linux syslog for viewing, searching and analyzing log data. - Windows Process Explorer Essentials
Learn how to use Process Explorer to identify malware and rogue processes.
A
Register for a Class
The CIAS hosts live TrainingBytes throughout the year. Revisit this page, follow the CIAS on LinkedIn or subscribe to our enewsletter to learn about future deliveries.
Cost: $45 Per Person
B
Build a training experience that fits your organization. Select individual courses or bundle multiple CIAS Microtrainings into a customized package designed to meet your workforce needs—delivered exclusively to your team.
Cost: Varies
Expand Your Training!
Technology evolves quickly—don’t fall behind.
Stay ahead with focused, flexible and affordable training.
Contact the CIAS at cias@utsa.edu to secure your spot in an upcoming TrainingBytes session.
KnowledgeBytes
KnowledgeBytes will focus on general cyber knowledge, awareness and preparedness. These sessions are built for a broad audience, including non-technical staff, students and community members.
Backup, Backup, Backup
Ransomware, system failures, and human error happen—this KnowledgeByte shows how the right backup strategy can mean the difference between disruption and full recovery.
Bring Your Own Device (BYOD) Security
From smartphones to laptops, personal devices are everywhere—this session explains the hidden risks they introduce and how simple safeguards can protect both users and organizations.
SIEM Essentials
Ever wondered how organizations detect cyber threats in real time? This KnowledgeByte demystifies SIEM systems and explains how security data is collected and used to spot suspicious activity before it becomes a serious incident.
Deepfakes
Deepfakes are no longer science fiction—they’re a growing cybersecurity and fraud risk. This session helps you understand how deepfakes work, why they matter, and how awareness can reduce the risk of manipulation and impersonation.
1
KnowledgeBytes is available at no cost. Provide us with your contact information to sign up for access.