Bite-Sized Cybersecurity Training for Busy Professionals
The CIAS Microtraining Program delivers short, impactful cybersecurity learning designed to fit any schedule while building real workforce readiness.
Through SkillBytes, KnowledgeBytes, and LeaderBytes, CIAS offers flexible learning experiences tailored to technical practitioners, general audiences, and organizational decision‑makers. Sessions range from 15 minutes to 3 hours, enabling participants to build knowledge and skills at their own pace.
SkillBytes
Short, focused technical trainings for cybersecurity practitioners, covering both offensive and defensive readiness. SkillBytes emphasize hands‑on techniques, tools, and tactics that directly support operational security roles.
KnowledgeBytes
Accessible cybersecurity learning for everyone, regardless of technical background. KnowledgeBytes build foundational understanding of cyber risks, best practices, and shared responsibility, supporting a stronger organizational security culture.
LeaderBytes
Strategic, decision‑focused training for executives, managers, and policymakers. LeaderBytes address governance, risk management, resilience, and informed decision‑making to help leaders guide cybersecurity priorities with confidence.
SkillBytes
~60min Instructor-Led Sessions, focused on a single technical topic.
SkillBytes delivers powerful, one‑hour technical microtrainings designed for today’s busy cybersecurity and IT professionals. Each session zeroes in on a single, high‑impact skill—like Wireshark analysis, Nmap scanning or log interpretation—guided by live, expert instructors. With browser‑based labs and real‑world scenarios, SkillBytes helps teams quickly sharpen their capabilities without disrupting their schedules. It’s practical, affordable and built to strengthen your cyber readiness one skill at a time.
Audience & Class Size
SkillBytes are ideal for developers, analysts, IT professionals, and anyone in a technical role. These virtual SkillBytes support up to 50 participants.
Featured SkillBytes Courses
Our microtrainings cover essential cybersecurity tools and practices. Popular sessions include:
Defense Fundamentals Toolkit
A hands-on Skill Byte series introducing the Defense Fundamentals Toolkit — Wireshark, Nmap, Syslog, Windows Event Viewer, SpiderFoot, Suricata, Windows Defender, and Windows Process Explorer — to build workforce skills in monitoring, detection, system analysis, and endpoint defense.
Objectives:
Learners can perform simple tasks (e.g., capture packets in Wireshark, run a basic Nmap scan, view logs in Event Viewer) and understand what the outputs mean. Specifically, at the end of this tier, learners will have:
1. General IT literacy — Comfortable using a computer, navigating operating systems (Windows/Linux), and basic networking concepts (IP addresses, ports, protocols).
2. Basic security awareness — Familiarity with concepts like malware, phishing, firewalls, and logs is helpful but not mandatory.
No prior cybersecurity tool experience required — Learners don’t need to have used Wireshark, Nmap, Suricata, etc. Before.
Wireshark Essentials
Wireshark Essentials
Learn how to capture, examine and analyze live network traffic using Wireshark.
Port Scanning Essentials
Port Scanning Essentials
An introduction to Nmap, a popular free port scanner. You’ll learn how to use Nmap to scan for open ports/services on network systems and interpret scan results.
Windows Event Logs Essentials
Windows Event Logs Essentials
Gain the skills to access, search and analyze Windows workstation and server event logs.
Syslogs Essentials
Syslog Essentials
Explore Linux syslog for viewing, searching and analyzing log data.
Windows Process Explorer Essentials
Windows Process Explorer Essentials
Learn how to use Process Explorer to identify malware and rogue processes.
Data Leakage Search
Data Leakage Search
An introduction to the data leakage detection tool Digital Shadows. This tool offers comprehensive monitoring of the dark web and other sources for leaked data. You’ll learn how to connect, configure and monitor various digital assets such as domains or social media accounts. They will also learn how to detect and respond to exposed information.
Register for a Class
The CIAS hosts live SkillBytes throughout the year. Revisit this page, follow the CIAS on LinkedIn or subscribe to our enewsletter to learn about future deliveries.
Cost: $45 Per Person
OR
Build a training experience that fits your organization. Select individual courses or bundle multiple CIAS Microtrainings into a customized package designed to meet your workforce needs—delivered exclusively to your team.
Cost: Varies
Expand Your Training!
Technology evolves quickly—don’t fall behind.
Stay ahead with focused, flexible and affordable training.
Contact the CIAS at cias@utsa.edu to secure your spot in an upcoming SkillBytes session.
KnowledgeBytes
KnowledgeBytes focus on general cyber knowledge, awareness and preparedness. These free, recorded video sessions are built for a broad audience, including non-technical staff, students and community members.
Backup, Backup, Backup
Ransomware, system failures, and human error happen—this KnowledgeByte shows how the right backup strategy can mean the difference between disruption and full recovery.
Deepfakes
Deepfakes are no longer science fiction—they’re a growing cybersecurity and fraud risk. This session helps you understand how deepfakes work, why they matter, and how awareness can reduce the risk of manipulation and impersonation.
SIEM Essentials
Ever wondered how organizations detect cyber threats in real time? This KnowledgeByte demystifies SIEM systems and explains how security data is collected and used to spot suspicious activity before it becomes a serious incident.
Bring Your Own Device (BYOD) Security
From smartphones to laptops, personal devices are everywhere—this session explains the hidden risks they introduce and how simple safeguards can protect both users and organizations.
1
KnowledgeBytes is available at no cost. Provide us with your contact information to sign up for access.