Search
Close this search box.

As a partner of the National Cybersecurity Preparedness Consortium (NCPC), which develops and delivers cybersecurity training at no cost to participants through DHS-FEMA Continuing Training Grants, the CIAS has developed research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs.

To help prepare for and respond to cybersecurity risks at the state, local, tribe and territorial levels, the CIAS courses below have been developed around the Community Cyber Security Maturity Model (CCSMM) to emphasize cybersecurity as being the responsibility of the “whole community”. This is based on the idea that collaborating to provide real solutions during a cybersecurity incident is better and more effective than individual training concepts.

As a partner of the National Cybersecurity Preparedness Consortium (NCPC), which develops and delivers cybersecurity training at no cost to participants through DHS-FEMA Continuing Training Grants, the CIAS has developed research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs.

To help prepare for and respond to cybersecurity risks at the state, local, tribe and territorial levels, the CIAS courses below have been developed around the Community Cyber Security Maturity Model (CCSMM) to emphasize cybersecurity as being the responsibility of the “whole community”. This is based on the idea that collaborating to provide real solutions during a cybersecurity incident is better and more effective than individual training concepts.

Participants trained by the CIAS at no cost
0

September 2023

How to Register for a Cybersecurity Course

To register for instructor-led courses, email us at cias@utsa.edu. For web-based registrations, you will be redirected to one of our NCPC partner’s websites to complete registration.

16 Hours. Instructor-Led

The Cyber Threat Intelligence course will enable participants to perform basic tasks associated with an entry-level cyber threat analyst. At the end of the course the participants will be able to:

  1. Articulate the fundamental characteristics of cyber threat intelligence.
  2. Recognize the importance of the direction stage and how it guides cyber threat intelligence activities.
  3. Examine systems and information system data to identify cybersecurity threats and risks.
  4. Evaluate cyber threat information using one or more cyber threat analysis models.
  5. Compose a cyber threat intelligence report.
  6. Analyze and adjust priorities based on feedback from the customer.

Additionally, this course leverages a first-of-its-kind lab environment for an NCPC course. Students will be able to access the virtual-private cloud training environment from their own computers through almost any browser. Students only need their own computer and an internet connection to access the lab, activities and exercises.

Target Audience

This course was developed for government, private sector, and critical infrastructure technical, or security personnel or managers interested in expanding their cyber threat intelligence abilities. In addition, this source is designed for federal, state, local, regional, tribal, territorial, and private organizations. 

Prerequisites

This course is a hands-on, performance-based course for entry-level cyber threat analysts. Previous experience with cybersecurity in an IT support, IT administration, Network administration, or IT Security management role is recommended.

4 Hours; .4 CEUs; Instructor-Led.

This discussion-based, non-technical course is an introduction to cybersecurity that provides individuals, community leaders and first responders with information on how cyber-attacks can impact, prevent and/or stop operations and emergency responses in a community. The Essentials of Community Cybersecurity course provides a cursory introduction to cybersecurity vulnerabilities, risks, threats and countermeasures and introduces actions communities can take to establish a cybersecurity program. It introduces the Community Cybersecurity Maturity Model (CCSMM) as a framework for understanding community cybersecurity and offers a brief introduction to low or no-cost approaches to securing a community against cybersecurity threats and attacks; setting the stage for further efforts in which a community can build a cybersecurity program.

Course Objectives

  • Identify reasons why communities are vulnerable to cyber attack
  • Differentiate between the levels of cybersecurity threats
  • Recognize that terrorists are capable of using, and planning to use, computers to attack American communities and citizens
  • Describe how everyone is affected by and has a role in cybersecurity efforts
  • List ways cyberattacks can affect the physical world
  • Recognize the purpose of the Community Cyber Security Maturity Model
  • State one technique for enhancing security awareness among community leaders
  • Give one example of how a community can share cybersecurity-related information
  • Identify at least two kinds of exercises
  • Recognize that cybersecurity exercises are as important as other exercises to protect their organization, community, state and nation

2 Hours. Web-based.

Click Here to Register

Using the Community Cyber Security Maturity Model to develop a cybersecurity program will enable community leaders, network/security personnel and those individuals involved in developing or maintaining plans used for and throughout the community. This course will assist participants to understand what is required to develop a coordinated, sustained, and viable community cybersecurity program. The course will introduce participants at all levels to the DHS-supported Community Cyber Security Maturity Model (CCSMM) and can be used to guide communities and states in developing their own CCSMM-consistent cybersecurity programs. Participants will be introduced to different resources that can be used for a community program.

Course Objectives

  • Explain why the Community Cyber Security Maturity Model (CCSMM) was developed and summarize the purpose of the model

  • Learn how to use the CCSMM to develop a cybersecurity program in their community

  • Be able to explain how metrics, technology, training, processes and procedures, and finally assessment fit into the overall process of improving community cybersecurity at all levels

  • Gain a clearer understanding of additional DHS, NIST and other resources and be able to recall government, regulatory and industry standard resources to be used for community cybersecurity efforts

2 Hours. Web-based.

Click Here to Register

This course is designed to introduce the basics of the cybersecurity information sharing processes. Participants will have an increased knowledge of cybersecurity information sharing and an understanding of the steps taken to join or establish an Information Sharing and Analysis Organization (ISAO) or Information Sharing and Analysis Center (ISAC).

Course Objectives

  • The importance of Cybersecurity Information Sharing

  • Information sharing organizations and what they do

  • Steps for cyber-security information sharing and analysis

8 Hours; .8 CEUs; Web-based.

Click Here to Register

This course assists communities of interest to establish an Information Sharing and Analysis Organization (ISAO). The course will introduce the value proposition of creating an ISAO and provide considerations to joining an existing ISAO. The course will closely follow the guidance provided by the ISAO Standards Organization (ISAO SO), whose mission is to "improve the nation's cybersecurity posture by identifying standards and guidelines for robust and effective information sharing and analysis related to cybersecurity risks, incidents, and best practices".

16 Hours. Instructor-led.

This course introduces fundamental cyber information sharing concepts that can be incorporated into a cybersecurity program for both inside and outside an agency or organization. It introduces the purpose and value of information sharing and how sharing can assist with cyber incident preparedness and response before, during and after a cyber incident occurs. It will identify types of shared cyber information; explore when to share information; and will explore attributes found when reporting cyber information.

Instructor-Led. 8 Hours.

This course is designed as a tabletop activity simulating a community-wide cybersecurity event. Using a gamification approach, participants will strategize with a diverse group of stakeholders to plan for and respond from a cybersecurity incident that could have cascading effects across a community.

Specifically, this training will encourage participants to discuss budgeting and planning strategies; coordinate with other community stakeholders to respond to a cyber incident; and will inform participants of various recovery aspects that may be included in a cybersecurity program.

Instructor-Led. 16 Hours.

This course will introduce foundational cybersecurity information sharing concepts that can be leveraged to build a community information sharing collaborative. It will establish the purpose and value of community information sharing; and will explore how sharing can assist communities with cyber incident preparedness and response before, during and after a cyber incident occurs.

Course content will assist participants to recognize common types of shared cyber information; understand when to share cyber information with trusted entities and partners; and will explore how to build trusted community cybersecurity partnerships and collaborations. At the end of this course, participants will be able to identify activities needed to establish a community cybersecurity information sharing collaborative.

This will include governance; creating public and private partnerships; services and capabilities; and coordinating efforts to prevent, mitigate, and counter attacks for a community.

Objectives
  • Explain how cybersecurity information sharing can assist to prevent, detect, respond and recover from cyber-attacks
  • Analyze partnerships and trust needed for an effective information sharing capability
  • Recognize the components of a successful community cybersecurity information sharing collaboration
  • Examine the steps to integrate cybersecurity information sharing into a community cybersecurity collaboration
Target Audience

Government, private sector and critical infrastructure decision makers, mid-level management, policymakers, administrators, information security and cybersecurity personnel and individuals with interest and influence to recommend or build a community cybersecurity information sharing collaborative.

 

Since the courses above have been developed though DHS/FEMA, you may need to register with your State’s Homeland Security Training Office to attend and/or participate. To register, visit FirstResponderTraining.gov. Click on your state for contact information. States that need to register through their office include: AK, AZ, CA, CO, CT, FL, GA, HI, IA, ID, IN, KY, KS, LA, MA, MD, MI, MN, MO, MS, NC, ND, NE, NH, NJ, NM, NV, NY, OH, OK, OR, PA, PR, RI, SC, SD, TN, UT, VA, VI, VT, WA, WI, WV, WY. All other states may contact us directly to register for the courses listed above.

NOTE: Students participating in FEMA-provided training, such as the courses listed here, are required to provide their FEMA Student Identification (SID) number. To obtain a SID, register online at cdp.dhs.gov/femasid. There is no cost to register.