Collegiate cyber defense competition where teams of 8 defend real-world networks
World's largest cyber defense competition cofounded with the Air Force to inspire students towards STEM careers
Individual or team network assessment and network defense competition where competitors vie for control of resources
Collegiate cyber defense competition where teams compete by securing provided virtual machines
Low- and no-cost professional training solutions through certification prep courses and cybersecurity awareness training.
Research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs
We customize training, host workshops, and conduct community-wide exercises to suit your organization’s individual needs
As a partner of the National Cybersecurity Preparedness Consortium (NCPC), which develops and delivers cybersecurity training at no cost to participants through DHS-FEMA Continuing Training Grants, the CIAS has developed research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs.
To help prepare for and respond to cybersecurity risks at the state, local, tribe and territorial levels, the CIAS courses below have been developed around the Community Cyber Security Maturity Model (CCSMM) to emphasize cybersecurity as being the responsibility of the “whole community”. This is based on the idea that collaborating to provide real solutions during a cybersecurity incident is better and more effective than individual training concepts.
To register for instructor-led courses, email us at email@example.com. For web-based registrations, you will be redirected to one of our NCPC partner’s websites to complete registration.
16 Hours. Instructor-Led
If interested in taking this course, please email the CIAS for details on upcoming opportunities. Space is limited. Email firstname.lastname@example.org or register below.
The Cyber Threat Intelligence course will enable participants to perform basic tasks associated with an entry-level cyber threat analyst. At the end of the course the participants will be able to:
Additionally, this course leverages a first-of-its-kind lab environment for an NCPC course. Students will be able to access the virtual-private cloud training environment from their own computers through almost any browser. Students only need their own computer and an internet connection to access the lab, activities and exercises.
This course was developed for government, private sector, and critical infrastructure technical, or security personnel or managers interested in expanding their cyber threat intelligence abilities. In addition, this source is designed for federal, state, local, regional, tribal, territorial, and private organizations.
This course is a hands-on, performance-based course for entry-level cyber threat analysts. Previous experience with cybersecurity in an IT support, IT administration, Network administration, or IT Security management role is recommended.
4 Hours; .4 CEUs; Instructor-Led.
This discussion-based, non-technical course is an introduction to cybersecurity that provides individuals, community leaders and first responders with information on how cyber-attacks can impact, prevent and/or stop operations and emergency responses in a community. The Essentials of Community Cybersecurity course provides a cursory introduction to cybersecurity vulnerabilities, risks, threats and countermeasures and introduces actions communities can take to establish a cybersecurity program. It introduces the Community Cybersecurity Maturity Model (CCSMM) as a framework for understanding community cybersecurity and offers a brief introduction to low or no-cost approaches to securing a community against cybersecurity threats and attacks; setting the stage for further efforts in which a community can build a cybersecurity program.
2 Hours. Web-based.
Click Here to Register
Using the Community Cyber Security Maturity Model to develop a cybersecurity program will enable community leaders, network/security personnel and those individuals involved in developing or maintaining plans used for and throughout the community. This course will assist participants to understand what is required to develop a coordinated, sustained, and viable community cybersecurity program. The course will introduce participants at all levels to the DHS-supported Community Cyber Security Maturity Model (CCSMM) and can be used to guide communities and states in developing their own CCSMM-consistent cybersecurity programs. Participants will be introduced to different resources that can be used for a community program.
Explain why the Community Cyber Security Maturity Model (CCSMM) was developed and summarize the purpose of the model
Learn how to use the CCSMM to develop a cybersecurity program in their community
Be able to explain how metrics, technology, training, processes and procedures, and finally assessment fit into the overall process of improving community cybersecurity at all levels
Gain a clearer understanding of additional DHS, NIST and other resources and be able to recall government, regulatory and industry standard resources to be used for community cybersecurity efforts
This course is designed to introduce the basics of the cybersecurity information sharing processes. Participants will have an increased knowledge of cybersecurity information sharing and an understanding of the steps taken to join or establish an Information Sharing and Analysis Organization (ISAO) or Information Sharing and Analysis Center (ISAC).
The importance of Cybersecurity Information Sharing
Information sharing organizations and what they do
Steps for cyber-security information sharing and analysis
8 Hours; .8 CEUs; Web-based.
This course assists communities of interest to establish an Information Sharing and Analysis Organization (ISAO). The course will introduce the value proposition of creating an ISAO and provide considerations to joining an existing ISAO. The course will closely follow the guidance provided by the ISAO Standards Organization (ISAO SO), whose mission is to "improve the nation's cybersecurity posture by identifying standards and guidelines for robust and effective information sharing and analysis related to cybersecurity risks, incidents, and best practices".
16 Hours. Instructor-based.
This course introduces fundamental cyber information sharing concepts that can be incorporated into a cybersecurity program for both inside and outside an agency or organization. It introduces the purpose and value of information sharing and how sharing can assist with cyber incident preparedness and response before, during and after a cyber incident occurs. It will identify types of shared cyber information; explore when to share information; and will explore attributes found when reporting cyber information.
Since the courses above have been developed though DHS/FEMA, you may need to register with your State’s Homeland Security Training Office to attend and/or participate. To register, visit FirstResponderTraining.gov. Click on your state for contact information. States that need to register through their office include: AK, AZ, CA, CO, CT, FL, GA, HI, IA, ID, IN, KY, KS, LA, MA, MD, MI, MN, MO, MS, NC, ND, NE, NH, NJ, NM, NV, NY, OH, OK, OR, PA, PR, RI, SC, SD, TN, UT, VA, VI, VT, WA, WI, WV, WY. All other states may contact us directly to register for the courses listed above.
NOTE: Students participating in FEMA-provided training, such as the courses listed here, are required to provide their FEMA Student Identification (SID) number. To obtain a SID, register online at cdp.dhs.gov/femasid. There is no cost to register.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.