Course AWR-376

Instructor-Led Training (Live)

Understanding Targeted Cyber Attacks

Length
0 h
ACE
0 h
semester
0 h

About Course

This course provides participants with specific information regarding targeted cyber attacks, including advanced persistent threats. This information will place them in a better position to plan and prepare for, respond to and recover from targeted cyber attacks. Understanding Targeted Cyber Attacks will fill the gap in threat-specific training for cybersecurity as a community-driven course that focuses on the phases of targeted cyber attacks and the attacker methods used during each phase. Participants will also receive valuable information on cyber attack prevention, mitigation and response.

Objectives

Upon successful completion of this course, participants will be able to:

  • Understand basic concepts related to a targeted cyber attack
  • Explain the importance of confidentiality, integrity and availability to cybersecurity
  • Define targeted cyber attacks and advanced persistent threats (APT)
  • Discover how attackers use reconnaissance techniques to gather information on individual and organizations
  • Evaluate personality types and their susceptibility to social engineering techniques
  • Recommend strategies for preventing and mitigating targeted cyber attacks utilized during the reconnaissance phase
  • Explain how targeted cyber attacks progress after the initial breach has occurred
  • Recommend strategies for the preparation for, response to, and recovery from a targeted cyber attack

Target Audience

Emergency management, emergency responders, risk management personnel, planners, critical infrastructure representatives from both private and public sectors, information security and cybersecurity personnel and managers, other personnel responsible for identifying and responding to cyber incidents, and those who are involved in developing organizational strategies.

Register

Requirements

This is a government-sponsored, live course. Areas shown in blue require government approval to register.

Contact the administrative agency of your state, tribe, or territory before registering.

FEMA Courses require a Student ID for registration. Get your FEMA SID here.

Upcoming

Nothing upcoming.

Online

Register online through our partner.

Contact

TEEX NERRTC (Texas A&M)

Email

BCS@teex.tamu.edu

Phone

(979) 431-4837

Website

http://teex.org/program/cybersecurity/

Future

To sign up for a future delivery for this course, join the waitlist by reaching out via the contact information. Click below to send a prefilled email.

Contact

TEEX NERRTC (Texas A&M)

Email

BCS@teex.tamu.edu

Phone

(979) 431-4837

Website

http://teex.org/program/cybersecurity/

congressionally Funded Training Available

Thousands trained nationwide.

Join the NCPC mailing list