The Cybersecurity Essentials Certificate Program will enrich your knowledge of cybersecurity and provide you with strategies to assist in protecting your organization’s network and data as well as your personal information. You will gain an understanding of why cybersecurity matters, your role as an end user in cybersecurity, various cyber attacks, and strategies to protect yourself and your organization from being a victim of a cyber attack.
This certificate is targeted towards state, local, tribal, and territorial government employees, private sector employees, and students that use computers and/or mobile devices as part of their job or education.
Once all five (5) courses have been completed, participants should complete the Cybersecurity Essentials Certificate Application opens in a new tab and email the completed form to bcs@teex.tamu.edu.
Certificates will be printed and mailed to the physical mailing address on your application.
Note: All courses must be taken within three (3) years of the date of the application.
AWR397 Cybersecurity for Everyone (Online) opens in a new tab
AWR395 Cybersecurity in the Workplace (Online) opens in a new tab
AWR136 Developing Cybersecurity Resiliency for Everyone (Instructor-Led) opens in a new tab
AWR376 Understanding Targeted Cyber Attacks (Instructor-Led) opens in a new tab
MGT452 Physical and Cybersecurity for Critical Infrastructure (Instructor-Led)
Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. This course also includes information on securing cloud-based networks and applications.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
There are no prerequisites for this course.
You must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid.
Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.
Participants are required to complete all course content and score a 70% or better on the Post-Test in order to receive a course certificate of completion.
This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
There are no prerequisites for this course.
Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.
Participants are required to complete all course content and score a 70% or better on the Post-Test in order to receive a course certificate of completion.
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or bcs@teex.tamu.edu to get the latest schedule.
There are no prerequisites for this course.
Enrollment Requirements
You must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid.
Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.
Participants are required to complete all course content and score a 70% or better on the Post-Test in order to receive a course certificate of completion.
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Apply best practices for securing a network for their home or small business
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or bcs@teex.tamu.edu to get the latest schedule.
The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the organization’s data/information is every employee’s responsibility. This course will help students understand the different types of cyber attacks their company may face, the type of information that is at risk, how to recognize cyber attacks, and why it is important for everyone in the organization to participate in cybersecurity.
As part of a Department of Homeland Security/Federal
Emergency Management Agency (DHS/FEMA) cooperative agreement training program,
this course is available at no direct cost to state, county, and local
government agencies.
There are no prerequisites for this course.
Enrollment Requirements
You must be a United States citizen to register for this class. If you are not a United States citizen, please contact TEEX at bcs@teex.tamu.edu or call (979) 431-4837 for more information on the approval process. Participants must have a FEMA Participant Identification Number (SID) to register for this class. To obtain a SID, register online at cdp.dhs.gov/femasid.
Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.
Participants are required to complete all course content and score a 70% or better on the Post-Test in order to receive a course certificate of completion.
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Explain their role in cybersecurity.
Explain various cyber attacks that may impact their them and their organizations.
Implement cybersecurity practices to protect themselves and their organization.
This course is intended for any employee that uses a computer or networked device in the workplace.
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or bcs@teex.tamu.edu to get the latest schedule.
Introduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
There are no prerequisites for this course.
Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.
Participants are required to complete all course content and score a 70% or better on the Post-Test in order to receive a course certificate of completion.
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Explain the concepts of cyber incident management.
Explain the preparation phase of cybersecurity incident management.
Explain the detection and analysis phase of cybersecurity incident management.
Explain cyber incident containment, eradication and recovery.
Explain the post incident activities of cybersecurity incident management.
Relate the cyber incident management process to common cyber incidents.
This course is for IT professionals responsible for identifying and responding to cyber events, including local government, private industry, and critical infrastructure representatives.
There are no prerequisites for this course.
Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.
Participants are required to complete all course content and score a 70% or better on the Post-Test in order to receive a course certificate of completion.
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Broadband connection recommended.
Explain the goals of the information security professional and attackers to include the four basic types of attacks most likely to be encountered.
Explain Confidentiality, Integrity, and access controls as they apply to the Biba Integrity and Bell-LaPuda Confidentiality Models.
Explain the use of a layered architecture model to design and secure a TCP/IP Network.
Identify the common techniques of offensive attacks as well as defensive tactics and appliances available to include wireless vulnerabilities.
Explain the vulnerabilities of current operating systems and the solutions to guard against common exploits.
Implement secure browsing, email and instant messaging practices.
This course is designed for participants with some knowledge related to information technology seeking to learn about information security/cybersecurity.
There are no prerequisites for this course.
Participants must provide information for all required fields, including their U.S. citizenship/permanent resident information, in addition to meeting all other attendance and course completion requirements. If this information is not provided, the participant will be considered incomplete and will not receive a certificate of completion.
Participants are required to complete all course content and score a 70% or better on the Post-Test in order to receive a course certificate of completion.
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Evaluate key concepts related to cyber ethics and ethical practices.
Explain the ethics of personal privacy.
Evaluate the ethical use of electronic information.?
Analyze key concepts related to professional ethics.
Discuss free speech online from a legal and ethical perspective.?
Differentiate between various types of cyber criminals and hackers.?
This course is intended for all computer users.