• Skip to main content

TEEX Workforce Development

TEEX Workforce Development

  • COAST Home
  • Courses
    • Cybersecurity
    • Heavy Equipment
    • Maintenance and Troubleshooting
    • Occupational Health and Safety
    • Online Courses
    • Process Improvement
    • Professional Skills
    • Student and Educator Training
  • News
  • Contact Us

Cybersecurity

Online training helps to reduce travel and maximize your organization’s training resources. Each course utilizes innovative training techniques to improve participants’ retention and increase their overall learning experience.

For more information, please fill out the “Contact Us” form or send an email to [email protected].

Course Instructions

Thank you for your interest. Many of these cybersecurity courses are online and you are able to complete them at your own pace. In addition to earning certificates, by completing several of these courses together, you can also earn college credit. 

For more information, please send an email to [email protected].

More Course Options

  • Occupational Health and Safety
  • Process Improvement
  • Cybersecurity
  • Heavy Equipment
  • Maintenance and Troubleshooting

Courses

AWR138-Network Assurance

Online Course

Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation. This course also includes information on securing cloud-based networks and applications.

Notify Me
Sign Up for Course AWR138

AWR139-Digital Forensics Basics

Online Course

This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.

Notify Me
Sign Up for Course AWR139

AWR168-Foundations of Cyber Crimes

Online Course

Foundations of Cyber Crimes highlights a range of cybercrimes and the appropriate response by first responders and other local, state, and federal agencies that may encounter them. Participants will identify legislative, organizational, and suggested personal efforts to control or prevent cybercrimes. This course examines cyber and cyber facilitated non-violent white-collar crimes, fraud and financial crimes, and violent crimes. The broad landscape of the cybercrimes discussed in this course illustrates the fact that almost all crimes can either be directly committed or indirectly facilitated through the cyber domain-a result of society’s increasing integration and dependence on the Internet and computers into nearly every aspect of daily life.

Notify Me
Sign Up for Course AWR168

AWR169-Introduction to Cyber Incident Management

Online Course

Introduction to Cyber Incident Management provides practical guidelines on responding to incidents effectively and efficiently as part of an incident response program. Primary topics include detecting, analyzing, prioritizing, and handling cyber incidents. Participants will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.

Notify Me
Sign Up for Course AWR169

AWR173-Information Security Basics

Online Course

Information Security Basics is designed to teach entry and mid-level IT workers the technological fundamentals of information security. The goal of this course is to provide students with some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to introducing information assurance, students will also learn general concepts, an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.

Notify Me
Sign Up for Course AWR173

AWR174-Cyber Ethics

Online Course

This course covers standards and best practices for ethical computing. This course offers a wide array of situations that are applicable to the real world. Students will learn about privacy, intellectual property, professional practices, freedom of speech, and ethical hacking.

Notify Me
Sign Up for Course AWR174

AWR176-Disaster Recovery for Information Systems

Online Course

Disaster Recovery for Information Systems is designed to teach business managers principles and practices of disaster recovery planning including overview of business continuity and disaster recovery planning, planning process and strategies, implementation and management of a disaster recovery plan, work around procedures, technical vulnerabilities faced by organizations, and legal issues that may confront an organization.

Notify Me
Sign Up for Course AWR176

AWR177-Information Risk Management

Online Course

This is an intermediate-level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training in information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies and compliance) for better understanding of potential threats and vulnerabilities in business online and learning to adopt levels of security measures and best practices.

Notify Me
Sign Up for Course AWR177

AWR178-Secure Software

Online Course

This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.

Notify Me
Sign Up for Course AWR178

AWR395-Cybersecurity in the Workplace

Online Course

The use of computers and networked systems in the workplace has opened businesses and organizations to a variety of risks. Every employee using a computer connected to the organization’s network is a potential point of entry for a cyber attack. For this reason, cybersecurity and protecting the organization’s data/information is every employee’s responsibility. This course will help students understand the different types of cyber attacks their company may face, the type of information that is at risk, how to recognize cyber attacks, and why it is important for everyone in the organization to participate in cybersecurity.

This course is certified by Texas Department of Information Resources to meet the requirements of HB1118.

Notify Me
Sign Up for Course AWR395

AWR396-Network Security for Homes and Small Businesses

Online Course

The Internet (the world’s largest network) allows us to accomplish tasks more conveniently and efficiently at home, work and on the road! However, there are security risks with networks, and users must be aware and remain vigilant about these risks and how to secure their home or small business network. This course will introduce students to the basics of networks for homes and small businesses and provide them with best practices to secure their networks to protect their personal information as well as other (friends, family, customers, vendors, etc.) information that may flow through their network.

This course is certified by Texas Department of Information Resources to meet the requirements of HB1118.

Notify Me
Sign Up for Course AWR396

AWR397-Cybersecurity for Everyone

Online Course

The purpose of this course is to provide students with a general understanding of cybersecurity risk and best practices for protecting themselves and their devices from cyber attacks. This course will introduce you to the basics of protecting your computer and the data it stores as well as protecting yourself when you are online, on social media, and while using your mobile or smart devices.

Notify Me
Sign Up for Course AWR397

AWR399-Detecting and Responding to a Cyber Attack

Online Course

As computers and mobile devices become a part of most people’s everyday lives, the challenges of protecting computers and mobile devices and the data on them increases. Part of protecting computers and mobile devices is understanding how to recognize when they are compromised, the steps to take to respond to compromised computers and devices, and how to recover once they have been rid of any infection. This course will introduce students to various types of cyber attacks and how to detect and respond to them to protect their data and information.

Notify Me
Sign Up for Course AWR399

AWR402-Introduction to Internet of Things

Online Course

The purpose of this course is to provide an understanding of the history, definitions, and components that make up the Internet of Things (IoT). This course addresses the different applications of IoT as well as applicable laws and policies, technologies, emerging threats, best practices, security, and a variety of existing and developing technologies.

Notify Me
Sign Up for Course AWR402

AWR383-Cybersecurity Risk Awareness for Officials and Senior Management

This is a non-technical course meant to develop awareness of cybersecurity risks so that elected officials, appointed officials, and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and senior management work more effectively with their Information Technology (IT) departments to mitigate cyber threats. The training is tailored to government, critical infrastructure, and private sector personnel who have the responsibility for directing and developing policy within their organization.

Notify Me

AWR421-Demystifying Cyber Attacks

Through discussion, pre-recorded attacks, and live example attacks, Demystifying Cyber Attacks will explain and demonstrate common cyber attacks for non-technical participants. Participants will also learn how common cyber attacks can be disrupted at various points of the cyber kill chain using mitigation and response strategies.

Notify Me

MGT303 — Cybersecurity Vulnerability Assessment

The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities include examining, analyzing, and prioritizing assets, risks, and vulnerabilities to develop a vulnerability assessment report that could be delivered to organizational leadership. This course utilizes active discussions and activities to extend the participant’s understanding of vulnerability assessments.

Notify Me

PER398-Cybersecurity Resiliency in Industrial Control Systems

The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. This course is designed for state, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS.

Notify Me

 

  • Compact with Texans
  • Open Records Policy
  • Policies and Required Links
  • Privacy Policy
  • Risk, Fraud, and Misconduct Hotline
  • Subscribe
  • Texas A&M University System
  • Texas Homeland Security
  • Texas Veteran’s Portal
  • Texas.gov

Copyright © 2025 · Texas A&M Engineering Extension Service · All Rights Reserved