ÌÇÐÄVlog´«Ã½

CfIA

NCPC Partner Training

University of ÌÇÐÄVlog´«Ã½ Center for Information Assurance logo

No-Cost Cybersecurity Training

As a partner of the , the Center for Information Assurance (CfIA) at the University of ÌÇÐÄVlog´«Ã½ develops and delivers cybersecurity training at no cost to participants through DHS-FEMA Continuing Training Grants. Our research-based courses help individuals in states and communities nationwide develop and improve their cybersecurity programs.

How to Register

All web-based courses listed below offer free, self-paced registration through our NCPC partner TEEX. Click the "Register" link on any course to get started. Before registering, please note:

  • FEMA Student Identification (SID) required — You must obtain a FEMA SID before enrolling. Register for free at .
  • State registration requirements — Some states (including Tennessee) require registration through their State Homeland Security Training Office. Visit and click your state for contact information.
  • Questions? — Contact the CfIA for assistance with registration or instructor-led course scheduling.

Active Courses

The following 7 web-based courses are available now at no cost. Click any course to view details and register.

Modality: Web-based | Duration: 6 Hours

This course addresses different forms of authentication, such as two-factor, multi-factor and other authentication protections addressing identity compromise. Designed for public and private personnel at all levels of government, law enforcement, the private sector and other stakeholders, this course provides a broad base of knowledge connecting the underlying concepts of digital identity to how people, devices and systems are authorized to access digital resources and services. The course also covers best practices for using identity management and access control techniques and mechanisms to develop authentication standards.

Modality: Web-based | Duration: 5 Hours

This course focuses primarily on the end-user's perspective, covering various security-related challenges faced by end-users and their impact on data privacy. The course includes content concerning online content providers and local ISPs on access rights, unintentional data sharing, mobile apps and how to be compliant to a NIAP Protection Profile, and more.

Modality: Web-based | Duration: 4 Hours

Today's advanced persistent threats (APTs) are increasingly sophisticated, varied, targeted, aggressive and successful. There is an increasing deployment of and dependence on Internet of Things (IoT) for remote access devices to National Critical Infrastructure Sectors and Services (NCISS). This course addresses the inadequate deployment and maintenance of security on these systems and the opportunities they could provide for attackers to harm American communities through infrastructure and resource disruption.

Modality: Web-based | Duration: 5 Hours

This course is designed to assist individuals in better understanding security and privacy issues associated with mobile devices and infrastructure, including benefits and challenges of designing, implementing, and maintaining Bring Your Own Device (BYOD) Programs. Students will learn about the purpose of Enterprise Mobile Management platforms, elements that make mobile networks and operating systems different, mobile malware classifications and detection strategies, and mobile architecture data leakage detection and prevention strategies.

Modality: Web-based | Duration: 5 Hours

The changing cybersecurity landscape and the Work from Home (WFH) strategies due to the COVID-19 pandemic affected the workforce worldwide. This course addresses vulnerable cyber-attacks in remote home office environments and the cybersecurity threats that impacted WFH workers and organizations, requiring them to use different cyber-enabled systems, devices and services.

Modality: Web-based | Duration: 8 Hours

This course educates members of the public in the general understanding and common defense tactics that can be used to mitigate social engineering attacks. Designed for public and private personnel at all levels of government, law enforcement, the private sector and other stakeholders, this course provides students with an understanding of how social engineering attacks can be better mitigated by combining comprehensive security measures with an understanding of how such attacks exploit human behaviors. Topics include phishing, spear-phishing, water-holing, ransomware and other types of advanced persistent threats.

Modality: Web-based | Duration: 5 Hours

The intent of this course is to increase the learners' understanding of Zero Trust methodology, principles, and implementation. The goal is to prepare organizations to face existing threats and adapt to new threats in the future. This course addresses concepts related to Zero Trust and Identity and Access Management, covering topics including zero trust architecture principles, identity verification and authentication methods, access control policies, and implementation strategies for organizations.

 

Coming Soon

The following courses are currently in development by the CfIA and will be available in the near future.

Code Course Title Hours Status
MGT-362 Community-Level Cybersecurity Planning and Training Gap Analysis 16 Coming Soon
TBD Cybersecurity in Cloud Environments 4 In Development
TBD Cybersecurity Issues in Distributed Energy Resources (DERs) 6 In Development
TBD Cybersecurity Issues in Operational Technology 6 In Development
TBD Security in OT and DER: Tools and Applications 8 In Development

This project was supported by Cooperative Agreement Numbers EMW-2022-CA-00023-S01, EMW-2023-CA-05082, and EMW-2024-CA-05177 administered by DHS/FEMA. Points of view or opinions expressed in this website or documents are those of the author and do not represent the official position or policies of DHS/FEMA.