What You'll Learn

This course provides an upper-level awareness of cyber threats, vulnerabilities and countermeasures. It explains vulnerabilities of computer systems and networks. Leaders will be introduced to new trends and actions that can be taken to establish a cybersecurity program and build a culture of security.

Introduction to Threats

Cyber threats present a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

Secure Networks

Network design is critically important to prevent and detect intrusions and most importantly to reduce the overall risk to the organization.

The Evolving Threat

With more and more devices being connected to networks and the internet each day it is imperative that we evolve our cyber threat program to match these definitions.

Risk Assessment and Management

Because of the varying threats owned by different organizations it is important to understand what hazards are associated with our organization.

Cyber Incident Respsonse

Incident response is an organized approach used to address and manage a security breach or attack.

Culture of Security

A Culture of Security is the practice of minimizing the risks associated with a threat by collective effort.

UTSA Center for Infrastructure Assurance and Security

UTSA CIAS

Certified Information Systems Security Professional Prep Courses are instructed by researchers from the UTSA Center for Infrastructure Assurance and Security (CIAS), a world's foremost cyber security think tank for multidisciplinary education and development of operational infrastructure security capabilities.

Over the past 15 years, the CIAS has been on the forefront of cyber security training efforts. The CIAS has been called upon by Congress, with support from the Department of Homeland Security and the Department of Defense, to strengthen the nation's cyber security preparedness.

Meet the Instructors

UTSA instructors do not 'teach for the test,' but rely heavily on their industry knowledge to educate participants on real-world techniques that can be applied directly to careers in information security.

Jeff Reich

Jeff is a Senior Information Security Instructor for CIAS and brings over 45 years of security experience with the most recent 38 years focused on information security.

Mr. Reich has developed a history of entering situations where little to no security or risk management infrastructure exists or an existing system needs updating. He has started and led the security and risk management programs at a list of companies that includes Rackspace, Dell, CheckFree, ARCO, and others.

Read Full Bio

Jessica Hazelrigg

Jessica is a Senior Information Security Instructor for CIAS and brings nearly 20 years of cybersecurity and intelligence experience to the organization.

Ms. Hazelrigg also serves as the director of the Platform Threat Defense team for USAA, responsible for boundary defense (web and email security), endpoint security, public cloud security (AWS, GCP, Azure), and PKI services. Ms. Hazelrigg also served as an intelligence analyst in the US Army.

Read Full Bio

Course Topics



Malware is designed to damage or disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. Typical cyber threats and the dangers associated with them will be explained. Counter measures against these threats will also be introduced to assist in implementing the protective measures used to avoid them altogether.

Secure network design requires many layers of defense. Network design is critically important to prevent and detect intrusions and most importantly to reduce the overall risk to the organization. Many different strategies can be implemented in a well-designed network. The purpose of this module is to introduce the defense in depth concept and offer a familiarization on securing the organizational network.

A cyber threat has a constantly changing definition. With more and more devices being connected to networks and the internet each day it is imperative that we evolve our cyber threat program to match these definitions. In this module we will introduce new technologies, trends and services. We will discuss what they are and their vulnerabilities to assist in decision making for your organization.

Risk is defined as the combination of a threat and a probability assigned to that threat. It is important to understand what hazards are associated with our organization and take a proactive approach in mitigating them. This module explores how to manage risk, assigning priorities to them, and effectively managing a program that attempts to eliminate or reduce the risks involved.

This module will discuss strategies for building a robust cyber incident response plan. Overviews include members and roles of our incident response team and how we can limit damage, retain confidence, and reduce recovery time and costs by having a comprehensive incident response plan that takes a proactive approach in preparing for an inevitable incident.

A Culture of Security is the practice of minimizing the risks associated with a threat by collective effort. A comprehensive security program is an ever changing, ongoing, and engaging process in an organization’s security posture. In this module we cover elements of a successful security awareness program, training and exercises needed to design and implement a robust cybersecurity program.

Registration
$799
Registration for this course is currently closed. Please use the sign-up form to receive notification when dates are available. Thank you for your interest.
Sign up to Learn More
Call (210) 458-2411 or sign up to receive more information on this live-online training
* indicates required

Training Discounts

0%

Discount

Registered participants are eligible to receive a 15% discount if they fall within one of these categories:

  • Current UTSA students
  • UTSA staff/faculty
  • Active members of the UTSA Alumni Association
  • Active-Duty Military and their immediate families
  • Veterans and their immediate families

UTSA AP Summer Institute