The CIAS-ISAO recognizes that every organization’s needs are different. The CIAS-ISAO has identified cybersecurity topic areas that can be utilized to develop customized training to suit your individual needs. These topics can be designed to create a training course for your users, management or technical staff.
We will work closely with you to identify the needs of your organization to develop customized and impactful training.
Customized training programs can include, but are not limited to:
Information Assurance (IA) refers to the steps involved in protecting information systems, like computer systems and networks. There are commonly five terms associated with the definition of information assurance (Integrity, Availability, Authentication, Confidentiality and Nonrepudiation). This course highlights information assurance concepts and will categorize cyber threats to build context on how the threats can be addressed.
Information Assurance (IA) refers to the steps involved in protecting information systems, like computer systems and networks. There are commonly five terms associated with the definition of information assurance (Integrity, Availability, Authentication, Confidentiality and Nonrepudiation). This course will highlight information assurance concepts and will categorize cyber threats to build context on how the threats can be addressed. Computer systems have evolved immensely in the past few decades, from supercomputers and mini-computers to powerful desktop computers. This course provides an overview of how computers work, how they communicate with each other and how our use of computer resources has evolved from physical networks to investing in cloud services.
Primary Audience: Executive Leadership. Length: 2-Days
Secure network design requires many layers of defense. Network design is critically important to prevent and detect intrusions and most importantly to reduce the overall risk to the organization. Many different strategies can be implemented in a well-designed network. The purpose of this course is to introduce the defense in depth concept and offer a familiarization on the basics of securing the organizational network.
Network security is a term that describes the many policies and procedures that are implemented to track unauthorized access, modification, exploitation or not being able to access the network or network resources. There are a wide variety of devices that can be utilized on a network to minimize potential threats. In this course, we will highlight commonly used devices used to secure the organization’s network.
Cyber threats present a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. There are many cyber threats that should be understood. As an example, one threat discussed in this module is malicious software or malware. Malware is designed to damage or disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. Typical cyber threats and the dangers associated with them will be explained. Counter measures against these threats will also be introduced to assist in implementing the protective measures used to avoid them altogether.
Primary Audience: Executive Leadership. Length: 2-Days
With the evolution of computers now including ones that can be held in our pockets, it is important to understand the security ramifications of these devices. This course discusses the different types of mobile devices, some of the benefits and weaknesses of each, and some options used to secure these devices.
Incident response is an organized approach used to address and manage a security breach or attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. A cyber incident response plan is imperative to mitigate the consequences of a security breach. In this module we discuss the members and roles of our incident response team and how we can limit damage, retain confidence and reduce recovery time and costs by having a comprehensive incident response plan that takes a proactive approach in preparing for an inevitable incident.
Primary Audience: Executive Leadership. Length: 2-Days
Risk is defined as the combination of a threat and a probability assigned to that threat. Because of the varying threats owned by different organizations it is important to understand what hazards are associated with our organization and take a proactive approach in mitigating them. This course explores how to manage risk by exploring these threats and vulnerabilities, assigning priorities to them, and effectively managing a program that attempts to eliminate or reduce the risks involved. Primary Audience:
Executive Leadership. Length: 2-Days
A culture of security is the practice of minimizing the risks associated with a threat by collective effort. A comprehensive security program is an ever changing, ongoing, and engaging process in an organization’s security posture. In this course, we cover some of the elements that can be applied to a successful security awareness program to obtain the necessary participation at all levels of the organization.
Primary Audience: Executive Leadership. Length: 2-Days
To learn more about a specific course, email us at cias@utsa.edu.

