• Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Call us! 210-458-2119

CIAS@UTSA.edu
CIAS ISAOCIAS ISAO
  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Customized training resources

Home Customized training resources

The CIAS-ISAO recognizes that every organization’s needs are different. The CIAS-ISAO has identified cybersecurity topic areas that can be utilized to develop customized training to suit your individual needs. These topics can be designed to create a training course for your users, management or technical staff.

We will work closely with you to identify the needs of your organization to develop customized and impactful training.

Customized training programs can include, but are not limited to:

Information Assurance

Information Assurance (IA) refers to the steps involved in protecting information systems, like computer systems and networks. There are commonly five terms associated with the definition of information assurance (Integrity, Availability, Authentication, Confidentiality and Nonrepudiation). This course highlights information assurance concepts and will categorize cyber threats to build context on how the threats can be addressed.

Introduction to Information Assurance and Computer Information Systems

Information Assurance (IA) refers to the steps involved in protecting information systems, like computer systems and networks. There are commonly five terms associated with the definition of information assurance (Integrity, Availability, Authentication, Confidentiality and Nonrepudiation). This course will highlight information assurance concepts and will categorize cyber threats to build context on how the threats can be addressed. Computer systems have evolved immensely in the past few decades, from supercomputers and mini-computers to powerful desktop computers. This course provides an overview of how computers work, how they communicate with each other and how our use of computer resources has evolved from physical networks to investing in cloud services.

Primary Audience: Executive Leadership. Length: 2-Days

Secure Network Design

Secure network design requires many layers of defense. Network design is critically important to prevent and detect intrusions and most importantly to reduce the overall risk to the organization. Many different strategies can be implemented in a well-designed network. The purpose of this course is to introduce the defense in depth concept and offer a familiarization on the basics of securing the organizational network.

Network Security Devices

Network security is a term that describes the many policies and procedures that are implemented to track unauthorized access, modification, exploitation or not being able to access the network or network resources. There are a wide variety of devices that can be utilized on a network to minimize potential threats. In this course, we will highlight commonly used devices used to secure the organization’s network.

Introduction to Threats (Malware and Other Types of Compromise)

Cyber threats present a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. There are many cyber threats that should be understood. As an example, one threat discussed in this module is malicious software or malware. Malware is designed to damage or disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. Typical cyber threats and the dangers associated with them will be explained. Counter measures against these threats will also be introduced to assist in implementing the protective measures used to avoid them altogether.

Primary Audience: Executive Leadership. Length: 2-Days

Mobile Device Security

With the evolution of computers now including ones that can be held in our pockets, it is important to understand the security ramifications of these devices. This course discusses the different types of mobile devices, some of the benefits and weaknesses of each, and some options used to secure these devices.

Cyber Incident Response

Incident response is an organized approach used to address and manage a security breach or attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. A cyber incident response plan is imperative to mitigate the consequences of a security breach. In this module we discuss the members and roles of our incident response team and how we can limit damage, retain confidence and reduce recovery time and costs by having a comprehensive incident response plan that takes a proactive approach in preparing for an inevitable incident.

Primary Audience: Executive Leadership. Length: 2-Days

Risk Assessment and Management

Risk is defined as the combination of a threat and a probability assigned to that threat. Because of the varying threats owned by different organizations it is important to understand what hazards are associated with our organization and take a proactive approach in mitigating them. This course explores how to manage risk by exploring these threats and vulnerabilities, assigning priorities to them, and effectively managing a program that attempts to eliminate or reduce the risks involved. Primary Audience:

Executive Leadership. Length: 2-Days

Culture of Security

A culture of security is the practice of minimizing the risks associated with a threat by collective effort. A comprehensive security program is an ever changing, ongoing, and engaging process in an organization’s security posture. In this course, we cover some of the elements that can be applied to a successful security awareness program to obtain the necessary participation at all levels of the organization.

Primary Audience: Executive Leadership. Length: 2-Days

To learn more about a specific course, email us at cias@utsa.edu.

New: The CIAS Community Cybersecurity Clinic Check it out
CIAS ISAO
  • Facebook
  • LinkedIn
  • X
  • Twitter
  • The Crucial Function of Cybersecurity Policies in Organizations
  • A Roadmap to Developing Your Community Cybersecurity Program
  • Collaboration and Consensus: Using the MITRE ATT&CK Framework
  • Introducing Alan CyBear, the Smokey of Cybersecurity
  • Think like a Hacker, a Defense Strategy
  • Engaging your Leadership in Cybersecurity

© 2026 UTSA Center for Infrastructure Assurance & Security -- CIAS-ISAO powered by

  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website