Skip navigation

Course Description

AWR-175-W - Information Security for Everyone

Reviewed/Updated 11/13/13

Course Overview

Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.

Course Objectives:

  • Identify essentials needed to keep their data safe, both at home and at work
  • Describe anti-virus packages and types of protection frequently offered by anti-virus packages
  • Describe the types of malware defended against by common anti-virus packages
  • Differentiate between host based firewalls and network firewalls and need of using personal firewalls
  • Differentiate between an operating system and an application
  • Identify at least two common operating systems
  • Identify reasons why timely OS patching is critical
  • Describe how to configure a common operating system to automatically download and install patches
  • Differentiate between viruses, worms, and Trojans
  • Defend against malware infections using traditional anti-virus techniques
  • Identify indications of infection and recovering from malware infection (virus scan, manual clean, etc.)
  • Describe spyware, risks accompanying spyware, and identify signs of spyware infection
  • Describe methods of recovering from spyware infection (scan, manual removal, etc.)
  • Describe adware, differentiate between adware and spyware, and describe methods of recovering from adware infection
  • Describe P2P software and risks involving P2P communication
  • Describe wireless network, the security differences between WEP secured networks, WPA and WPA2 protocols
  • Describe brute force and dictionary password attacks
  • Identify examples of strong passwords/passphrases
  • Identify common network hardware such as routers, switches, and hosts
  • Describe the purpose of http, DNS, and IP addresses
  • Compare and contrast wireless and wired networks
  • Describe how to implement defense in depth
  • Describe the attributes of information security (CIA) and separation of duties
  • Describe encryption, why encryption is necessary for data transmitting over the network
  • Describe how to purge cookies and browser cache
  • Describe how to defeat quid-proquo attacks
  • Describe how to defeat shoulder surfing attacks
  • Describe how to defeat pre-texting attacks
  • Describe how to defeat dumpster diving attacks
  • Describe how to deal with browser exploits
  • Describe encrypted browsing (HTTPS) and Certificate Authorities
  • Describe methods of avoiding browser pop-ups
  • Describe available tools to ensure safer browsing
  • Describe browser-based protections against phishing
  • Describe what to do with suspicious messages
  • Describe how to avoid phishing scams
  • Describe what to do with spam messages and how to prevent spam messages
  • Describe IM risks and defenses
  • Describe other methods of protecting users while online
How this course is offered:

This is an internet-based course that can be accessed at

Prerequisites & Other Information:

No tuition is charged.

Course Specifics

Hours: 10.50
Provider: TEEX
Disciplines: Emergency Management
Emergency Medical Service
Fire Service
Government Administration
Health Care
Law Enforcement
Public Health
Public Safety Communications
Public Works
Volunteer Organization

Available Classes

No classes found.

© 2010-2020 Texas Division of Emergency Management