This course is designed to provide guidance for the implementation of an effective cybersecurity incident recovery program from a pre-incident and post-incident perspective. The training focuses on connecting IT with emergency management and is intended for government, critical infrastructure, and private sector personnel who have the responsibility for recovering after a cyber incident. Short term tactical and long-term strategic activities are discussed culminating in the development of an action plan.
As part of a Department of Homeland Security/Federal
Emergency Management Agency (DHS/FEMA) cooperative agreement training program,
this course is available at no direct cost to state, county, and local
government agencies.
Prerequisites
There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasidopens in a new tab; or with TEEX assistance upon arrival for class.
Course Completion Requirements
Participants are required to score a 70% or better on the Post-Test and attend 80% of the course hours in order to receive a course certificate of completion.
Participant Must Provide
- A photo identification on the first day of class. See the Participant Handbookopens in a new tab for approved forms of identification and additional guidelines.
- Laptop or tablet
Attendance Requirements
Class attendance is an essential part of the education process and participants in TEEX courses are expected to attend all class sessions and field exercises. The course requires participants to attend a minimum of 80% of the class hours as a component of successful course completion. During the course, your instructor will review any additional attendance requirements, for example a field exercise that cannot be missed.
Upon successful completion, you will be able to:
- Describe fundamental concepts and resources related to cyber incident recovery.
- Examine recovery preparedness for cybersecurity incidents.
- Examine tactical, short-term and strategic, long-term recovery operations for cybersecurity incidents.
- Produce a cyber incident recovery action plan based on the scenario information provided.
Suggested Audience
- Government and private sector IT staff
- Local administrators and upper-level management personnel
- System administration
- Risk management personnel
- Local government administration
- Emergency management coordinators
4525 Education Park Dr
Schnecksville, PA 18078
United States