Certified by the Texas Department of Information Resources (DIR)—FY 21-22 (#125)

What you will learn

To understand the definitions and foundational concepts

To understand the data and the information lifecycle process

To assess risk, attacks, and the impacts

To form information security habits and procedures that protect information resources

To follow best practices for detecting, assessing, reporting, and addressing information security threats

To maintain cyber hygiene and the means to support the availability of both the information system and the data within


This is a foundation-level course for individuals looking to get up to speed on Cybersecurity. For compliance reasons, as well as to get a general idea of the concepts, practices, and tools involved in practicing Cybersecurity, this course is an ideal starting point for you.

This cybersecurity training program focuses on forming information security habits and procedures that protect information resources; and teaches best practices for detecting, assessing, reporting, and addressing information security threats.

Compelling value propositions

In addition to the really well-structured yet not-too-overwhelming content structure, this course aims to alleviate some of the most common issues encountered in taking up online self-paced courses by

a) leveraging our pool of subject matter experts and instructors to answer every course-related question within one business day, and

b) committing to a course update frequency of at least 1 update every six months.

Please also note that this is a Texas Department of Information Resources (DIR) certified course – FY 21-22 (#125). This basically means that if you are a Texas state and local government employee or contractor and Section 2054.5191 requires you to complete a certified training program, this course will help you fulfill that requirement.

***Important note***

As of date, this course is available for free registrations with a limited amount of content available. The intention here is to solicit feedback from users to ensure that we do not leave anything out that impacts the learners’ experience. Free registrations will stop soon – we will add the remaining content then and make it a paid course. However, anyone who registers during this free preview phase will retain access to the full course as a gesture of appreciation for helping us with their review and feedback.

Course coverage

Get Instant Notification of New Courses on our Telegram channel.

This course covers the basics of Cybersecurity as applied in an enterprise setting. Among other things, it aims to make you cognizant of the following

  • Best practices for cyber hygiene.
  • Best practices for back-ups, including types, locations, frequency, testing, and protection.
  • The Traffic Light Protocol (TLP) levels and how to follow TLP sharing guidance.

Included in the course

  • 1 business day’s turn-around-time to resolve all your queries by our experts
  • Updates to our course content every 6 months
  • 2+ hours of video lectures
  • A set of 50 questions to help you assess your knowledge gained from the course
  • A downloadable slide deck






Confidentiality, Integrity, and Availability (CIA)

Confidentiality, Integrity, and Availability (CIA)

Information security and Cybersecurity Definitions

Information security and Cybersecurity Definitions

Identify and Access Management & Data Security

Business, Governance

Access control concepts

User Identification, Authentication, and Session Protection

Access Control Authorization Systems