DIR Security Protecting Information Resources for Texas 

Awareness and Education 

Awareness and Education

Security Awareness Tools

DIR Sponsored Training

 

DIR Supported Training

Other Events of Interest (with DIR Participation)

RECORDED WORKSHOP  

  • Recorded Insider Threat: Log Analysis & Correlation
    • In this recorded workshop, you will be introduced to the insider threat "problem" - both malicious and non-malicious. This webinar includes some simple hands-on exercises.
  • Recorded - Securing Your Wireless Mobile Devices
    • In this 60-minute workshop, you will be introduced to the different wireless technologies, how they work, and their associated security weaknesses.
  • Recorded - DoS Wireless Roundtable Discussion
    • This COL workshop will sponsor the first roundtable discussion with DoS experts/stakeholders on the state of wireless. The discussion will focus on where DoS currently stands and where they are headed. There will be student participation with Q&A.
  • Recording Preparing for an Intl Advanced Persistent Threat
    • This 60-90 minutes workshop with demonstration will take a closer look at what Advanced Persistent Threats (APTs) are and how they are attacking organizations - designed for the beginner to intermediate learner.
  • Recorded Network Fundamentals – Part 1
    • This workshop is part one of a two part series that will cover network security fundamentals including an overview of network components and how to properly secure your network. Students need to have a working knowledge of networking concepts.
  • Recorded What your Mobile Device Says About You 
    • Learn to secure your mobile devices with Dr. James Stanger. Dr Stanger will discuss ways that hackers exploit you, your family, business colleagues or friends and how you can secure your mobile device to protect you and them from harm.

LIVE WORKSHOP  

  • Tracking Hackers
    Wednesday, March 19, 2014 7:00:00 AM CDT - 8:00:00 AM CDT
    Wednesday, March 19, 2014 12:15:00 PM CDT - 1:30:00 PM CDT
    In this workshop, Dr. James Stanger will discuss how to detect, track and thwart intrusions. He will profile software such as Tripwire, show how to create honeypots, and conduct tracebacks - for learners with solid knowledge of network concepts.

  • IPV6 - A Detailed
    Tuesday, March 25, 2014 7:00:00 AM CDT - 8:00:00 AM CDT
    This Workshop, presented by James Stanger, will present detailed information about how IPv6 works, how it can improve security if properly implemented, and how you can migrate your end user systems from IPv4 to IPv6.

  • Network Fundamentals - Part 2
    Tuesday, April 1, 2014 7:00:00 AM CDT - 8:30:00 AM CDT
    Tuesday, April 1, 2014 12:00:00 PM CDT - 1:00:00 PM CDT
    This workshop is part two of a two part series that will cover network security fundamentals including an overview of network components and how to properly secure your network. Two 15 minutes hands-on labs will be included.

  • Insider Threat: User Permissions
    Tuesday, April 8, 2014 7:00:00 AM CDT - 8:30:00 AM CDT
    Tuesday, April 8, 2014 12:00:00 PM CDT - 1:30:00 PM CDT
    Is your organization prepared for the Insider Threat? Learn the tools and techniques of the insider threat and how to prepare your organization. Permission escalation and watermarking techniques will be demonstrated with a hands-on lab.

  • Insider Threat: Securing Privileged Accounts
    Thursday, April 17, 2014 7:00:00 AM CDT - 8:00:00 AM CDT
    Thursday, April 17, 2014 12:00:00 PM CDT - 1:00:00 PM CDT
    This workshop focuses on proper use and safeguards for Active Directory administrator accounts and Managed Service accounts at Department of State - mainly Microsoft Active Directory accounts with elevated levels of access. 

          For registration : Cybersecurity Online Training

Information about file formats