The Texas Cybersecurity Act passed during the 85th session of the legislature requires individuals with an information technology job role and information security job responsibilities to pursue continuing education (CE) hours in information security on an annual basis. The Texas Department of Information Resources (DIR) designates these individuals as Information Resources Employees (IRE).
The number of hours an IRE must complete is based on their IRE Level designation:
Level | Description | Example Job Titles | Req. CE per fiscal year |
---|---|---|---|
1 | All employees with an IT role. |
|
1 |
2 | Employees with IT administrative privileges or responsibilities |
|
3 |
3 | Individuals with an IT information security role. |
|
6 |
Course: | Information Security Policy and Handbook Overview |
---|---|
Time: | 30 Minutes |
Description: | This training is an introduction and overview of the information covered in the UNT System Information Security Handbook. All users of institutional information and information resources are responsible for knowing what is in the UNT System Information Security Handbook. Users are encouraged to review the Handbook for more details about the policies discussed in the training. |
Link: |
Recommended Courses
The following is a list of recommended courses from LinkedIn Learning that can be accessed directly through UNT Bridge.
Course: |
Learning the OWASP Top 10 |
---|---|
Time: | 35 Minutes |
Description: |
No organization—no matter how large or small—is invulnerable to security breaches. What makes all of these systems, and the software that runs them, susceptible to attack? The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand key risks and improve software security. And every few years, they publish a list of the ten biggest application security vulnerabilities. |
Link: | https://unt.bridgeapp.com/learner/courses/70215349/enroll |
Course: |
Cybersecurity Awareness: Social Engineering |
---|---|
Time: | 1 Hour 6 Minutes |
Description: |
Social engineering is one of the most dangerous forms of hacking because it preys on human nature. Learn how to defend your organization from social engineering by recognizing and thwarting the most common types of attacks. |
Link: |
Course: | Cybersecurity Awareness: Malware Explained |
---|---|
Time: | 51 Minutes |
Description: | Malware poses a threat to anyone who uses a computer. Malware is malicious software that "infects" your machine, giving control to hackers who may delete your files, access your credentials, or even drain your bank account. |
Link: | https://unt.bridgeapp.com/learner/courses/e2b207fd/enroll |
For more training suggestions, we provide information on additional suggested LinkedIn Learning courses.