IRE Security Continuing Education

The Texas Cybersecurity Act passed during the 85th session of the legislature requires individuals with an information technology job role and information security job responsibilities to pursue continuing education (CE) hours in information security on an annual basis.  The Texas Department of Information Resources (DIR) designates these individuals as Information Resources Employees (IRE).

The number of hours an IRE must complete is based on their IRE Level designation:

Level Description Example Job Titles Req. CE
per fiscal year
1 All employees with an IT role.
  • Media Technical Coordinator
  • Telecommunications Analyst
1
2 Employees with IT administrative privileges or responsibilities
  • Cross Functional IT Support Specialist
  • Senior Data Analyst
3
3 Individuals with an IT information security role.
  • Chief Information Security Officer
  • Information Security Analyst
6

 

 

Course: Information Security Policy and Handbook Overview
Time: 30 Minutes
Description: This training is an introduction and overview of the information covered in the UNT System Information Security Handbook. All users of institutional information and information resources are responsible for knowing what is in the UNT System Information Security Handbook. Users are encouraged to review the Handbook for more details about the policies discussed in the training.
Link:

https://unt.bridgeapp.com/learner/courses/0396fb3a/enroll

 

Recommended Courses

The following is a list of recommended courses from LinkedIn Learning that can be accessed directly through UNT Bridge.

 

Course:

Learning the OWASP Top 10

Time: 35 Minutes
Description:

No organization—no matter how large or small—is invulnerable to security breaches. What makes all of these systems, and the software that runs them, susceptible to attack? The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand key risks and improve software security. And every few years, they publish a list of the ten biggest application security vulnerabilities.

Link: https://unt.bridgeapp.com/learner/courses/70215349/enroll

 

Course:

Cybersecurity Awareness: Social Engineering

Time: 1 Hour 6 Minutes
Description:

Social engineering is one of the most dangerous forms of hacking because it preys on human nature. Learn how to defend your organization from social engineering by recognizing and thwarting the most common types of attacks.

Link:

https://unt.bridgeapp.com/learner/courses/4110cfa1/enroll

 

Course: Cybersecurity Awareness: Malware Explained
Time: 51 Minutes
Description: Malware poses a threat to anyone who uses a computer. Malware is malicious software that "infects" your machine, giving control to hackers who may delete your files, access your credentials, or even drain your bank account.
Link: https://unt.bridgeapp.com/learner/courses/e2b207fd/enroll

 

For more training suggestions, we provide information on additional suggested LinkedIn Learning courses.