Select from the following course categories or use the search field below to find the course you are looking for - partial names are okay. While most courses are "open enrollment" (no password required) some may require the permission of the sponsoring agency. Instructions for obtaining an enrollment key are provided in the course summary to the right of the course name in the course catalog.

Course Overview:

This interactive presentation is required to meet the Criminal Justice Information Services awareness training. This course is mandatory for all EITS and DPS staff who access CJIS information. 

Learning Objectives:

Upon completion of the course, the student will be able to recognize CJIS security risks and respond appropriately.

Time to Complete (Approx.): 30 Minutes

How to Take the Course: Log into https://www.cjisonline.com/index.cgi and select 'IT & Agency Users'. Your agency TAC will email your logon and password credentials. You then select the 'Training' tab and complete that portion of the module. Once this has been completed select the 'Testing' tab. You will need to attest you completed the required training to take the exam. You will have one hour to complete the exam. This consists of 25 multiple choice true an false questions. You must score 70% to pass the exam. Once you have completed the training and passed the exam you will send your certificate to your agency TAC.


Course Overview:

This interactive presentation explains portable electronic devices and removable storage media which can be plugged in anywhere. Backups of entire computers can now fit on removable storage media. The convenience of portable electronic devices and removable media comes with the risk of losing them or having them stolen. The course will assist in understanding how to mitigate the security risks of stored data.

Learning Objectives:

Upon completion of the course, the student will be able to recognize security risks of portable devices and removable media, and respond appropriately.

Time to Complete (Approx.): 30 Minutes

How to Enroll: Student self-enrollment. Click on the course name.

Course Overview:

This interactive presentation explains what phishing is and provides examples of the different types of phishing. It also provides guidelines to help individuals recognize phishing attempts so that appropriate actions may be taken to avoid these attacks and their consequences. It explains that Phishing is a serious, high-tech scam and that system users are the best line of defense against phishing. Further, it illustrates why users should always be on the look out for phishing attempts even from people from within their organization.

Learning Objectives:

Upon completion of the course, the student will be able to recognize phishing attempts, and respond appropriately.

Time to Complete (Approx.): 30 Minutes

How to Enroll: Student self-enrollment. Click on the course name.

Course Overview:

This interactive presentation describes smartphones and tablets and how to use them wisely. The course will assist the user in recognizing security issues and vulnerabilities associated with smartphones and tablets. It will identify methods of protecting the security of these devices. Most users are not aware of their responsibilities when using mobile devices.  

Learning Objectives:

Upon completion of the course, the student will be able to recognize security issues with mobile devices, and respond appropriately.

Time to Complete (Approx.): 30 Minutes

How to Enroll: Student self-enrollment. Click on the course name.

Course Overview:

This interactive course provides an introduction to social networking. The presentation acknowledges the positive aspects of social networking, but also familiarizes users with some of the risks associated with social networking services. Particular emphasis is placed on the guidance for and limitations on personal use of social networking on an employer's information systems. Practical experience is used to assist users with making informed choices on issues encountered when creating an online profile on a fictional social networking service. This training concludes with a brief summary of the Do's and Don'ts of social networking, particularly on government computers. This information can also benefit friends and family members, and the general public.

Learning Objectives:

Upon completion of the course, the student will be able to:

  1. Understand the concepts and benefits of social networking
  2. Recognize the risks with using social networking, and the risks of ignoring social networking
  3. Make informed decisions about what information to share publicly, and what not to share

Minimum Passing Score: 75% on the Final Exam

Credit Hours: 0.5

Time to Complete (Approx.): 30 Minutes

How to Enroll: Student self-enrollment. Click on the course name.