By Topic
Pagination
This course aims to equip professionals with in-depth knowledge and practical skills to manage emerging threats and vulnerabilities in digital infrastructures. The curriculum explores governance and covers policy development, ethical standards and regulatory frameworks in cybersecurity to ensure organizations’ compliance with the latest threats, risk assessment methodologies, and security best practices.
The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security.
This 4.5-day course provides a comprehensive approach to building, modernising, and optimising Cyber Security Incident Response Teams (CSIRTs) and Security Operations Centers (SOCs). Designed to address the increasing complexity of today's threat landscape, the course blends strategic frameworks with hands-on technical training to equip participants with the skills needed to design, implement, and sustain effective cybersecurity operations.
The CSIRT/SOC Establishment and Modernisation course is training program specifically designed to help organisations to establish an effective CSIRT/SOC team. The course provides a detailed guidance on the CSIRT/SOC team mandate and covers all the key elements required for its successful establishment.
Este curso de AuditorÃa de un Centro de Datos busca desarrollar las competencias necesarias para auditar centros de datos de nivel empresarial, conforme a los estándares y mejores prácticas internacionales.
En este curso intermedio, los participantes aprenderán a evaluar los requisitos para optimizar el rendimiento, asegurar la continuidad operativa, implementar soluciones de alta disponibilidad y garantizar la eficiencia energética de un centro de datos.
The implementation of the UN cyber norms requires adjusting or establishing policies, procedures, regulations or capabilities or ado pting other measures which support state and national adherence to the projected conditions of the recommendations for norms. By improving national cybersecurity, countries will be better able and willing to work with other countries to improve cybersecurity regional and globally.
This course is designed to introduce the in-depth concept of cyber threat intelligence to participants and provide them with the practical experience to gain cyber threat intelligence skills required to make security teams better, threat hunting more accurate, incident response more effective, and organizations more aware of the evolving cyber threat landscape. Cyber threat intelligence is an area of cybersecurity that focuses on the collection and analysis of information about current and potential attacks that can threaten the safety of an organization or its assets.
This course focuses on Security and Quality of Service (QoS) in Internet network from technology, regulation and business aspects. It covers Internet fundamentals, including Internet protocols and architectures, Internet security standards and approaches as defined by IETF (Internet Engineering Task Force), as well as ITU's security architectures for end-to-end communications. Further, the course incorporates cybersecurity approaches from the ITU viewpoint, and security aspects of emerging cloud computing and Internet of Things (IoT).
This 4.5-day training course provides essential steps and guidelines for designing effective cybersecurity exercises, focusing on the practical aspects of information security. During the course, participants will learn how to define objectives, choose appropriate approaches, design network topologies, create realistic scenarios, establish rules, select relevant metrics, and capture valuable lessons.