Displaying 1 - 10 of 19
Registration : Opened
13
Nov
2024
to
03
Sep
2025
From 24 Sep 2025 to 27 Sep 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $0.00

Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security.  

Registration : Opened
15
Nov
2024
to
15
Jun
2025
From 16 Jun 2025 to 23 Jun 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $150.00

This course focuses on Security and Quality of Service (QoS) in Internet network from technology, regulation and business aspects. It covers Internet fundamentals, including Internet protocols and architectures, Internet security standards and approaches as defined by IETF (Internet Engineering Task Force), as well as ITU's security architectures for end-to-end communications. Further, the course incorporates cybersecurity approaches from the ITU viewpoint, and security aspects of emerging cloud computing and Internet of Things (IoT).

Registration : Opened
14
Nov
2024
to
02
Feb
2025
From 31 Mar 2025 to 04 Apr 2025
Global or multi-regional / English
Training modality : Face to Face
Price : $0.00

This 4.5-day training course provides essential steps and guidelines for designing effective cybersecurity exercises, focusing on the practical aspects of information security. During the course, participants will learn how to define objectives, choose appropriate approaches, design network topologies, create realistic scenarios, establish rules, select relevant metrics, and capture valuable lessons.

Registration : Opened
29
Oct
2024
to
20
Feb
2025
From 25 Feb 2025 to 26 Feb 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $450.00

National cyber crisis management course is the introductory two-day, scenario-based, purpose-built training designed to take attendees to the intermediate level. 

The course will include both theoretical and practical components that cover a wide range of topics related to national cyber crisis management. Students will explore the main concepts of cyber crisis management, understand the key roles and responsibilities of key stakeholders involved in national cybersecurity crisis management, including the role CSIRTs. 

Registration : Opened
29
Oct
2024
to
06
Jan
2025
From 20 Jan 2025 to 10 Feb 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $0.00

This course will equip attendees with practical analyst skills in Cyber Threat Intelligence (CTI) using MISP, one of the most widely used Threat Intelligence Platforms (TIP) in the industry. MISP is a powerful, open-source platform that organizations can use to store, share, and receive structured information about malware, threats, and vulnerabilities.

Participants will explore the rationale behind various analyst tasks and engage in real-world scenarios to see how responder teams effectively utilize CTI through MISP.

Registration : Closed
From 27 Nov 2024 to 28 Nov 2024
Global or multi-regional / English
Training modality : Online instructor led
Price : $0.00

This hands-on training program is designed to equip attendees from Least Developed Countries (LDCs) with practical analysis skills using MISP, one of the most widely adopted Threat Intelligence Platforms (TIP) in the field. MISP is a robust, open-source platform that organizations can use to store, share, and receive information about malware, threats, and vulnerabilities in a structured manner. Training will be delivered under the Cyber for Good project.

Registration : Closed
From 11 Nov 2024 to 14 Dec 2024
Global or multi-regional / Spanish
Training modality : Online instructor led
Price : $0.00

El curso se enfoca en brindar al participante los lineamientos necesarios para elaborar un Plan y Programa de Auditoría, que tanga como objetivo el robustecimiento de la ciberseguridad en la organización.  

El proceso estructurado y ordenado de auditoría, permitirá que los identificar las vulnerabilidades tecnológicas que deben ser atendidas con prioridad para mantener un nivel adecuado de protección de la información crítica del negocio. 

Registration : Closed
From 11 Nov 2024 to 22 Nov 2024
Global or multi-regional / English
Training modality : Online instructor led
Price : $0.00

This course aims to equip professionals with in-depth knowledge and practical skills to manage emerging threats and vulnerabilities in digital infrastructures. The curriculum explores governance and covers policy development, ethical standards and regulatory frameworks in cybersecurity to ensure organizations’ compliance with the latest threats, risk assessment methodologies, and security best practices.

Registration : Closed
From 22 Oct 2024 to 24 Oct 2024
Global or multi-regional / English
Training modality : Face to Face
Price : $0.00

Cybersecurity exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task. This course provides a number of steps and guidelines that should be followed when designing a cyber exercise. The steps include defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and capturing lessons learned. This 3-day training course examines the key elements required to develop cyber disaster response simulation exercises.

Registration : Closed
From 14 Oct 2024 to 24 Oct 2024
Global or multi-regional / English
Training modality : Online instructor led
Price : $0.00

The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.