By Topic
Pagination
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security.
This course focuses on Security and Quality of Service (QoS) in Internet network from technology, regulation and business aspects. It covers Internet fundamentals, including Internet protocols and architectures, Internet security standards and approaches as defined by IETF (Internet Engineering Task Force), as well as ITU's security architectures for end-to-end communications. Further, the course incorporates cybersecurity approaches from the ITU viewpoint, and security aspects of emerging cloud computing and Internet of Things (IoT).
This 4.5-day training course provides essential steps and guidelines for designing effective cybersecurity exercises, focusing on the practical aspects of information security. During the course, participants will learn how to define objectives, choose appropriate approaches, design network topologies, create realistic scenarios, establish rules, select relevant metrics, and capture valuable lessons.
National cyber crisis management course is the introductory two-day, scenario-based, purpose-built training designed to take attendees to the intermediate level.
The course will include both theoretical and practical components that cover a wide range of topics related to national cyber crisis management. Students will explore the main concepts of cyber crisis management, understand the key roles and responsibilities of key stakeholders involved in national cybersecurity crisis management, including the role CSIRTs.
This course will equip attendees with practical analyst skills in Cyber Threat Intelligence (CTI) using MISP, one of the most widely used Threat Intelligence Platforms (TIP) in the industry. MISP is a powerful, open-source platform that organizations can use to store, share, and receive structured information about malware, threats, and vulnerabilities.
Participants will explore the rationale behind various analyst tasks and engage in real-world scenarios to see how responder teams effectively utilize CTI through MISP.
This hands-on training program is designed to equip attendees from Least Developed Countries (LDCs) with practical analysis skills using MISP, one of the most widely adopted Threat Intelligence Platforms (TIP) in the field. MISP is a robust, open-source platform that organizations can use to store, share, and receive information about malware, threats, and vulnerabilities in a structured manner. Training will be delivered under the Cyber for Good project.
El curso se enfoca en brindar al participante los lineamientos necesarios para elaborar un Plan y Programa de AuditorÃa, que tanga como objetivo el robustecimiento de la ciberseguridad en la organización.
El proceso estructurado y ordenado de auditorÃa, permitirá que los identificar las vulnerabilidades tecnológicas que deben ser atendidas con prioridad para mantener un nivel adecuado de protección de la información crÃtica del negocio.
This course aims to equip professionals with in-depth knowledge and practical skills to manage emerging threats and vulnerabilities in digital infrastructures. The curriculum explores governance and covers policy development, ethical standards and regulatory frameworks in cybersecurity to ensure organizations’ compliance with the latest threats, risk assessment methodologies, and security best practices.
Cybersecurity exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task. This course provides a number of steps and guidelines that should be followed when designing a cyber exercise. The steps include defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and capturing lessons learned. This 3-day training course examines the key elements required to develop cyber disaster response simulation exercises.
The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.