Full catalogue of courses
The hands-on training course on Incident Response Practice will be delivered by two prominent field experts and focus on practical skills to handle and respond to the computer security incidents. All teaching material is based on illustrative real-life cases experienced by trainers or their customers. Several different incident handling cases will be simulated to students with a focus on: incident detection and description; information gathering; analysis tools and techniques; incident handling phases by using RTIR (or related) tool.
This course is designed with the objective to help participants, irrespective of background, with the skills, knowledge and competence to design and implement security system using Internet Protocol Camera for organizations and homes. Participants will go through a step-by-step process of how to install an IP camera, the available legislatures and frameworks and treaties of security systems.
This training is supposed aiming to build knowledge in the current methods and technologies used across cyber crime and provide all the participants with extensive insights and practices about âCybercrime Management: A proactive approach.â.
The purpose of this training course is to provide the participants with an advanced skills, tools and techniques concerning computer and digital forensics using lecture and hands-on labs. Among different topics related to digital forensics, the following subjects will be covered: - Develop an investigative process for the digital forensic investigation - Familiarity with the use of the most popular investigative tools. - Ability to respond to digital crime and to protect the crime scene. - Learn how to collect and analyze digital data directory, operating and storage systems.
This three days training course examines the key elements required to devise cybersecurity policy and strategy. It will enable participants to build and execute strategic plans, create effective information security policy, and action plans as well as how to review the plans whenever required.
This online course will provide theoretical and practical knowledge of IT and cyber security and security methods for computer, network and electronic communication. The course consists of various chapters and will cover fundamentals, such as IT verses ICS, Threats and their Sources, Authentication, Computer Access Control, Cryptography, Network Security, Network Firewall Concepts, Intrusion Detection. The student will get a comprehensive view on security in the cyber space.
The CIR course will provide students with all necessary knowledge of Cyber Incident Response activities, what are main goals and challenges, and explaining main roles and responsibilities in such important process. They will get most up to date trends in this area with an emphasis on most important details of each Cyber Incident Response stage. Upon the successful completion of this course, students will be able take a part in development and implementation of Cyber Incident Plan.
El objetivo principal de este curso permitirá a los participantes iniciarse en la ciberseguridad adquiriendo los conocimientos y competencias básicas necesarios para entender, apoyar, participar en programas y actividades relativas a los dominios estudiados.
This training is designed to provide the supposed to provide all participants with advanced skills, tools and techniques needed to learn to protect the networks from different types of attacks, secure organizational assets, identify vulnerabilities, ensure the privacy of customers, and build secure systems and infrastructures. extensive insights and practices about âAdvanced Cyber Securityâ.. Among different key Advanced Cyber Security topics, the following subjects will be covered: The main purpose of this training is to: ?
This training course aims to introduce participants to the issues of cybercrime, the vulnerability of critical infrastructure and the role of new technologies in ensuring cybersecurity, developing standards for behaviour in cyberspace. Participants will obtain skills in building cybersecurity threat models and familiarize with the risk elements and characteristics of threats, the main threats to the network and methods of their neutralization, as well as with the basics of social engineering.