Displaying 1 - 10 of 22
Registration : Opened
15
Jan
2025
to
14
Sep
2025
From 07 Oct 2025 to 16 Oct 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $0.00

The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.

Registration : Opened
13
Nov
2024
to
03
Sep
2025
From 24 Sep 2025 to 27 Sep 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $0.00

Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security.  

Registration : Opened
29
Oct
2024
to
26
Aug
2025
From 02 Sep 2025 to 04 Sep 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $500.00

The CSIRT/SOC Establishment and Modernisation course is training program specifically designed to help organisations to establish an effective CSIRT/SOC team. The course provides a detailed guidance on the CSIRT/SOC team mandate and covers all the key elements required for its successful establishment.

Registration : Opened
13
Dec
2024
to
10
Aug
2025
From 01 Sep 2025 to 03 Oct 2025
Global or multi-regional / Spanish
Training modality : Online instructor led
Price : $0.00

Este curso de Auditoría de un Centro de Datos busca desarrollar las competencias necesarias para auditar centros de datos de nivel empresarial, conforme a los estándares y mejores prácticas internacionales. 

En este curso intermedio, los participantes aprenderán a evaluar los requisitos para optimizar el rendimiento, asegurar la continuidad operativa, implementar soluciones de alta disponibilidad y garantizar la eficiencia energética de un centro de datos.

Registration : Opened
29
Apr
2024
to
07
Aug
2025
From 27 Aug 2025 to 29 Aug 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $0.00

The implementation of the UN cyber norms requires adjusting or establishing policies, procedures, regulations or capabilities or ado pting other measures which support state and national adherence to the projected conditions of the recommendations for norms. By improving national cybersecurity, countries will be better able and willing to work with other countries to improve cybersecurity regional and globally.

Registration : Opened
10
Dec
2024
to
06
Apr
2025
From 30 Jun 2025 to 04 Jul 2025
Global or multi-regional / English
Training modality : Face to Face
Price : $0.00

This course is designed to introduce the in-depth concept of cyber threat intelligence to participants and provide them with the practical experience to gain cyber threat intelligence skills required to make security teams better, threat hunting more accurate, incident response more effective, and organizations more aware of the evolving cyber threat landscape. Cyber threat intelligence is an area of cybersecurity that focuses on the collection and analysis of information about current and potential attacks that can threaten the safety of an organization or its assets.

Registration : Opened
15
Nov
2024
to
15
Jun
2025
From 16 Jun 2025 to 23 Jun 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $150.00

This course focuses on Security and Quality of Service (QoS) in Internet network from technology, regulation and business aspects. It covers Internet fundamentals, including Internet protocols and architectures, Internet security standards and approaches as defined by IETF (Internet Engineering Task Force), as well as ITU's security architectures for end-to-end communications. Further, the course incorporates cybersecurity approaches from the ITU viewpoint, and security aspects of emerging cloud computing and Internet of Things (IoT).

Registration : Opened
14
Nov
2024
to
23
Feb
2025
From 05 May 2025 to 09 May 2025
Global or multi-regional / English
Training modality : Face to Face
Price : $0.00

This 4.5-day training course provides essential steps and guidelines for designing effective cybersecurity exercises, focusing on the practical aspects of information security. During the course, participants will learn how to define objectives, choose appropriate approaches, design network topologies, create realistic scenarios, establish rules, select relevant metrics, and capture valuable lessons.

Registration : Opened
12
Dec
2024
to
15
Feb
2025
From 03 Mar 2025 to 04 Apr 2025
Global or multi-regional / Spanish
Training modality : Online instructor led
Price : $0.00

Este curso está diseñado para proporcionar a los participantes los conocimientos y habilidades esenciales en respuesta a incidentes y análisis forense digital. El curso cubre desde los fundamentos de la identificación y preservación de datos digitales, hasta la interpretación de la evidencia en investigaciones legales. Los participantes aprenderán a gestionar de manera efectiva los incidentes de seguridad, identificando amenazas, conteniendo impactos y restaurando sistemas afectados, todo mientras se asegura la integridad de los datos para su uso en procedimientos legales.

Registration : Opened
29
Oct
2024
to
20
Feb
2025
From 25 Feb 2025 to 26 Feb 2025
Global or multi-regional / English
Training modality : Online instructor led
Price : $450.00

National cyber crisis management course is the introductory two-day, scenario-based, purpose-built training designed to take attendees to the intermediate level. 

The course will include both theoretical and practical components that cover a wide range of topics related to national cyber crisis management. Students will explore the main concepts of cyber crisis management, understand the key roles and responsibilities of key stakeholders involved in national cybersecurity crisis management, including the role CSIRTs.