By Topic
Pagination
The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security.
The CSIRT/SOC Establishment and Modernisation course is training program specifically designed to help organisations to establish an effective CSIRT/SOC team. The course provides a detailed guidance on the CSIRT/SOC team mandate and covers all the key elements required for its successful establishment.
Este curso de Auditoría de un Centro de Datos busca desarrollar las competencias necesarias para auditar centros de datos de nivel empresarial, conforme a los estándares y mejores prácticas internacionales.
En este curso intermedio, los participantes aprenderán a evaluar los requisitos para optimizar el rendimiento, asegurar la continuidad operativa, implementar soluciones de alta disponibilidad y garantizar la eficiencia energética de un centro de datos.
The implementation of the UN cyber norms requires adjusting or establishing policies, procedures, regulations or capabilities or ado pting other measures which support state and national adherence to the projected conditions of the recommendations for norms. By improving national cybersecurity, countries will be better able and willing to work with other countries to improve cybersecurity regional and globally.
This course is designed to introduce the in-depth concept of cyber threat intelligence to participants and provide them with the practical experience to gain cyber threat intelligence skills required to make security teams better, threat hunting more accurate, incident response more effective, and organizations more aware of the evolving cyber threat landscape. Cyber threat intelligence is an area of cybersecurity that focuses on the collection and analysis of information about current and potential attacks that can threaten the safety of an organization or its assets.
This course focuses on Security and Quality of Service (QoS) in Internet network from technology, regulation and business aspects. It covers Internet fundamentals, including Internet protocols and architectures, Internet security standards and approaches as defined by IETF (Internet Engineering Task Force), as well as ITU's security architectures for end-to-end communications. Further, the course incorporates cybersecurity approaches from the ITU viewpoint, and security aspects of emerging cloud computing and Internet of Things (IoT).
This 4.5-day training course provides essential steps and guidelines for designing effective cybersecurity exercises, focusing on the practical aspects of information security. During the course, participants will learn how to define objectives, choose appropriate approaches, design network topologies, create realistic scenarios, establish rules, select relevant metrics, and capture valuable lessons.
Este curso está diseñado para proporcionar a los participantes los conocimientos y habilidades esenciales en respuesta a incidentes y análisis forense digital. El curso cubre desde los fundamentos de la identificación y preservación de datos digitales, hasta la interpretación de la evidencia en investigaciones legales. Los participantes aprenderán a gestionar de manera efectiva los incidentes de seguridad, identificando amenazas, conteniendo impactos y restaurando sistemas afectados, todo mientras se asegura la integridad de los datos para su uso en procedimientos legales.
National cyber crisis management course is the introductory two-day, scenario-based, purpose-built training designed to take attendees to the intermediate level.
The course will include both theoretical and practical components that cover a wide range of topics related to national cyber crisis management. Students will explore the main concepts of cyber crisis management, understand the key roles and responsibilities of key stakeholders involved in national cybersecurity crisis management, including the role CSIRTs.