National cyber crisis management course is the introductory two-day, scenario-based, purpose-built training designed to take students to the intermediate level. The course will include both theoretical and practical components that cover a wide range of topics related to national cyber crisis management. Students will explore the main concepts of cyber crisis management, understand the key roles and responsibilities of key stakeholders involved in national cybersecurity crisis management, including the role CERTs.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
El curso taller está orientado a revisar la teoría detrás de la matriz de evaluación y en base al análisis poder desarrollar un Programa de Ciberseguridad con proyectos de ciberseguridad priorizado en base al riesgo inherente como resultado de la evaluación.
The CSIRT/SOC Establishment and Modernisation course is training program specifically designed to help organisations to establish an effective CSIRT/SOC team. The course provides a detailed guidance on the CSIRT/SOC team mandate and covers all the key elements required for its successful establishment. Our experienced instructors bring a wealth of knowledge and expertise to the course, drawing upon real-world cases to share the critical lessons learned.
Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threats, it's now more important than ever to have the skills required to investigate network attacks and vulnerabilities. Network Forensics starts with the core concepts like coding, networking, forensics tools, and methodologies for forensic investigations. We will also explore the tools used for network forensics, followed by understanding how to apply those tools to a PCAP file and write the accompanying report.
Como parte de nuestras tareas de pentesting muchas veces necesitamos hacer pruebas de penetracion a nuestras aplicaciones, por lo que necesitamos muchas herramientas automatizadas y customizadas a nuestras necesidades, por lo que es altamente necesario que un especialista en ciberseguridad tenga conocimientos solidos en Python aplicado.
This course is by invitation only! The ITU Training of Trainers for Educators on Child Online Protection (COP) aims to give participants a fundamental understanding of the roles and responsibilities of an educator in relation to training methods and meeting the needs of learners.
BY INVITATION ONLY The International Telecommunication Union (ITU), through the Regional Office, will hold the capacity building event cyberdrill for the Americas Region 2023 in Santo Domingo, Dominican Republic from June 19 to 23, 2023, at the kind invitation of the Ministry of the Presidency, the Dominican Telecommunications Institute (INDOTEL), the Vice Ministry of Digital Agenda, the Executive Directorate of the National Cybersecurity Center (CNCS), the Latin American and Caribbean Cybercapacities Center (LAC4) and the Executive Directorate of the Government Office of Information and Co
Child Online Protection (COP) is a growing concern of the world today as children are at risk of violence, abuse, exploitation, and neglect online. It has never been more important to guide young people to shape their digital practices positively. In an increasingly tech-driven world, young people find it challenging to make the distinction between their online and offline worlds. This self-paced course is designed for the professionals in the education sector and is not limited to educators, youth workers, teachers, staff, leaders, mentors, coaches etc.
La ciberseguridad es un reto complejo que engloba múltiples y diferentes aspectos de gobernanza, políticos, operativos, técnicos y jurídicos. La presente formación proporciona conocimientos generales para abordar, organizar y jerarquizar muchos de estos ámbitos basándose en modelos, marcos y otras referencias existentes y ampliamente reconocidas.