By Topic
Aimed at parents and guardians, this course covers child online behaviours, threats, and risks, helping to build open conversations about cyber safety in the family setting.
This course engages parents in understanding the nature of children's online engagements, focusing on reducing risks and safeguarding children online.
Designed for policy-makers, this course focuses on child online behaviours, threats, and risks associated with cyberspace, aiming to develop national policies and strategies that are holistic, inclusive, and evidence-based.
Tailored for professionals in the education sector, this introductory course on Child Online Protection addresses online risks and provides guidance on shaping positive digital practices among young people.
This course is designed to help educators better understand the risks related to Online Child Sexual Exploitation and Abuse (further - OCSEA), and how the educational environments can be used to prevent children from harm associated with OCSEA.
Focusing on protecting civilian aspects of cyberspace, this course covers the overarching principles and good practices in drafting, developing, and managing a National Cybersecurity Strategy, based on existing models and frameworks.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
El curso taller está orientado a revisar la teoría detrás de la matriz de evaluación y en base al análisis poder desarrollar un Programa de Ciberseguridad con proyectos de ciberseguridad priorizado en base al riesgo inherente como resultado de la evaluación.
Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threats, it's now more important than ever to have the skills required to investigate network attacks and vulnerabilities. Network Forensics starts with the core concepts like coding, networking, forensics tools, and methodologies for forensic investigations. We will also explore the tools used for network forensics, followed by understanding how to apply those tools to a PCAP file and write the accompanying report.
Como parte de nuestras tareas de pentesting muchas veces necesitamos hacer pruebas de penetracion a nuestras aplicaciones, por lo que necesitamos muchas herramientas automatizadas y customizadas a nuestras necesidades, por lo que es altamente necesario que un especialista en ciberseguridad tenga conocimientos solidos en Python aplicado.