By Topic
Artificial Intelligence (AI) technology are developing at a rapid pace, driven by innovation and with recent advances in AI, machines are gaining the ability to learn, improve and make calculated decisions in ways that will enable them to perform tasks previously thought to rely on human experience, creativity, and ingenuity. As the technology continue to evolve, it is important to understand how AI has the potential to help improve cybersecurity efforts.
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
Ransomware is major techniques that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware. By the end of this training, participants should be able to have: ⢠Knowledge of Ransomware definition and objective.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
La transformation digitale des systèmes d'information et des usages est un enjeu de développement crucial pour les organisations et les entreprises. Le Cloud est un des outils technologiques indispensables pour atteindre cet objectif à l'échelle mondial et encore plus en Afrique. Comme l'ont reconnu 17 pays Africains à l'ONU au début 2019 - dont la Côte d'Ivoire, le Cloud est un enjeu technologique majeur pour atteindre les «Sustainable Development Goals ». Encore faut-il maîtriser cette nouvelle technologie.
Analizar el proceso de gestión de incidencias en escenarios de fallas de seguridad y profundizar en el proceso de automatización para determinar las acciones de cada caso.
Due to successive technological advancements, developments, and innovations, the global industrial landscape has drastically transformed over the last years. The fourth industrial revolution (Industry 4.0) aims at transforming previous generation's industries into intelligent ones by incorporating IoT as innovative technology. Internet of Things (IoT) is a rapidly growing concept that has dramatically contributed to the industry 4.0 realization.
Comprender el funcionamiento de los protocolos de red bajo un enfoque de seguridad. Explorar sistemas de detección y análisis de incidentes que se puedan suscitar en una red de datos.
This course will focus on Security and Quality of Service (QoS) in Internet network from technology, regulation and business aspects. It will cover Internet fundamentals, including Internet protocols and architectures, Internet security standards and approaches as defined by IETF (Internet Engineering Task Force), as well as ITU's security architectures for end-to-end communications. Further, the course will incorporate cybersecurity approaches from the ITU viewpoint, and security aspects of emerging cloud computing and Internet of Things (IoT).
The course dives deep into CSIRT/SOC establishment practice, where combination of theory, unique experience with lessons learned, and hands-on practice give attendees a clear and actionable picture on how to build an effective cybersecurity team. This training helps to successively prepare for cybersecurity team establishment and answers the main questions raised before starting: 1. How to build an effective cybersecurity team? Overview, discussion, and practice about a mandate, governance, team and its structure, timeline, lessons learned from similar establishments, financial planning.