- Kamilia Amdouni
- Women in Cyber ITU
- Janina Kempf
Introductory
Does this course have any restrictions?
Event Organizer(s)
Description
The objective of Her CyberTracks is to promote the equal, full, and meaningful representation of women in cybersecurity. To this end, the training course initiative equips women with the necessary skills and mindsets to succeed in cybersecurity through targeted cyber capacity building.
Her CyberTracks offers a one-stop curriculum based on three pillars:
- TRAIN: Develop capacity to contribute to a secure and resilient cyberspace. We provide expert training courses, delivered online and on-site, to equip women with the technical and soft skills needed to shape cybersecurity.
- MENTOR: Promote awareness and knowledge sharing of best practices in cybersecurity career development. We provide a platform for senior cyber professionals to mentor women at junior level and foster their professional and personal growth.
- INSPIRE: Positive role models in cybersecurity inspire and empower further women to actively participate and lead in the field. We organize inspirational keynote webinars, regional networking meetings and study visits to shift perceptions and (rightly) position women as valuable additions to the cybersecurity workforce
- NETWORK: We organise networking events to establish resilient connections amongst cybersecurity experts within and across the regions
The curriculum includes the Her CyberTracks Africa training, composed of on-site activities featuring soft skills masterclasses, simulations and hands-on exercises, mentorship circles, study visits to cybersecurity organisations, and engaging networking opportunities.
Participants may choose among four available CyberTracks: Policy & Diplomacy CyberTrack, Cyber & AI CyberTrack, Incident Response CyberTrack, Criminal Justice CyberTrack.
Who is eligible to participate:
The Her CyberTracks programme is being offered specifically to women residing in target countries in Africa and Arab States.
Target countries from the Africa: Angola, Benin, Botswana, Burkina Faso, Burundi, Cabo Verde, Cameroon, Central African Republic, Chad, Congo, Congo (Dem. Rep), Côte d’Ivoire, Egypt, Equatorial Guinea, Eritrea, Ethiopia, Gambia, Ghana, Guinea-Bissau, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritius, Morocco, Mozambique, Namibia, Niger, Nigeria, Rwanda, São Tomé and Príncipe, Senegal, Seychelles, Sierra Leone, South Africa, South Sudan, Tanzania, Togo, Uganda, Zambia, Zimbabwe.
Target countries from the Arab States: Algeria, Djibouti, Comoros, Libya, Mauritania, Somalia, Tunisia.
Target audience for the Criminal Justice CyberTrack: Women working in the criminal justice sector (e.g. prosecutors, law enforcement) involved in or aiming to enter cybersecurity and countering cybercrime fields.
- Participants must have a minimum of 2-3 years of experience in the criminal justice sector (e.g. prosecutors, law enforcement, lawyer etc.);
- Participants must have a good working knowledge of English;
- Willingness and ability to allocate circa 15 hours per month for six months;
- Access to stable Internet connection;
- There are no age restrictions.
Upon completion of this course, participants will be able to:
- Explain cybercrime typologies and legal frameworks to be able to contribute to cybercrime cases investigations and prosecutions;
- Use learned set of skills in cybercrime investigation;
- Apply soft skills, such as communication and teamwork in a professional setting.
The training approach incorporates a blend of self-paced and interactive learning methodologies to effectively achieve the training objectives:
- Self-paced courses: Participants will watch self-paced video presentations covering theoretical frameworks. This allows individuals to digest the content at their own pace, fostering a foundational understanding of key concepts;
- Live instructor-led Zoom sessions: Complementing self-paced learning, live instructor-led Zoom sessions offer interactive opportunities for participants. These sessions will delve deeper into the material, facilitating discussions, regional case studies, and reflective exercises. Exact day and time of the sessions will be communicated in due time, however, please note that they will be in GMT+1 time zone. Recordings will be made available. These will be followed by mandatory forum contributions;
- Face-to-face simulations and group exercises: To reinforce theoretical knowledge and practical skills, face-to-face simulations and group exercises will be conducted. This hands-on approach enables participants to apply their learning in real-world scenarios, promoting collaborative learning and skills’ development.
- Mentorship: Mentorship by subject matter experts will be available to provide guidance, support, and personalized feedback throughout the training journey.
The assessment methods for measuring the achievement of learning objectives encompass a combination of knowledge assessments and practical evaluations:
- Quizzes: Following each self-paced module, participants will undertake a quiz to gauge their comprehension of the theoretical frameworks and content covered. These quizzes will contribute to assessing the understanding of key concepts and principles;
- Mandatory forum contribution following each online instructor-led sessions;
- Active participation to mentorship sessions;
Face-to-Face Simulations and Group Exercises: The practical application of learned concepts during face-to-face simulations and exercises will be evaluated using a structured evaluation framework. Participants' performance in these hands-on activities will be assessed based on predefined criteria, such as problem-solving ability, decision-making skills, and teamwork. The weights assigned to these evaluations will reflect their significance in demonstrating competency and skill mastery.
The grading matrix will allocate weights as follows:
Blended
- Online self-paced and instructor-led courses 40%
- Active participation to mentorship sessions 20%
- Face-to-face simulations and group exercises 40%
Online
- Online self-paced and instructor-led courses 60%
- Active participation to mentorship sessions 40%
A total score higher than 70% is required to obtain the ITU Certificate.
Module 1: Introduction to Cybercrime
Module 2: Countering Cybercrime Framework
- Outline the components of a countering cybercrime framework.
- Present national and international instruments related to countering cybercrime.
- Evaluate the role of institutions engaged in combating cybercrime.
- Examine the characteristics and operations of organized cybercrime networks.
Module 3: Overview of the New UN Convention against Cybercrime
- List the key component of this new convention.
- Explain elements of change for Member States wanting to join the Convention.
- Compare key difference versus existing cooperation mechanisms.
Module 4: Foundations of Blockchain and Cryptocurrencies
- Characterize fundamental concepts in blockchain technology: blocks and validation methods, types of blockchain.
- Describe blockchain transactions and their fundamental concepts: wallets, private/public key.
- Analyse the criminal applications of cryptocurrencies.
- BTC, ETH and USDT.
Module 5: Cryptocurrency Tracing
- Survey the capabilities and methodologies for tracing and seizing assets within the criminal justice sector.
- Live demo of cryptocurrency tracing.
- Follow-up investigation (open-source).
Module 6: Overview of Open Source Intelligence (OSINT)
- Present the use of Open Source methodologies (OSINT) in cybercrime investigations.
- Apply OSINT effectively in investigative procedures.
- Present available tools for OSINT analysis.
Module 7: Applied OSINT
- Use OSINT in investigation context: preparation and set-up.
- Use open-source tools to practice exercises.
Module 8: Cyber Patrolling
- Use of cyber patrolling and legal considerations.
- Demonstrate practical techniques for utilizing cyber patrolling in various contexts.
- Case Study.
Module 9: Digital Evidence Collection and Management
- Assess their institution’s readiness to handle digital evidence in cybercrime cases, identifying concrete gaps, risks, and operational challenges.
- Explain and apply key chain-of-custody principles to ensure the integrity, admissibility, and traceability of digital evidence.
Module 10: Human Rights, AI, and Ethical Digital Investigations
- Examine the concept of digital human rights and its relevance in contemporary contexts.
- Incorporate human rights considerations into cybercrime investigations.
- Apply ethical standards and AI risk management in investigative work.
- Implement risk management strategies and best practices within investigation departments.
Module 11: Advanced Onsite Simulation & Study Visit
- Masterclass on public speaking.
- Study visit to local partner.
- Cross-track hands-on exercise (TTX) on cross-sectoral cooperation (e.g., data protection, biometrics, AI).
- Table Top/Simulation exercises on investigating cybercrime.
- Mentorship circles.









