- Kamilia Amdouni
- Women in Cyber ITU
- Janina Kempf
Introductory
Does this course have any restrictions?
Event Organizer(s)
Supported by
Description
The objective of Her CyberTracks is to promote the equal, full, and meaningful representation of women in cybersecurity. To this end, the training course equips women with the necessary skills and mindsets to succeed in cybersecurity through targeted cyber capacity building.
Her CyberTracks offers a one-stop curriculum based on four pillars:
- TRAIN: Develop capacity to contribute to a secure and resilient cyberspace. We provide expert training courses, delivered online and on-site, to equip women with the technical and soft skills needed to shape cybersecurity
- MENTOR: Promote awareness and knowledge sharing of best practices in cybersecurity career development. We provide a platform for senior cyber professionals to mentor women at junior level and foster their professional and personal growth
- INSPIRE: Positive role models in cybersecurity inspire and empower further women to actively participate and lead in the field. We organize inspirational keynote webinars, regional networking meetings and study visits to shift perceptions and (rightly) position women as valuable additions to the cybersecurity workforce
- NETWORK: We organise networking events to establish resilient connections amongst cybersecurity experts within and across the regions
The curriculum includes the Her CyberTracks regional trainings, composed of on-site activities featuring soft skills masterclasses, simulations and hands-on exercises, mentorship circles, study visits to cybersecurity organisations, and engaging networking opportunities.
Participants may choose among four available CyberTracks: Policy & Diplomacy CyberTrack, Incident Response CyberTrack, Criminal Justice CyberTrack and Cyber & AI CyberTrack.
Who is eligible to participate:
The Her CyberTracks programme is being offered specifically to women residing in target countries in Africa, Arab States, Asia Pacific, Europe and CIS.
Target countries from Africa: Angola, Benin, Botswana, Burkina Faso, Burundi, Cabo Verde, Cameroon, Central African Republic, Chad, Congo, Congo (Dem. Rep), Côte d’Ivoire, Egypt, Equatorial Guinea, Eritrea, Ethiopia, Gambia, Ghana, Guinea-Bissau, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritius, Morocco, Mozambique, Namibia, Niger, Nigeria, Rwanda, São Tomé and Príncipe, Senegal, Seychelles, Sierra Leone, South Africa, South Sudan, Tanzania, Togo, Uganda, Zambia, Zimbabwe.
Target countries from the Arab States: Algeria, Djibouti, Comoros, Libya, Mauritania, Somalia, Tunisia.
Target countries from the Asia and the Pacific: Bangladesh, Bhutan Cambodia, Fiji, Indonesia, Kiribati, Lao P.D.R., Maldives, Marshall Islands, Micronesia, Nepal, Papua New Guinea, Philippines, Samoa, Solomon Islands, Thailand, Timor-Leste, Tonga, Tuvalu, Vanuatu, Viet Nam
Target countries from CIS and Europe: Albania, Armenia, Bosnia and Herzegovina, Moldova, Montenegro, North Macedonia, Serbia, Ukraine.
Target audience for the Policy and Diplomacy CyberTrack: Women working in policy fields, e.g. cybersecurity, ICT/digital affairs, peace & security; and/or women in technical roles in cybersecurity interested in policy and diplomacy.
- Participants must have a minimum 2-3 years experience in the fields of policymaking or diplomacy, preferably in the fields of technology, cybersecurity and/or peace and security, or in technical cybersecurity fields;
- Participants must have a good working knowledge of English (main language of delivery and of the training materials);
- Willingness and ability to allocate circa 15 hours per month across six months;
- Access to stable Internet connection;
- There are no age restrictions.
Upon completion of this course, participants will be able to:
- Explain key technical, political, and diplomatic aspects of cybersecurity, including international frameworks, national policies, connected technological developments (e.g. AI) and definitions relevant to cyber policy and cyber diplomacy.
- Create and operationalize National Cybersecurity Strategies through a lifecycle approach, incorporating cross-cutting principles, good practices, and gender-responsive policymaking.
- Evaluate international, regional, and multistakeholder mechanisms for cybersecurity and cyber diplomacy, including confidence-building measures (CBMs) and responsible state behavior in cyberspace.
- Apply public speaking, negotiation and chairing techniques, strategic consensus-building approaches, and self-confidence to effectively contribute as a team member, delegate, or leader in cybersecurity negotiations and multistakeholder processes.
- Apply a gender lens to cybersecurity policy and implementation, fostering inclusivity and equity in national and international cybersecurity practices.
The training approach incorporates a blend of self-paced and interactive learning methodologies to effectively achieve the training objectives:
- Self-paced courses: Participants will watch self-paced video presentations covering theoretical frameworks. This allows individuals to digest the content at their own pace, fostering a foundational understanding of key concepts;
- Live instructor-led Zoom sessions: Complementing the self-paced learning, live instructor-led Zoom sessions offer interactive opportunities for participants. These sessions will delve deeper into the material, facilitating discussions, regional case studies, and reflective exercises. Exact day and time of the sessions will be communicated in due time, however, please note that they will be in GMT+1 time zone. Recordings will be made available. These will follow mandatory forum contributions;
- Face-to-face simulations and group exercises: To reinforce theoretical knowledge and practical skills, face-to-face simulations and group exercises will be conducted. This hands-on approach enables participants to apply their learning in real-world scenarios, promoting collaborative learning and skills’ development;
- Mentorship: Mentorship by subject matter experts will be available to provide guidance, support, and personalized feedback throughout the training journey.
The assessment methods for measuring the achievement of learning objectives encompass a combination of knowledge assessments and practical evaluations:
- Quizzes: Following each self-paced module, participants will undertake a quiz to gauge their comprehension of the theoretical frameworks and content covered. These quizzes will contribute to assessing the understanding of key concepts and principles;
- Mandatory forum contribution following each online instructor-led sessions;
- Active participation to mentorship sessions;
Face-to-Face Simulations and Group Exercises: The practical application of learned concepts during face-to-face simulations and exercises will be evaluated using a structured evaluation framework. Participants' performance in these hands-on activities will be assessed based on predefined criteria, such as problem-solving ability, decision-making skills, and teamwork. The weights assigned to these evaluations will reflect their significance in demonstrating competency and skill mastery.
The grading matrix will allocate weights as follows:
Face-to-face
- Online self-paced and instructor-led courses 40%
- Active participation to mentorship sessions 20%
- Face-to-face simulations and group exercises 40%
Online
- Online self-paced and instructor-led courses 60%
- Active participation to mentorship sessions 40%
A total score higher than 70% is required to obtain the ITU Certificate.
Module 1: Introduction to International Cyber Policy
- Outline key concepts of cybersecurity from technical, political, and diplomatic perspectives
- Define the main concepts and definitions of cyber policy at national and international levels
- Describe key concepts and characteristics of cyber diplomacy
Module 2: Introduction to Cyber Diplomacy
- Identify cyber diplomacy and cybersecurity risks
- Explain the international framework on responsible state behavior
- Evaluate international, regional, multilateral, and multistakeholder processes (including the AHC and cybercrime discussions)
- Discuss cyber diplomacy in practice, including the role of cyber diplomats/ambassadors, digital foreign policy, and multistakeholder cooperation
Module 3: Developing National Cybersecurity Strategies
- Define key cybersecurity concepts and understand how cybersecurity operates at the national level
- Explain how to engage effectively with the Guide to Developing a National Cybersecurity Strategy
- List and describe the five phases of the National Cybersecurity Strategy lifecycle (Initiation; Stocktaking and Analysis; Production; Implementation; Monitoring and Evaluation)
- Discuss cross-cutting principles for developing a forward-looking and holistic strategy
- Explain relevant cybersecurity good practices and how they can be applied in the national context
Module 4: AI in Cyber Policy and International Governance
- Explore the intersection of artificial intelligence (AI) and cybersecurity
- Identify risks and opportunities presented by AI technologies in cyber policy
- Examine AI governance challenges in international and multistakeholder contexts
Module 5: Gender-Responsive Cyber Policymaking
- Define gender-responsive policymaking
- Apply a gender perspective in cybersecurity implementation
- Integrate gender considerations into National Cybersecurity Strategies
Module 6: Confidence-Building Measures in Cybersecurity
- Outline the concept of confidence-building measures (CBMs) in international security and cyber diplomacy
- Identify strategies and mechanisms used by states to build trust in cybersecurity
- Explain the relevance and practical implementation of the 16 OSCE-adopted CBMs
Module 7: Masterclass, Simulation & Study Visit (Onsite)
- Participate in an intensive 4-day onsite programme (masterclass, simulation, study visit, and joint exercise)
- Engage in a negotiation simulation of the OEWG / new permanent mechanism
- Take part in a cross-sectoral hands-on tabletop exercise (e.g. data protection, biometrics, AI)
- Attend expert masterclasses (including public speaking) and thematic presentations
- Join mentorship circles and peer exchange sessions
- Develop practical negotiation, chairing, and consensus-building skills
- Strengthen confidence and strategic influence as a delegate, negotiator, or chairperson









