Full catalogue of courses
Pagination
Comprender el funcionamiento de los protocolos de red bajo un enfoque de seguridad. Explorar sistemas de detección y análisis de incidentes que se puedan suscitar en una red de datos.
Cybersecurity is a complex challenge that encompasses multiple different governance, policy, operational, technical and legal aspects. This training provides general knowledge to address, organise and prioritise many of these areas based on existing and well-recognised models, frameworks and other references.
The training focuses on elements for protecting civilian aspects of cyberspace and as such, it covers the overarching principles and good practice that need to be considered in the process of drafting, developing and managing a National Cybersecurity Strategy.
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
Cet atelier permet aux participants de développer les compétences pour maitriser les éléments de base du management du risque liés à tous les actifs pertinents de la sécurité de l'information en utilisant la norme ISO/IEC 27005 comme cadre de référence. Grâce aux exercices pratiques et aux études de cas, le participant pourra acquérir les connaissances et les compétences pour réaliser une appréciation optimale du risque de la sécurité de l'information et pour gérer les risques à temps en prenant connaissance de leur cycle de vie.
CIR course will provide students with all necessary knowledge of cyber incident response activities, what are main goals and challenges, and explaining main roles and responsibilities in such important process. They will get most up to date trends in this area with an emphasis on most important details of each cyber incident response stage. Upon the successful completion of this course, students will be able take a part in development and implementation of cyber incident plan.
This web-based training gives a comprehensive overview on how to implement an information security management system (ISMS). With the completion of this training, learners will have a deep understanding of the benefits of an ISMS, and the knowledge on how to plan and implement an ISMS all by themselves. They will be able to integrate the ISMS in the management structure of a company or organization in connection with other management systems.
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000. The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies. Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
This online course will provide theoretical and practical knowledge of it and cyber security and security methods for computer, network and electronic communication. The course consists of various chapters and will cover fundamentals, such as IT versus ICS, threats and their sources, authentication, computer access control, cryptography, network security, network firewall concepts, intrusion detection. The student will get a comprehensive view on security in the cyber space.
Cybersecurity is a complex challenge that encompasses multiple different governance, policy, operational, technical and legal aspects. This training provides general knowledge to address, organise and prioritise many of these areas based on existing and well-recognised models, frameworks and other references. The training focuses on elements for protecting civilian aspects of cyberspace and as such, it covers the overarching principles and good practice that need to be considered in the process of drafting, developing and managing a National Cybersecurity Strategy.
La cybersécurité représente un défi complexe qui englobe plusieurs aspects différents, liés à la gouvernance, à la politique, à l'exploitation, à la technique et au juridique. La présente formation permet d'acquérir des connaissances générales pour aborder, organiser et hiérarchiser nombre de ces domaines selon des modèles, des cadres et d'autres références existants et bien établis.