Full catalogue of courses
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000. The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies. Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
By the end of the course, participants should be able to: - To understand cybersecurity key elements (C.I.A). - To understand the dangerous actors that pose cyber threats in cyberspace. - To understanding the concept of threat, vulnerability, and risks related to cybersecurity. - To gain a hands-on experience skill how to defence for cyber-attacks
Conocer y familiarizarse con los elementos involucrados en una investigación forense en informática. Explorar técnicas de colección, preservación, análisis y presentación de la evidencia digital.
The course is aimed at providing information on how to develop National Cyber Emergency Response Plans through a multi-stakeholder approach including all phases of disaster management.
By invitation only! Cybersecurity is a complex challenge that encompasses multiple different governance, policy, operational, technical and legal aspects. This training provides general knowledge to address, organise and prioritise many of these areas based on existing and well-recognised models, frameworks and other references. The training focuses on elements for protecting civilian aspects of cyberspace and as such, it covers the overarching principles and good practice that need to be considered in the process of drafting, developing and managing a National Cybersecurity Strategy.
This online course will provide theoretical and practical knowledge of IT and cyber security and security methods for computer, network and electronic communication.
The course consists of various chapters and will cover fundamentals, such as IT versus ICS, threats and their sources, authentication, computer access control, cryptography, network security, network firewall concepts, intrusion detection.
The student will get a comprehensive view on security in the cyber space.
The CIR course will provide students with all necessary knowledge of cyber incident response activities, what are main goals and challenges, and explaining main roles and responsibilities in such important process.
They will get most up to date trends in this area with an emphasis on most important details of each cyber incident response stage.
Upon the successful completion of this course, students will be able take a part in development and implementation of cyber incident plan.
This online course will provide an introduction into ISO 27000 standard information security series as well as advanced theoretical knowledge and practical examples of development, integration as well as operation of ISMS according to ISO 27001 international standard. Students will learn about information security-related processes like risk management, areas of standard application and necessary controls along with annex A to ISO 27001, which is compliance-related.