Full catalogue of courses
The main objective of this training course is to allow participants to acquire sufficient knowledge on how to empower an incident reponse team for effective incident resolution and mitigate the impact of security threats within their organizations. Other objectives include:
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
Ransomware is major techniques that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware. By the end of this training, participants should be able to have: â¢ Knowledge of Ransomware definition and objective.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
Analizar el proceso de gestión de incidencias en escenarios de fallas de seguridad y profundizar en el proceso de automatización para determinar las acciones de cada caso.
Child Online Protection (COP) is a growing concern of the world today as children are at risk of violence, abuse, exploitation, and neglect online. It has never been more important to positively guide young people to shape their digital practices. In an increasingly tech-driven world, young people find it challenging to distinguish between their online and offline worlds. The course is a continuation of the ITU Academy course : Child Online Protection for Academic and Non-Academic Staff (Introductory Course).
Child Online Protection (COP) is a growing concern of the world today as children are at risk of violence, abuse, exploitation, and neglect online. It has never been more important to guide young people to shape their digital practices positively. In an increasingly tech-driven world, young people find it challenging to make the distinction between their online and offline worlds. This self-paced course is designed for the professionals in the education sector and is not limited to educators, youth workers, teachers, staff, leaders, mentors, coaches etc.
Child Online Protection (COP) is a growing concern today as children are at risk of violence, abuse, exploitation, and neglect online. Engaging parents in online safety has never been more important as parents and guardians must understand the exact nature of children's online engagements and their child’s understanding of the dangers and the likelihood that the parent can reduce risks and safeguard their children.
Child Online Protection (COP) is a growing concern as children are at risk of violence, abuse, exploitation, and neglect online. Engaging parents in online safety has never been more important since parents and guardians must understand the exact nature of child online engagements. This self-paced course is designed for parents and guardians about child online behaviours, threats and risks associated with cyberspace, and help them build an open conversation about cyber safety in the family setting.
The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field that focuses on the protection of information assets that are embedded in internetworked information systems. Given today's technological advances, professionals who are involved in information technologies must be knowledgeable about the central concepts and security implications that frame and define this increasingly all-pervasive field. After completing this course, attendees will be able to: â¢ Identify key concepts and terminology in cybersecurity ?