Full catalogue of courses
CIR course will provide students with all necessary knowledge of cyber incident response activities, what are main goals and challenges, and explaining main roles and responsibilities in such important process. They will get most up to date trends in this area with an emphasis on most important details of each cyber incident response stage. Upon the successful completion of this course, students will be able take a part in development and implementation of cyber incident plan.
This web-based training gives a comprehensive overview on how to implement an information security management system (ISMS). With the completion of this training, learners will have a deep understanding of the benefits of an ISMS, and the knowledge on how to plan and implement an ISMS all by themselves. They will be able to integrate the ISMS in the management structure of a company or organization in connection with other management systems.
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000. The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies. Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
This online course will provide theoretical and practical knowledge of it and cyber security and security methods for computer, network and electronic communication. The course consists of various chapters and will cover fundamentals, such as IT versus ICS, threats and their sources, authentication, computer access control, cryptography, network security, network firewall concepts, intrusion detection. The student will get a comprehensive view on security in the cyber space.
Cybersecurity is a complex challenge that encompasses multiple different governance, policy, operational, technical and legal aspects. This training provides general knowledge to address, organise and prioritise many of these areas based on existing and well-recognised models, frameworks and other references. The training focuses on elements for protecting civilian aspects of cyberspace and as such, it covers the overarching principles and good practice that need to be considered in the process of drafting, developing and managing a National Cybersecurity Strategy.
The training aims to strengthen the capacity of countries to produce ICT indicators and statistics according to international standards and methodologies. It presents the main groups of telecommunication/ICT indicators collected and the different questionnaires as well as the definition and methodologies of the indicators following the ITU Handbook for the collection of administrative data on telecommunications/ICT. Examples provided address data gaps and challenges faced by countries and suggests possible solutions.
This course is aimed at providing guidance for developing table top simulation exercises which will help to test if NETPs and other national strategies for disaster preparedness and response are ready to be used when disasters strike.
The course is aimed at providing information on how to develop National Emergency Telecommunications Plans through a multi-stakeholder approach including all phases of disaster management.
This self-paced course aims to support national stakeholders in developing national Waste Electrical and Electronic Equipment (WEEE) policy and regulation. In addition to an introduction and overview, the course consists of the following four modules: 1) Waste Electrical and Electronic Equipment (WEEE), 2) Extended Producer Responsibility (EPR), 3) Financial Management, and 4) Government Stakeholder Groups and Interests.
This course is to raise awareness on the importance of the Tampere Convention, how to undertake the ratification process as well as the implementation at the national level.