Emerging cybersecurity threats and vulnerabilities management on digital infrastructures (2024)

Registration

Start Date:

End Date:

Event dates

Start Date:

End Date:

Location

World or Multi-Regional

Training topics

  • Cybersecurity

Training type

Online instructor led

Languages

  • English

Event mail contact

ituacademy@itu.int

Partners

  • DBI-Digital Bridge Institute

Tutors

  • Paulinus Okechukwu UGWOKE
  • Jedidiah Ogwumike
  • Chukwuemeka Ejiofor
  • Abubakar Abdulsalam

Coordinators

  • Paulinus Okechukwu UGWOKE
  • Ghazi Mabrouk

Course level

Intermediate

Description

This course aims to equip professionals with in-depth knowledge and practical skills to manage emerging threats and vulnerabilities in digital infrastructures. The curriculum explores governance and covers policy development, ethical standards and regulatory frameworks in cybersecurity to ensure organizations’ compliance with the latest threats, risk assessment methodologies, and security best practices. In addition, participants will also learn to create a risk management plan and learn about post-incident activities such as forensic investigations, recovery methods, incident response planning which by the end of the course, will prepare the participants to take part ina wide range of threat management and incident response activities as cybersecurity operators.

With the generous support of the Global Gateway initiative of the European Union, this course is offered for free for selected participants.

Target population

The training is aimed at the following professionals:

  • Policymakers and government officials
  • ICT professionals and senior managers
  • ICT/Telecommunications regulators

The maximum number of participants is limited to 40.

Entry requirements

Members of the above-mentioned target population are invited to apply for the training if they meet the following criteria:

  • Hold an undergraduate degree in a relevant field or have a minimum of three years of experience in cybersecurity-related topics.
  • Possess a fluent level of English.
  • Complete the application questionnaire available on the ITU Academy.
  • Government officials and policymakers from developing countries, particularly women, are encouraged to apply.
  • Selection will be conducted by the course organizers, who will consider the above entry requirements along with an analysis of the application questionnaire of each applicant.

Learning outcomes

Upon completion of this course, participants will be able to:

  • Outline the characteristics of the cybersecurity threats and vulnerabilities; and design a vulnerability management plan.
  • Describe threat intelligence, cyber threat hunting, and demonstrate the use of a threat intelligence platform
  • Discuss the key characteristics of the System, Infrastructure, and Software platform security and monitoring
  • Analyze future trends in security awareness
  • Explain the web application and social engineering security framework including the access control models
  • Describe the concept and applications of Risk Management and Compliance.

Methodology

The course will run for two weeks. The course delivery method involves the following:

  • Presentations and pre-recorded videos made available through the ITU Academy platform at the beginning of the course to facilitate self-study. Each week is based on two hours of lectures.
  • Weekly discussion Forums based on discussion topics and case studies, with instructor moderation and feedback.
  • Weekly live Q&A session via Zoom platform to answer any questions you may have about the material covered for the week and the assignments. One additional chat session might occur if needed.
  • Mandatory online quizzes at the end of each week.
  • Two case study submissions.

The live sessions will take place as per the below schedule:

  • Week 1 session: Friday, 15 November 2024 starting from 2 pm CET
  • Week 2 session: Friday, 22 November 2024 starting from 2 pm CET

Evaluation and grading

Participants are evaluated based on their contributions to the discussion forum and active participation in online sessions. Evaluation is structured as follows:

  • Two quizzes: 30% (15% each)
    • Quizzes consist of multiple-choice questions.
  • Individual assignment: 40%
    • Submission format templates are provided on the ITU Academy platform.
  • Two live sessions: 10%
  • Two discussion forums: 20%

To obtain the ITU course completion certificate, a total score of 70% or above is required.

Training course contents

Week 1

Session 1: Introduction to Cybersecurity and Threat Landscape
  • Learning Outcomes:
    • Explain digital infrastructure threats and vulnerabilities.
    • Identify threats and deception techniques.
    • Understand application and IP vulnerabilities.
    • Explain cybersecurity governance and compliance.
    • Understand security standards, policies, and regulations.
Session 2: Vulnerability Management
  • Learning Outcomes:
    • Explain the vulnerability management process.
    • List and explain popular vulnerability assessment tools.
    • Identify and classify vulnerabilities using CVSS.
    • Prioritize vulnerabilities with risk assessment models.
Session 3: Threat Intelligence and Cyber Threat Hunting
  • Learning Outcomes:
    • Explain threat intelligence services and information sources.
    • Describe threat data collection and analysis methods.
    • Demonstrate threat hunting techniques and behavioral analysis.
Session 4: Network Security and Monitoring
  • Learning Outcomes:
    • Explain network security architecture and components.
    • Demonstrate the use of Windows and Linux tools for network security.
    • Evaluate network traffic and implement access controls.
Session 5: Endpoint Security and Incident Response
  • Learning Outcomes:
    • Describe endpoint threats and protection solutions.
    • Define incident response stages and team roles.
    • Create a basic incident response plan.
    • Understand digital forensic techniques and incident analysis.

Week 2

Session 6: Cloud Security
  • Learning Outcomes:
    • Explain cloud security domains and mitigation techniques.
    • Secure cloud data and configure cloud security controls.
    • Utilize CASB tools for cloud infrastructure security.
Session 7: Web Application and Social Engineering Security
  • Learning Outcomes:
    • Explain web application vulnerabilities and OWASP Top 10.
    • Demonstrate secure coding practices and WAF configuration.
    • Understand social engineering attacks and tools.
Session 8: Identity and Access Management (IAM)
  • Learning Outcomes:
    • Describe IAM components and best practices.
    • Implement Multi-Factor Authentication (MFA) and SSO.
    • Understand the concepts and benefits of Identity Federation.
Session 9: Risk Management and Compliance
  • Learning Outcomes:
    • Explain risk management and compliance requirements.
    • Create a risk management plan.
    • Map security controls to compliance requirements.
Session 10: Security Awareness and Future Trends
  • Learning Outcomes:
    • Describe the importance of security awareness.
    • Create a security awareness program.
    • Understand future trends in cybersecurity, including AI and quantum computing.

Registration information

Document on registration information (English)

Unless specified otherwise, all ITU Academy training courses are open to all interested professionals, irrespective of their race, ethnicity, age, gender, religion, economic status and other diverse backgrounds. We strongly encourage registrations from female participants, and participants from developing countries. This includes least developed countries, small island developing states and landlocked developing countries.

Related documentation and links

Share in

Emerging cybersecurity threats and vulnerabilities management on digital infrastructures (2024)
Top Articles
Viking Range Model VGIC54828BPW | Appliance Helpers
Dr Seuss Star Bellied Sneetches Pdf
Ffxiv Act Plugin
Skyward Houston County
Satyaprem Ki Katha review: Kartik Aaryan, Kiara Advani shine in this pure love story on a sensitive subject
Here are all the MTV VMA winners, even the awards they announced during the ads
Craigslist Motorcycles Jacksonville Florida
P2P4U Net Soccer
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
Elden Ring Dex/Int Build
Swimgs Yung Wong Travels Sophie Koch Hits 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Springs Cow Dog Pig Hollywood Studios Beach House Flying Fun Hot Air Balloons, Riding Lessons And Bikes Pack Both Up Away The Alpha Baa Baa Twinkle
Ncaaf Reference
Anki Fsrs
Hoe kom ik bij mijn medische gegevens van de huisarts? - HKN Huisartsen
Colorado mayor, police respond to Trump's claims that Venezuelan gang is 'taking over'
Jenn Pellegrino Photos
Blackwolf Run Pro Shop
Popular Chinese Restaurant in Rome Closing After 37 Years
Who is Jenny Popach? Everything to Know About The Girl Who Allegedly Broke Into the Hype House With Her Mom
All Obituaries | Verkuilen-Van Deurzen Family Funeral Home | Little Chute WI funeral home and cremation
Regal Amc Near Me
Milwaukee Nickname Crossword Clue
Jesus Calling Feb 13
100 Gorgeous Princess Names: With Inspiring Meanings
Kristy Ann Spillane
031515 828
Imagetrend Elite Delaware
Parent Management Training (PMT) Worksheet | HappierTHERAPY
2430 Research Parkway
Melissa N. Comics
Sun-Tattler from Hollywood, Florida
Covalen hiring Ai Annotator - Dutch , Finnish, Japanese , Polish , Swedish in Dublin, County Dublin, Ireland | LinkedIn
Marie Peppers Chronic Care Management
House Of Budz Michigan
Telugu Moviez Wap Org
Infinite Campus Parent Portal Hall County
Mid America Irish Dance Voy
Registrar Lls
Weekly Math Review Q2 7 Answer Key
Busted Newspaper Mcpherson Kansas
Grizzly Expiration Date Chart 2023
How to Install JDownloader 2 on Your Synology NAS
Pickwick Electric Power Outage
The Bold and the Beautiful
Egg Inc Wiki
Google Flights Missoula
Tìm x , y , z :a, \(\frac{x+z+1}{x}=\frac{z+x+2}{y}=\frac{x+y-3}{z}=\)\(\frac{1}{x+y+z}\)b, 10x = 6y và \(2x^2\)\(-\) \(...
Gummy Bear Hoco Proposal
Nkey rollover - Hitta bästa priset på Prisjakt
라이키 유출
All Obituaries | Roberts Funeral Home | Logan OH funeral home and cremation
Primary Care in Nashville & Southern KY | Tristar Medical Group
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 5809

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.