Education & Training

Building competencies and skills

Upcoming education and training activities

Attend Meeting here

Description

The course introduces threats and challenges/concerns arising from the human behaviour and decision making regarding technology use. In lectures we are focusing on raising the ability to assess and cope with cyber scams/threats (eg. social manipulation), on research skills to conduct studies in the field and to create and implement study materials, training programs and tools based on them in order to increase level of cyber hygiene in users and companies.

Access


free

Attend Meeting here

Description

The course introduces threats and challenges/concerns arising from the human behaviour and decision making regarding technology use. In lectures we are focusing on raising the ability to assess and cope with cyber scams/threats (eg. social manipulation), on research skills to conduct studies in the field and to create and implement study materials, training programs and tools based on them in order to increase level of cyber hygiene in users and companies.

Access


free

Visit Website

Description

The CyberSecPro Winter School is an intensive, practical course created to help intermediate users advance their cybersecurity skills. This one-week training in Monte da Caparic, Lisbon, Portugal, offers a unique, lab-focused experience to improve your skill set in today’s most important areas of cybersecurity. It dives deeply on actual cybersecurity tools and procedures.

Participants will train topics such as malware analysis, intrusion detection, system hardening, vulnerability scanning, security information and event management (SIEM) over the course of five days. Two concentrated sessions with lengthy laboratories are included each day, enabling participants to apply theory in real-world settings with state-of-the-art tools. The final day is a full-day hackathon, where the participants will be able to apply their acquired knowledge in realistic scenarios, building problem-solving skills.

Guided by academy and industry experts, this program provides intensive hands-on experience, with a virtual machine environment provided for each attendee. The Winter School will also provide networking events and evening activities for social connection and knowledge sharing among trainees and instructors. Ideal for cybersecurity students, professionals, and enthusiasts, the CyberSecPro Winter School prepares you for the current cybersecurity challenges and advances in the field.

CSP – CyberSecPro is an innovative platform aimed at revolutionizing professional development in the cybersecurity industry. It serves as a comprehensive learning and collaboration environment to deliver specialized training modules, resources, and networking opportunities for cybersecurity professionals and aspiring learners.

The project’s primary focus is to address the growing demand for skilled cybersecurity professionals by providing a centralized hub where individuals can access cutting-edge training content, engage in hands-on learning experiences, and connect with industry experts and peers. CyberSecPro offers a diverse range of functionalities, including user-friendly account management, seamless institution creation, and robust administrative tools tailored for trainers, trainees, and institutions.

Key features of CyberSecPro include personalized learning paths, secure content delivery, and comprehensive reporting and analytics to track learner progress and assess skill development. The platform emphasizes accessibility, security, and scalability to accommodate various learning styles and organizational needs within the cybersecurity domain.

Access


limited

Past education and training activities



Description

Exciting Learning Opportunity Announcement!


We are thrilled to announce the launch of our new online seminar (2h): CSP003_S_E: Cybersecurity Risk Assessment and Management for Energy Sector (Edition 2), as part of CyberSecPro EU project. Scheduled November 22nd at 12:00pm (CET), this seminar is designed to empower professionals with critical skills in protecting energy control systems.


What You Will Learn:



  • Topic 1: Threats and Vulnerabilities for Energy Sector

  • Topic 2: Common Security Weaknesses and Attacks in Energy Control Networks


Why Enroll?


The seminar will cover a critical topic in the energy sector, which will promote your knowledge and skills in protecting energy control systems. That will include the following:



  • Knowledge of risk management and its assessment for specific critical sectors such as energy and its operational systems

  • Knowledge of phases and principles for an effective risk management methodology

  • Knowledge of cyber threats, taxonomies and vulnerabilities repositories

  • Knowledge of technical and organisational controls that appropriately mitigate cybersecurity risks in the energy sector and its operational systems

  • Identify and know to apply an appropriate methodology for information security risk management and risk assessment according to the specific characteristics of the energy scenario


The training module will be presented by:



  • Dr. Artsiom Yautsiukhin, Consiglio Nazionale delle Ricerche (CNR), Italy (artsiom.yautsiukhin@iit.cnr.it),

  • Associate Professor Cristina Alcaraz, University of Malaga, Spain (alcaraz@uma.es), and

  • Full Professor Javier Lopez, University of Malaga, Spain (javierlopez@uma.es)


Save the date and we are looking forward to seeing you in the module!
Enroll now and secure your place: right here!


See you there!



Access


free

YouTube video






Description

This course introduces the numerous concepts, policy frameworks and company procedures as well as best practices, guidelines, risk management approaches, vis a vis affected digital (OT and IT) systems of shipping companies. The module will enable tomorrow’s junior maritime professionals, shipping managers and maritime information systems specialists to safeguard fleets, vessel systems and shipping business information systems ashore. The module aims at raising awareness and fostering hard and soft skill development for maritime employees, on cybersecurity best practices to foster a security-conscious business culture.

Access


free



Description

This course covers key concepts, policy frameworks, company procedures, and best practices for managing risk in the digital (OT and IT) systems of shipping companies. It equips junior maritime professionals, shipping managers, and maritime information systems specialists with the necessary skills to protect fleets, vessel systems, and shipping business information systems ashore. The module aims to raise awareness and foster both hard and soft skills among maritime employees, with a focus on cybersecurity best practices and promoting a security-conscious business culture.

Access


free



Educational Event Image

Description

This course introduces the numerous concepts, policy frameworks and company procedures as well as best practices, guidelines, risk management approaches, vis a vis affected digital (OT and IT) systems of shipping companies. The module will enable tomorrow’s junior maritime professionals, shipping managers and maritime information systems specialists to safeguard fleets, vessel systems and shipping business information systems ashore. The module aims at raising awareness and fostering hard and soft skill development for maritime employees, on cybersecurity best practices to foster a security-conscious business culture.

Access


free



Description

This course covers key concepts, policy frameworks, company procedures, and best practices for managing risk in the digital (OT and IT) systems of shipping companies. It equips junior maritime professionals, shipping managers, and maritime information systems specialists with the necessary skills to protect fleets, vessel systems, and shipping business information systems ashore. The module aims to raise awareness and foster both hard and soft skills among maritime employees, with a focus on cybersecurity best practices and promoting a security-conscious business culture.

Access


free



Description

(part of CSP001_S_M Maritime Cybersecurity Certification Seminar)

This training provides a foundational understanding of maritime cybersecurity essentials and management principles, equipping participants with the knowledge and skills to manage information and cybersecurity in the maritime sector.

Access


free



Educational Event Image

Description

The Cybersecurity Hands-On-Training (CyberHOT) Summer School will take place on Monday 9th and Tuesday 10th of September 2024 under the auspices of University of Piraeus, Cybersecurity Research Lab (UPRC). If you are an ICT practitioner or a technical manager that works in the maritime, health or energy sectors looking to get hand-on with cybersecurity offensive practices this is the event for you.

What is CyberHOT?

The CyberHOT training program brings worldwide experts to raise the technical capabilities in various areas of CyberSecurity including ethical hacking, risk management, incident handling and sector specific cybersecurity practical issues in the areas of maritime, health and energy. It will enable the participants to implement various red-teaming methodologies and tools. Utilizing dedicated labs a wide range of penetration testing scenarios will be showcased. The aim is to raise the skills of the workforce to meet current and future cyber incidents and challenges. Each training module will include introductory concepts and practices to enhance your cybersecurity capabilities; will cover popular risk assessment/red-teaming/penetration testing tools, secure software development tools along with basic steps followed in risk management penetration testing methodologies. The trainees will be introduced among other tools to the Dedicated labs of the Hack the Box platform.

Organizers

Security Research Lab, University of Piraeus, Greece
Focal Point sprl, Waterloo, Belgium
Microprocessor and Hardware Lab, Technical University of Crete, Greece
trustilio, Amsterdam, Netherlands

Under the auspices of University of Piraeus, Cybersecurity Research Lab (UPRC)

Who should attend

→ System/network administrators
→ Technical cyber security staff
→ Ethical hackers
→ Penetration testers
→ Software developers
→ Students in cybersecurity

Background Knowledge

Nice to have
→ Linux & Bash
→ Networking
→ Kali Linux
     → Nmap
     → Sqlmap
     → Hydra
     → BurpSuite
     → Owasp-zap
     → Metasploit

Required Equipment

Bring your own laptops as you will not be able to participate in the hands-on training without one. You only need your browser to connect and participate in the exercise!

Upon registration

→ You will receive updated information, references, handouts and notes on the usage of the tools.
→ You will receive detailed instruction on how to configure usable tools for practical cybersecurity.
→ You can join a chat channel with our experts and get “CyberHOT-Line” support.

This session begins with an introduction of popular red-teaming/penetration testing tools, the basic steps of penetration testing are also covered to prepare the participants for the next phase of this session.

Having introduced a general methodology to penetration testing and the tools to apply it, the participants will be introduced to the Battlegrounds module of the Hack the Box platform which will host a CTF event. In this CTF a series of virtual machines will be introduced by the Focal Point’s Red Team to the attendees of the CyberHOT event, then the attendees will be given time to work on each challenge and finally a short solution will be presented to conclude each section.

The CyberHOT Summer school sessions aims for the participants

→ To be able to implement enumeration on web services.
→ To be able to research existing vulnerabilities of known components.
→ To be able to exploit existing vulnerabilities utilising metasploit and other public exploits.
→ To be able to implement privilege elevation on compromised targets.

Red Team’s Experience

→ Penetration Testers / Ethical hackers with over 15 years experience
→ Leading Red/Blue Teams in International Organisations
→ Many years of experience in NATO Cyber Defence and in Best Practices, Tactics & Techniques

Access


limited

Access details


Early registration €135 Until August 20th 2024.
Late registration €185 - After August 20th, 2024.
A cancellation fee of €50 applies. No cancellation will be allowed after August 20th , 2024.

Coffee breaks, lunch and daily transportation during course to/from NMIOTC are included with the registration.
If you cannot attend you may transfer the registration to another person.
The organizers reserve the right to cancel CyberHOT if there are fewer than 20 registrations, in which case there will be a full refund of solely the registration fee.

Registrations are handle by CCBS GREECE P.C. by following the registration link. You can find instructions here. For questions or queries please contact conference@ccbsgreece.gr

YouTube video






Description

The ECCO Community Group on Human Factors, in support of the ECCC, is excited to announce a new webinar focused on threat modelling and analyses using methods such as LINDDUN PRO.

Privacy threat modelling is crucial for implementing software according to privacy by design principles. Our discussion will cover the comprehensive LINDDUN PRO method and introduce LINDDUN GO, a streamlined version designed to make privacy threat modelling more accessible.

Featured Speaker: Jonah B., doctoral researcher at DistriNet Research Unit @KU Leuven, will share his insights on privacy engineering in software development. As a key developer of the LINDDUN framework, Jonah brings a wealth of knowledge on integrating software engineering methods with regulatory requirements.

Don't miss this opportunity to deepen your understanding of threat modelling and LINDDUN PRO.

In the upcoming webinar on "LINDDUN GO, Lightweight & Gamified Privacy Threat Modelling", we will explore the role that privacy threat modelling plays an important role in the implementation of software according to the principle of privacy by design. However, performing an exhaustive and thorough analysis using methods such as LINDDUN PRO (per-interaction) is a time- and resource-intensive endeavour. To meet increasing demand from practitioners for more accessible methods with a lower barrier to entry, LINDDUN GO was developed. This lightweight ‘flavour’ of LINDDUN strives to draw a wider audience into privacy threat modelling by distilling the framework into a narrowed down set of concrete threats and representing the information with a deck of custom-made playing cards. The cards can be used to ‘play’ through a threat modelling session according to a set of rules, or simply serve as inspiration for the threat modeler.

Access


free

Access details


The webinar is free and open to all! We look forward to seeing you there!



Educational Event Image

Description

IPICS: Intensive Programme on Information and Communication Security



A Practical Cybersecurity and Emergent Technologies Continuum Training Event

Summer School • Hackathons • Workshops • Realistic Cyber Range Exercises



Co-organized by:


  • CyberSecPro

  • CybAlliance: International Alliance for Strengthening Cybersecurity and Privacy in Healthcare



IPICSIntensive Programme on Information and Communication Security is a comprehensive educational initiative designed to equip participants with specialized skills and knowledge in the field of cybersecurity. These programs are structured as intensive, immersive experiences aimed at rapidly building expertise in cybersecurity concepts and practices. IPICS programs cater to individuals seeking to enter the cybersecurity industry or professionals looking to enhance their existing skills.

The curriculum of an IPICS program covers a wide range of topics essential to cybersecurity, including network security, ethical hacking, malware analysis, cryptography, risk assessment, incident response, and secure coding practices. Participants engage in hands-on learning activities such as simulated cyberattacks, threat detection exercises, and security tool utilization. These practical experiences are crucial for developing the ability to identify and mitigate cybersecurity threats effectively.

IPICS programs often feature industry-relevant certifications and endorsements to validate participants' skills and enhance their employability in the cybersecurity job market. Additionally, networking opportunities with cybersecurity professionals and access to cutting-edge technologies further enrich the learning experience.

Are you looking to break into the cybersecurity industry, or are you already in the field but want to advance your skills? The IPICS 2024 Summer School, co-organized by CybersecPro and CybAlliance, is designed to cater to individuals across the spectrum of cybersecurity expertise.

Aspiring Cybersecurity Professionals: If you’re new to cybersecurity and eager to embark on this career path, IPICS provides foundational knowledge and hands-on experience. It accelerates your learning curve, equipping you with essential skills needed to enter the industry confidently.

Mid-Level Cybersecurity Practitioners: For professionals with some experience in cybersecurity, the program offers advanced modules to deepen your understanding of specific areas, such as ethical hacking, incident response, or malware analysis, enhancing your expertise

IT Professionals Transitioning to Cybersecurity: If you have a background in IT and are looking to pivot to cybersecurity, IPICS offers the specialized training you need to adapt your existing skills to the security domain, making you a valuable asset in this field.

Business and Security Leaders: Managers, directors, and executives responsible for their organization’s cybersecurity strategy can gain a comprehensive understanding of the latest trends, risks, and best practices. This helps them make informed decisions to secure their organization.

Government and Military Personnel: Those in government agencies or the military tasked with cybersecurity responsibilities will benefit from the program’s practical, up-to-date content, which is aligned with current threats and regulatory requirements.

Whether you’re starting your journey in cybersecurity or are a seasoned professional looking to enhance your skill set, IPICS is structured to provide the knowledge, experience, and credentials that will propel you forward in this dynamic field.

The conference will be held at the 7.000m2 modern building of the Polytechnic Institute of Management and Technology (ISLA) in Vila Nova de Gaia in Northern Portugal, where the famous Port wine cellars are located across from Porto city. Hence the Institute is located in the same infrastructure as the **Gaia Residence, at the **Gaia Residence, and all participants can access the conference via internal access.

The venue’s location, with its stunning views and proximity to the heart of Porto, offers participants the ideal balance between rigorous education and the opportunity to unwind and explore after a productive day of learning.

Access


limited

Access details


**JULY 1st – JULY 6th

**REGISTRATION FEE: 550€/pax




  • Six day summer school lunches

  • Social event and corresponding dinner

  • Hotel room (double occupancy with breakfast) between June 30th and July 7th

  • Official Certification of presence provided



**JULY 8th – JULY 13th

**REGISTRATION FEE: 550€/pax




  • Six day summer school lunches

  • Social event and corresponding dinner

  • Hotel room (double occupancy with breakfast) between July 7th and July 14th

  • Official Certification of presence provided



**JULY 1st – JULY 13th

**REGISTRATION FEE: 1000€/pax




  • Twelve day summer school lunches

  • Two Social events and corresponding dinners

  • Hotel room (double occupancy with breakfast) between June 30th and July 14th

  • Official Certification of presence provided

  • 4 ECTS awarded upon successful completion of the program (including the two day long Hackathons)





Educational Event Image

Description

"An Overview of Cybersecurity in the Energy Sector" provides a brief overview of the issues and measures being addressed in the energy sector CPS001_C_E , which is focused on the "Cybersecurity Essential and Management for Energy Sector". Indeed, CPS001_C_E is designed to equip trainees and professionals with the knowledge and skills needed to defend against evolving cyber threats critical energy industry. Specifically tailored for the energy sector, this module goes beyond generic cybersecurity training to address the unique challenges and vulnerabilities faced by energy providers. For that reason, participants of the module gained during the sessions a clear understanding of the cyber landscape targeting energy infrastructure, including industry-specific threats targeted to SCADA systems, smart grids, and other critical energy assets. Likewise, generic and energy-specific security measures were presented to provide an overview of security opportunities.

Access


limited

Access details


Additional Information in "Implemented CSP Modules".



Educational Event Image

Description

This comprehensive training module is specifically designed for higher education students, energy sector professionals, cybersecurity aspirants and managers and decision-makers.

Access


free

Access details


Registration Now Open
Seats are limited! Register now to secure your spot in the "CyberSecPro Professional Training Module 01: Cybersecurity Essentials and Management for the Energy Sector"

Visit our website for more information and registration details.
Don't wait – safeguard your energy assets and empower your career with this essential cybersecurity training!
This training is mapped with 5 ECTS equivalent.


How to register (PDF)



YouTube video






Description

A success, in terms of preparation, organisation, preparedness and results reached.

Access


free

Access details


Via DCM platform

YouTube video






Educational Event Image

Description

The CyberSecPro Summer School aims to provide hands-on cybersecurity learning activities to stakeholders and experts in the Health, Maritime and Energy domains. This Summer School is a three-day immersion into cybersecurity, engaging non-experts in cybersecurity topics, such as its importance in the Digital Age, the foundational and technical aspects of both threats and security methods and the specific solutions available for the three major domains addressed by the CyberSecPro project: Health, Maritime and Energy.

The first day will be dedicated to a more generic hands-on workshop, although never straying away from the three main domains, while the second day will have parallel tracks for each of the domains. The third day will hold a full hands-on Hackathon specifically catered for Health, Maritime and Energy stakeholders and experts that do not possess specific expertise in cybersecurity.

HEALTH
Explore the critical nexus of healthcare and cybersecurity. In an era where technological advancements redefine patient care, our program delves into safeguarding healthcare systems from evolving cyber threats. Participants will gain insights into health-specific challenges, strategies for cyber resilience, patient data protection and secure integration of emerging technologies.

MARITIME
Embark on a transformative journey into the cybersecurity challenges of the maritime sector. As vessels become more digitally integrated, the need for robust cybersecurity measures is paramount. Our program focuses on understanding and mitigating maritime-specific cyber threats, building resilience at sea, securing navigation systems, and ensuring compliance with industry regulations.

ENERGY
Delve into safeguarding critical energy infrastructure from evolving cyber threats. In an era of digital transformation, the energy sector faces unprecedented challenges, making robust cybersecurity measures essential. Our program explores the unique cyber threats specific to the energy industry, strategies for building resilience in energy systems, and the secure integration of advanced technologies.

Access


limited

Access details


Pricing (for Students)
The CyberSecPro Summer School has several pricing options FOR STUDENTS, with combo registration prices for the Madeira Digital Transformation Week

YouTube video






Educational Event Image

Description

This lecture provides an overview of cybersecurity challenges associated with electric vehicle (EV) charging infrastructures. It introduces a generic taxonomy of threats affecting these systems and delves into common cybersecurity risks specific to EV charging applications. Our discussion also extends to various types of attacks, including those targeting charging stations (CS), users, and the power grid itself. To address these vulnerabilities, we explore a range of mitigating countermeasures designed to reduce cyber risks. Additionally, the lecture concludes with the essentials of utilizing best practices and approaches such as the threat modelling and implementing security standards for identifying potential cyber threats and mitigating cyber risks. The threat modeling approach is discussed to demonstrate how it can assist security experts in thoroughly investigating cyber attacks and identifying any existing security vulnerabilities that attacks could exploit. The ThreatGet tool is also examined to show how it can be integrated into this process and provide a clear investigation for estimating any potential attack paths targeting critical system components. An overview of the IEC 62443 security standard is provided to demonstrate how security standards can enhance the overall cybersecurity posture of systems by offering a comprehensive framework for addressing existing and emerging security challenges.

Access


limited



Description

"Introduction to the Cybersecurity in Electric Charging Stations" provides a brief overview of the main issues being addressed in the energy field, and particularly in the area of Electric Charging Stations. This module belongs to the CPS008_S_E CSP module , which is focused on the "Protecting Charging Stations Against Specific Threats". Indeed, CPS008_S_E is designed to equip IT/OT engineers, students, administrators and professionals in the energy sector, including human operators, managers and directives, energy suppliers and employees, to discover specific threats in the application domain. Specifically, this module provides an overview of application scenario together with its main security issues and challenges, both at the communications and software level.

Access


limited



Description

"Introduction to cybersecurity in the energy sector and its critical infrastructure" provides a brief overview of the main issues and measures being addressed in the energy sector CPS001_C_E , which is focused on the "Cybersecurity Essential and Management for Energy Sector". Indeed, CPS001_C_E is designed to equip trainees and professionals with the knowledge and skills needed to defend against evolving cyber threats critical energy industry. Specifically tailored for the energy sector, this module goes beyond generic cybersecurity training to address the unique challenges and vulnerabilities faced by energy providers. For that reason, participants of the module gained during the sessions a clear understanding of the cyber landscape targeting energy infrastructure, including industry-specific threats targeted to SCADA systems, smart grids, and other critical energy assets. Likewise, generic and energy-specific security measures were presented to provide an overview of security opportunities.

Access


limited



Description

This lecture delves into details related to web security and its associated protocols. It provides an overview of the IP and TCP protocols and explains how TCP/IP works. The discussion then highlights the importance of TCP/IP and explores the structure of this protocol. The lecture also addresses issues related to internet security and provides examples of the most common types of cyberattacks in the energy sector, including a list of large-scale cyberattacks on critical infrastructure facilities within this sector.

Further, the lecture delves into more details about IP security, SSL, and TLS, including information about their structure and functionality. It includes a practical example of the importance of integrating TLS with HTTP to ensure secure data transmission. Additionally, a practical example of eavesdropping attacks on a virtual network simulating the energy sector was conducted, demonstrating how a tool such as Wireshark can be used to capture insecure data transmitted over Modbus TCP between a client and a server. Finally, the lecture discusses how TLS and SSL are essential for securing data transmission over the Internet of Things (IoT) related to the energy sector.

Access


limited



Description

This lecture provides an overview of cryptography and its history. It discusses the main features of cryptography and its various types. It also includes a description of cryptanalysis and brute-force attacks, then delves into the differences between symmetric and asymmetric encryption techniques. Some selected symmetric techniques included are:
- Substitution techniques such as the Caesar cipher
- Monoalphabetic techniques such as Monoalphabetic Cipher Security
- Transposition Ciphers, including the Rail Fence Cipher and Row Transposition Ciphers

The block cipher discussion includes Claude Shannon's work and Substitution-Permutation Ciphers. The DES algorithm is discussed as an example of a block symmetric technique, along with Triple DES (3DES).

Additionally, the lecture covers asymmetric encryption, outlining the differences from symmetric encryption. The RSA algorithm is presented as an example of this technique; furthermore, digital signatures are briefly discussed to illustrate how asymmetric cipher techniques can be applied in various contexts.



Access


limited



Description

The module aims to provide today’s maritime students and future maritime professionals with the updated knowledge of cyber-security technology and risk management essentials, pertinent for the maritime domain, both at the individual and organisational levels, affecting strategic and operational levels of a shipping company.
This course introduces the numerous concepts, regulatory frameworks and cybersecurity solutions, as well as guidelines, recommendations, best practices and risk management approaches, vis a vis affected digital (OT and IT) systems of shipping companies. The module will enable tomorrow’s junior maritime professionals, shipping managers and maritime information systems specialists to safeguard fleets, vessel systems and shipping business information systems ashore. The module aims at raising awareness and fostering hard and soft skill development for maritime employees, on cybersecurity best practices and henceforth foster a security-conscious business culture.

Access


free



Educational Event Image

Description

The module aims to provide today’s maritime students and future maritime professionals with the updated knowledge of cyber-security technology and risk management essentials, pertinent for the maritime domain, both at the individual and organisational levels, affecting strategic and operational levels of a shipping company.
This course introduces the numerous concepts, regulatory frameworks and cybersecurity solutions, as well as guidelines, recommendations, best practices and risk management approaches, vis a vis affected digital (OT and IT) systems of shipping companies. The module will enable tomorrow’s junior maritime professionals, shipping managers and maritime information systems specialists to safeguard fleets, vessel systems and shipping business information systems ashore. The module aims at raising awareness and fostering hard and soft skill development for maritime employees, on cybersecurity best practices and henceforth foster a security-conscious business culture.

Access


free



Description

The IEEE Global Engineering Education Conference (EDUCON) is a premier event organized by the IEEE Education Society in the IEEE Region 8 (Europe, Middle East, and Africa). It is a flagship conference that brings together experts, academicians, technicians, and scholars from global universities and industries to present contemporary research projects and discuss the latest developments in engineering education. The conference is scheduled to take place from 8th to 11th May, 2024, in Kos Island, Greece. Prospective workshop and tutorial organizers are invited to submit proposals for inclusion in the regular program, which should push the frontiers in both classic, contemporary, and emerging topics of interest in the engineering education community.

Access


limited

Access details


https://2024.ieee-educon.org/registration



Educational Event Image

Description

Cybersecurity is key to the safety of ports – how can ports strengthen the essential skills and knowledge to protect themselves from cyber harm?
The regional cybersecurity training organised by EU-funded projects CRIMSON, EnMAR - Enhanced Maritime Action in the Gulf of Guinea, and EU CyberNet, in collaboration with the Port Management Association of West and Central Africa (PMAWCA), will aim to build capacity in the ports in the Gulf of Guinea and facilitate the exchange of best practices among port cybersecurity managers.

The regional training will cover topics such as the cybersecurity landscape, standards, legislation, and hands-on exercises for threat identification and defence tactics, enabling the creation of customized cybersecurity strategies tailored to the needs of different ports.

The trainings were provided by experts, including Christophe Van Maele, Professor Nineta Polemi, Dimitris Koutras and Markus Münzer

https://www.linkedin.com/company/enmar-enhanced-maritime-action-in-the-gulf-of-guinea/
https://www.linkedin.com/company/eucybernet/
https://www.linkedin.com/company/port-management-association-of-west-and-central-africa-pmawca/
https://www.linkedin.com/in/ACoAAAHv9M4B3csb8DMA42FP3IhYr69bQZbM9As
https://www.linkedin.com/in/ACoAAA_Uqg8B3flceDZvLDzA2gOvLnB-652CYYA

Access


limited



Educational Event Image

Description

Training session on the 'Human Factors and Cybersecurity' course from trustilio BV (trainer: Dr Kitty Kioskli) which will take place at UPRC. These sessions will be conducted in collaboration with TALTECH and Ricardo Gregorio Lugo.

Very often in the literature we read about humans being the weakest link in the cybersecurity supply chain while more than frequently it is explained that besides technical efforts the main vulnerability in an organization is the person itself. This is because peoples’ decision-making processes, attitudes, beliefs, and behaviours remain to be deciphered by cybersecurity professionals. Studies on human and behavioural factors in cybersecurity are scarce and the existing ones insist that data security and privacy depend upon the education, training and awareness of the employees and users. The efforts are collected around the education of the individuals aiming for them to protect the data assets by changing their behaviour and to an extent protect the organization as a whole.

Access


free



Educational Event Image

Description

Training session on the 'Human Factors and Cybersecurity' course from trustilio BV (trainer: Dr Kitty Kioskli) which will take place at UPRC. These sessions will be conducted in collaboration with TALTECH and Ricardo Gregorio Lugo.

Very often in the literature we read about humans being the weakest link in the cybersecurity supply chain while more than frequently it is explained that besides technical efforts the main vulnerability in an organization is the person itself. This is because peoples’ decision-making processes, attitudes, beliefs, and behaviours remain to be deciphered by cybersecurity professionals. Studies on human and behavioural factors in cybersecurity are scarce and the existing ones insist that data security and privacy depend upon the education, training and awareness of the employees and users. The efforts are collected around the education of the individuals aiming for them to protect the data assets by changing their behaviour and to an extent protect the organization as a whole.

Access


free



Educational Event Image

Description

Nessus Hands-on Training on Basic Network Vulnerability Assessment and Beyond:

This hands-on training will provide participants with the skills and knowledge they need to use Nessus to perform basic and advanced network vulnerability assessments. Participants will learn how to install and configure Nessus, create and run scans, interpret scan results, and generate reports. They will also learn about Nessus licensing options, security and privacy considerations, and best practices for scanning different types of networks.
-------------
In this training, you will learn:
o Understand the features and benefits of Nessus
o Install and configure Nessus
o Create and run different types of Nessus scans
o Interpret Nessus scan results and generate reports
o Understand Nessus licensing options and security and privacy considerations
o Apply best practices for scanning different types of networks
-------------
Who should attend this training?
o Whether you're an IT enthusiast, educator, cybersecurity professional, network administrator, security expert or someone looking to enhance their cybersecurity knowledge, this training is an ideal starting point.
o IT professionals who want to learn how to Nessus for Cybersecurity
o Security professionals who want to improve their Basic Network Vulnerability Assessment Skills
o Educators who are interested in Nessus Hands-on Training on Basic Network Vulnerability Assessment and Beyond
o Students who are interested in learning more about Network Vulnerability Assessment Skills with Nessus tool

Do not miss this opportunity to sharpen your cybersecurity skills. Watch now and learn how to use Nessus for Network Vulnerability Assessment
-------------
Training Background: This training is part of EU Innovation Project named, "CyberSecPro". The aim to develop a large variety of materials that can be used by educators and trainers in cybersecurity. CyberSecPro’s ambition is to enhance the role of the Higher Education Institutes (HEIs) in offering hands-on and working-life skills for driving a trustworthy digital transformation in critical sectors of the economy. More can be learn visiting web-site: https://www.cybersecpro-project.eu/

Acknowledgement: This work Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HADEA. Neither the European Union nor the granting authority can be held responsible for them. Under Project Agreement no. 101083594

Access


free

Access details


Online video training available but hands-on exercises offered only physically in Lab environment by CyberSecPro Laurea technical expert trainers.



Educational Event Image

Description

Wireshark Cybersecurity Tool: Hands-on Training on Introduction to Analysing Network Security

This hands-on training will introduce you to Wireshark, a powerful network protocol analyser that is used by cybersecurity professionals around the world. You will learn how to use Wireshark to capture, filter, and analyse network traffic, and how to use this information to identify and investigate network security threats.
Hands-on Exercises: This training will include a number of hands-on exercises where you will learn how to use Wireshark to capture, filter, and analyse network traffic. You will also learn how to use Wireshark to identify and investigate network security threats.

-------------
In this training, you will learn:
o What Wireshark is and why it is used
o How to download and install Wireshark
o How to use the Wireshark interface
o How to capture and filter packets
o How to view and analyse captured data
o How to export data for further analysis
o Practical applications of Wireshark for cybersecurity
o Wireshark tips and tricks
o Security and privacy considerations for using Wireshark
o How to get involved in the Wireshark community

-------------
Who should attend this training?
o Whether you're an IT enthusiast, educator, cybersecurity professional, network administrator, security expert or someone looking to enhance their cybersecurity knowledge, this training is an ideal starting point.
o IT professionals who want to learn how to use Wireshark for cybersecurity
o Security professionals who want to improve their network security monitoring and analysis skills
o Educators who are interested in hands-on training about network security and packet analysis
o Students who are interested in learning more about network security and packet analysis

Do not miss this opportunity to sharpen your cybersecurity skills. Watch now and learn how to use Wireshark to protect your organization from cyberattacks.
-------------
Training Background: This training is part of EU Innovation Project named, "CyberSecPro". The aim to develop a large variety of materials that can be used by educators and trainers in cybersecurity. CyberSecPro’s ambition is to enhance the role of the Higher Education Institutes (HEIs) in offering hands-on and working-life skills for driving a trustworthy digital transformation in critical sectors of the economy. More can be learn visiting web-site: https://www.cybersecpro-project.eu/

Acknowledgment: This work Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HADEA. Neither the European Union nor the granting authority can be held responsible for them.
Under Project Agreement no. 101083594

Access


free



Educational Event Image

Description

Training Details: Unlock the world of cybersecurity and learn how to safeguard your digital assets effectively! Join our insightful training. This training is designed to provide you with a comprehensive understanding of essential penetration testing concepts and hands-on experience with the powerful Nmap tool.

Penetration testing is the process of evaluating the security of a computer system or network by simulating the attacks of a malicious actor. It is a critical part of any information security program, as it can help to identify and remediate vulnerabilities before they can be exploited by attackers.

Nmap is a free and open-source network discovery and security auditing tool. It is one of the most popular tools used by penetration testers, and it is essential for understanding the network infrastructure of a target system.
-------------
In this training, you will learn:
o What penetration testing is and why it is important
o The different types of penetration testing
o The tools and techniques used by penetration testers
o How to use Nmap to discover and map networks
o How to identify vulnerabilities in networks and systems
o This training is ideal for anyone who wants to learn more about penetration testing or who wants to improve their Nmap skills.
-------------
Who should attend this training?
o Whether you're an IT enthusiast, educator, cybersecurity professional, network administrator, security expert or someone looking to enhance their cybersecurity knowledge, this training is an ideal starting point. By the end of this session, you will have a solid grasp of penetration testing fundamentals and the proficiency to use Nmap effectively in securing your digital infrastructure.

Do not miss this opportunity to sharpen your cybersecurity skills. Watch now for our "Introduction to Penetration Testing and Nmap Tool Training" , and embark on a path to secure your digital world.
-------------
Training Background: This training is part of EU Innovation Project named, "CyberSecPro". The aim to develop a large variety of materials that can be used by educators and trainers in cybersecurity. CyberSecPro’s ambition is to enhance the role of the Higher Education Institutes (HEIs) in offering hands-on and working-life skills for driving a trustworthy digital transformation in critical sectors of the economy. More can be learn visiting web-site: https://www.cybersecpro-project.eu/

Acknowledgment: This work Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HADEA. Neither the European Union nor the granting authority can be held responsible for them. Under Project Agreement no. 101083594

Access


free

Access details


The video training available but hands-on exercises only on lab environment with CyberSecPro Laurea technical trainers.



Description

Maritime cyber security training weeks

Access


limited