Home >The Catalogue>Services> Cybersecurity Innovation Hub, Special Areas Cybersecurity Trainings
SERVICES

Cybersecurity Innovation Hub, Special Areas Cybersecurity Trainings

TYPE
Skills Development & Training, Technology Consultancy and Training
REGION
Czech Republic
LANGUAGE
Czech, English

Special Areas Cybersecurity Trainings focuses on cybersecurity in narrowly specialized services.

SERVICE DESCRIPTION

Blockchains technology: The service includes deployment and configuration of consortia blockchains, such as Hyperledger projects (e.g., BESU, Fabric, Indy). The service includes training and education in the field of blockchains, underlying consensus protocols and incentive mechanisms. It also includes contractual research regarding security audits and/or automated testing of existing smart contracts as well as their decentralized applications. We also offer the design of new customized applications of smart contracts.

Digital Forensics and Incident Response: The training focuses on principles of Digital Forensics and Incident Response (DFIR) as the systematic approach taken by an organization to prepare for, detect, contain, and recover from a suspected cybersecurity breach. The goal is to train the participants to handle the situation in a way that limits damage and reduces recovery time and costs.

The training is organized as a one-week workshop that will include theoretic preparation as well as and more importantly, hands-on components (i.e., labs and exercises) to practice and deepen knowledge.

The training will include the topics selected based on skills identified through a recent interview with DFIR practitioners (ranked skill map for DFIR specialists – DFIR Alliance): Incident Handling, Investigation Techniques, Data Acquisition and Analysis, Data Recovery Techniques, System Forensics, Network Forensics, Cloud Forensics, Malware Analysis, Cyberthreat Intelligence. AI and ML in cybersecurity:

The service should include the application of artificial intelligence (AI) and machine learning (ML) in cybersecurity. The methods should mainly involve deep learning, feature (knowledge) extraction and ontologies (knowledge representation). The possible application should include logs (incident logs) analysis and interpretation as well as real-time processing of network traffic.

LINKS

SERVICE OFFERED BY

MEMBER
CIH
TYPE
DIH
COUNTRY
Czech Republic

MORE INFORMATION ABOUT THIS SERVICE

Data Controller: INSTITUTO TECNOLÓGICO DE INFORMÁTICA (G96278734)
Purposes and legal basis: We will use your personal data to contact you back and answer your inquiries and provide you with information regarding our activity and in connection with our developments, research and services.
Data recipients: Your personal data will only be shared with the DIH your inquiry or information request may concern.
Rights: Regarding your personal data you have the right to access, rectify, erase, data portability, restrict processing , object, consent withdrawal and to file a complaint before the Supervisory Authority. More info
Exercise of rights: You can exercise the aforementioned rights by sending an e-mail to the e-mail address: dpo@iti.es or by sending a letter to the address Camino de Vera s/n, CPI Edif. 8, Acceso B, 46022 Valencia (Spain).