×

Training Programmes

Her CyberTracks: Empowering Women in Cybersecurity

Instructors: Emily Davis

Understanding and combating cyber financial crimes

In the digital age, the development of communication networks and the widespread use of the internet have significantly transformed business operations. This digital integration, while beneficial, has also escalated the vulnerability of organisations to cyber threats. With the rise of cryptocurrencies—a blend of innovative technologies and financial services—there is an increasing opportunity for their malicious use. Cryptocurrencies, characterized by their pseudo-anonymity and decentralization, have become attractive tools for money laundering and other illicit online activities across parallel web networks.

Course Overview

This training programme is designed to empower WB6 administrations to keep pace with the rapid advancements in technology and the evolving landscape of digital crimes by developing the knowledge and skills needed to effectively combat and adapt to the multifaceted nature of cyber offenses related to crime typology and the misuse of cryptocurrencies.

Training Modules

Foundations of Crime Typology and Cyber Offenses

  • Understanding the basics of crime typology specific to digital platforms
  •  Identifying patterns and classifications of cybercrimes affecting companies today

Collection and Management of Digital Evidence

  •  Techniques for identifying, collecting, and preserving digital evidence.
  •  Legal considerations and compliance issues in handling digital data.
  •  Utilizing digital forensics tools and methodologies to extract critical information.

Cryptocurrencies and Cyber Financial Crimes

  •  Exploring the technology behind cryptocurrencies and their role in financial systems.
  •  Investigating the use of cryptocurrencies in money laundering, fraud, and other financial crimes.
  •  Strategies for tracing and analyzing crypto transactions on decentralized networks.

Adapting to Technological Innovations

  •  Staying ahead of technological trends and their implications on security practices.
  •  Developing adaptive strategies to mitigate risks associated with new digital currencies and platforms.

Case Studies and Real-World Applications

  •  Analyzing recent cases of digital crimes involving cryptocurrencies.
  •  Hands-on simulations to apply concepts and techniques learned in a controlled, test-driven environment.

Learning Outcomes

Upon completion of this program, participants will be able to:

  •  Clearly classify types of digital crimes and identify relevant digital evidence.
  •  Utilize advanced tools and techniques for digital forensics investigations.
  •  Understand the mechanics of cryptocurrencies and identify potential misuse in financial transactions.
  •  Develop proactive strategies to prevent and respond to cybercrimes in an ever-evolving digital landscape.

Who Should Attend

This training is aimed at law enforcement personnel, cybersecurity experts, financial service professionals and otehr professionals involved in digital security and regulatory roles.


Cyber Hygiene for Civil Servants

Training of trainers for senior officials in WB6 Public administrations

Cyber Hygiene for Civil Servants programme is an initiative delivered jointly by WB3C and Regional School of Public Administration (ReSPA). This training programme is designed to empower senior-level public officials with the knowledge and skills required to educate their peers about cyber hygiene within their respective public administrations and by cascading knowledge, to enhance the overall cyber resilience of the region.

Course Overview:

The training spans three days and is structured to blend theoretical knowledge with practical exercises:

Day 1: Educational Skills Modules

Focus on outcome-based education, teaching preparation and teaching methods and techniques. This foundational day equips participants with the educational principles necessary to effectively transfer knowledge.

Day 2: Cyber Hygiene for Users

Dives into the objectives and stakes of information security, covering basics of ISO/IEC standards and cybersecurity threat awareness. Participants will explore security policy frameworks and the architecture of information security systems.

Day 3: Practical Application

Participants engage in practical exercises that reinforce their learning and develop hands-on skills in incident management procedures and actions to be taken in response to cyber incidents. This session simulates real-world scenarios to enhance problem-solving skills.

Educational Highlights

Participants will gain insights into educational principles, communication techniques and teaching methodologies.

 

The programme covers crucial topics in cyber hygiene such as security policies, threat awareness, preventive measures, and incident management procedures. Engaging practical exercises simulate real-world scenarios to enhance participants’ problem-solving skills and application of knowledge in real-life settings.

Operational Technology, Resilient Ecosystems and Infrastructure Protection

Enhancing cybersecurity proficiancy of Western Balkans administrations

The training series developed in cooperation with the Netherlands' Ministry of Foreign Affairs and the National Cyber Security Centre consists of three integral parts, each designed to enhance different aspects of cybersecurity proficiency among participants from the Western Balkans within the context of Critical Infrastructures (CI) and Critical Information Infrastructures (CII). Participants will gain critical theoretical knowledge, practical skills, and awareness necessary to address the evolving challenges in cybersecurity.

1. Operational Technology

Duration: 1,5 days

This segment focuses on the specific security needs related to operational technology (OT), which is increasingly targeted in cyberattacks due to its critical role in controlling physical processes in industries like manufacturing, energy and utilities. The training aims to strengthen skills in protecting and securing OT environments from potential cyber threats.

*Focus on the integration and protection of operational technology within cybersecurity framework.

*Explore dependencies and the impact of cascading risks in operational settings.

*Practical sessions on developing resilient strategies and responses to cyber threats in operational technologies.

2. Cyber Resilient Ecosystems

Duration: 1,5 days

Participants will learn how to build and maintain cyber-resilient ecosystems that can withstand and quickly recover from cyber incidents. This part of the training emphasizes the importance of resilience planning and strategies to ensure continuity and reliability in the face of cyber disruptions.

  •  Innovative approaches to ecosystemic-thinking in cybersecurity.
  •  Lessons from natural ecosystems applied to cyber challenges to foster robust public-private partnerships and strengthen regional cyber resilience.
  •  Hands-on exercises for mapping and establishing cyber resilient ecosystems for organisations, specific regions like industrial areas, harbors, airports, or targeted sectors.

3. Critical Information Infrastructure Protection

Duration: 1 day

This training focuses on protecting critical information infrastructure, which is essential for the functioning of a society and economy. Topics include risk assessment, protection strategies and the implementation of security measures designed to protect vital digital assets and services from cyber threats.

  •  Essential insights into the relationship between CI and CII under cybersecurity perspectives.
  •  Detailed discussion on the needs for protection amid a continuously changing cyber environment.
  •  Focus on four key areas: Understanding CI and CII, Asset management, and building secure communities.
  • Practical exercises aimed at developing comprehensive strategies for protecting critical information infrastructure.
Artificial intelligence applied in cybersecurity quantum programme

The use of advanced quantum technologies and AI in protecting critical infrastructure

The "Artificial Intelligence Applied to Cybersecurity and Quantum Program" offered by the Western Balkans Cyber Capacity Centre (WB3C) focuses on equipping cybersecurity professionals with advanced knowledge in AI and quantum technologies. This program covers a wide range of topics essential for modern cybersecurity, including the application of large language models (LLMs) in cybersecurity, event registry systems, and the role of digital twins in enhancing security measures. Participants will also learn about the SiQUID project, post-quantum cryptography (PQC), and the use of honeypots for detecting cyber threats.

Additionally, the course provides insights into cutting-edge developments beyond traditional semiconductors and an introduction to quantum computing and cryptography. Through expert-led sessions, participants will gain both theoretical knowledge and practical skills, enabling them to implement these advanced technologies within their organisations. This comprehensive program prepares professionals to address current and future cybersecurity challenges, enhancing their ability to protect and secure digital infrastructures in the Western Balkans.


Copyright © WB3C

Disclaimer: Translations of the original content written in English into other languages are AI generated by Weglot.