This course explores the unique cybersecurity challenges posed by the integration of Artificial Intelligence (AI) in maritime operations. Participants will examine how AI technologies are transforming the maritime industry, from autonomous vessels to predictive maintenance systems, while also introducing new vulnerabilities and threats. The course emphasizes understanding the risks associated with AI systems, such as data manipulation, adversarial attacks, and system breaches, and explores strategies for mitigating these risks to ensure safe and secure maritime operations. Through case studies and practical exercises, students will gain the knowledge and tools needed to address cybersecurity challenges in AI-driven maritime environments effectively.
This course explores the foundational principles of co-creation in designing and developing human-centered AI solutions. Participants will learn how to involve diverse stakeholders—including users, developers, and policymakers—in collaborative processes to create AI systems that prioritize ethical considerations, inclusivity, and real-world relevance. The course emphasizes practical strategies for fostering collaboration, integrating user feedback, and aligning AI technologies with human values and societal needs. Through case studies and interactive exercises, students will gain the knowledge and tools necessary to apply co-creation principles in building AI solutions that empower and benefit users.
This course focuses on the development of transferable skills and the importance of continuous learning in the dynamic field of cybersecurity. Participants will explore critical skills such as problem-solving, communication, adaptability, and leadership that are essential for navigating complex cybersecurity challenges across various roles and industries. The course highlights the value of staying updated with emerging technologies, evolving threats, and industry best practices through ongoing education and professional development. Through hands-on activities and real-world examples, students will learn how to apply these skills effectively and maintain their expertise in the fast-paced cybersecurity landscape.
This course offers a foundational understanding of cybersecurity, providing participants with the essential knowledge and skills needed to navigate today’s digital threats. Topics include understanding common cyber risks, such as malware, phishing, and ransomware, as well as best practices for securing systems, networks, and sensitive data. The course emphasizes practical steps to improve personal and organizational security, including strong password management, safe browsing habits, and recognizing potential cyberattacks. Designed for individuals with little to no technical background, this course equips attendees with the tools to protect themselves and their organizations in an increasingly connected world.
This course explores the critical aspects of cybersecurity governance and regulatory compliance within the EU energy sector. Participants will gain a deep understanding of the cybersecurity challenges unique to the energy industry and the regulatory frameworks shaping its security practices, including the NIS Directive and other EU-level policies. The course covers strategies for implementing effective governance structures, achieving compliance, and managing cyber risks across energy systems. Through real-world case studies and practical applications, students will develop the knowledge and skills necessary to navigate the complex intersection of cybersecurity and regulatory requirements in the energy sector.
This course is designed to empower leaders and decision-makers with the knowledge and strategies needed to navigate the complex world of cybersecurity. Participants will gain an understanding of key cybersecurity concepts, risk management practices, and the strategic implications of cyber threats for their organizations. The course emphasizes how to make informed decisions, allocate resources effectively, and foster a culture of cybersecurity awareness. Through real-world examples and practical discussions, leaders will learn to address vulnerabilities, implement robust security measures, and ensure their organizations remain resilient in the face of evolving cyber risks.
This course is tailored to address the unique cybersecurity challenges faced by micro, small, and medium-sized enterprises (MSMEs). Participants will learn practical strategies for protecting their businesses from cyber threats, including phishing, ransomware, and data breaches, while navigating limited resources and budgets. The course covers essential topics such as risk assessment, implementing cost-effective security measures, and fostering a culture of cybersecurity awareness among employees. Through real-world examples and actionable insights, attendees will gain the tools and confidence needed to strengthen their cybersecurity posture and safeguard their operations in an increasingly digital landscape.
This course is designed to equip non-IT professionals and policymakers with a foundational understanding of cybersecurity principles and practices. Participants will explore key cybersecurity concepts, including threat landscapes, risk management, and the importance of securing digital assets, all presented in an accessible and practical way. The course emphasizes the role of non-technical stakeholders in shaping cybersecurity policies, fostering organizational resilience, and making informed decisions to mitigate risks. Through real-world examples and interactive sessions, attendees will gain the knowledge and confidence to actively contribute to cybersecurity strategies within their organizations and sectors.
This course examines the pivotal role of human factors in the cybersecurity of the energy sector, focusing on how human behavior, decision-making, and organizational culture influence security outcomes. Participants will explore the unique cybersecurity challenges faced by the energy industry, including the protection of critical infrastructure and the mitigation of insider threats. The course emphasizes strategies for fostering a culture of cybersecurity awareness, improving training programs, and addressing human vulnerabilities to enhance resilience against cyber threats. Through case studies and practical exercises, students will develop the skills needed to integrate human-centric approaches into energy sector cybersecurity strategies effectively.
This course delves into the creation and application of user personas, emphasizing a human-centered approach to understanding and addressing user needs. Participants will explore the psychological, social, and behavioral factors that influence user experiences and learn how to translate these insights into detailed, actionable personas. The course covers techniques for gathering user data, identifying key patterns, and crafting personas that drive design decisions and improve product relevance. Through hands-on activities and case studies, students will develop the skills to create meaningful user personas that enhance user-centric strategies in design, marketing, and development processes.
This course provides a comprehensive exploration of the human factors influencing cybersecurity. Participants will delve into the psychological, behavioral, and cultural dimensions that impact cybersecurity practices and decision-making. The course highlights the importance of understanding human behavior in preventing, detecting, and responding to cyber threats.
This course explores the critical intersection of human factors and maritime cybersecurity, focusing on the role of human behavior, decision-making, and organizational culture in securing maritime operations. Participants will examine the unique cybersecurity challenges faced in the maritime sector, including threats to ships, ports, and supply chains, and how human elements contribute to both vulnerabilities and defenses. The course emphasizes the importance of fostering cybersecurity awareness, training, and resilience among maritime personnel to mitigate risks. Through real-world case studies and practical exercises, students will gain the knowledge and skills needed to address human-centric cybersecurity issues in the maritime industry effectively.
This course provides a comprehensive guide to mastering code audits, focusing on the tools and techniques essential for identifying and mitigating vulnerabilities in software code. Participants will explore both manual and automated auditing methods to ensure secure coding practices, detect potential security flaws, and adhere to compliance standards. The course emphasizes practical skills in using industry-leading tools and frameworks while introducing strategies for effective collaboration between developers and auditors. Through hands-on exercises and real-world examples, students will gain the expertise needed to conduct thorough and efficient code audits, enhancing the overall security and reliability of software systems.
This course provides small and medium enterprises (SMEs) with practical knowledge of network security fundamentals and penetration testing techniques. Participants will learn to identify vulnerabilities, implement security measures, and simulate real-world cyberattacks to assess and improve their organization’s defenses. Designed for non-experts, it equips businesses with essential tools to protect their networks from cyber threats.
This course provides a comprehensive introduction to penetration testing, equipping participants with the skills and techniques needed to assess the security of systems, networks, and applications. Participants will learn how to simulate real-world cyberattacks to identify vulnerabilities and evaluate the effectiveness of existing defenses. The course covers the entire penetration testing lifecycle, including reconnaissance, exploitation, and reporting, while emphasizing ethical practices and compliance standards. Through hands-on labs and practical exercises, attendees will gain the tools to conduct effective penetration tests and strengthen the overall security posture of their organizations.
This course provides a comprehensive understanding of risk assessment and management principles, focusing on identifying, analyzing, and mitigating risks in organizational and technological contexts. Participants will explore key methodologies and frameworks for assessing risks, including qualitative and quantitative approaches, and learn to develop effective risk management strategies. The course emphasizes proactive planning to minimize potential threats and enhance resilience. Through practical exercises, real-world case studies, and collaborative projects, students will gain the skills to evaluate risk scenarios, prioritize mitigation efforts, and implement risk management plans to support organizational objectives and compliance requirements.
This course delves into the role of social engineering in cybersecurity, focusing on the psychological and behavioral tactics used by attackers to exploit human vulnerabilities. Participants will explore various social engineering techniques, such as phishing, pretexting, and baiting, and learn how these methods are employed to manipulate individuals and breach security systems. The course emphasizes identifying and mitigating social engineering threats through awareness, education, and robust security practices. Real-world examples and case studies will provide a practical understanding of how to recognize and defend against these increasingly sophisticated attacks.
Communication in Cyber Incident Response is a specialized course designed to equip participants with the essential communication strategies and skills required during cyber incident response scenarios. The course emphasizes the importance of clear, concise, and effective communication among technical teams, management, and external stakeholders during high-pressure situations. Participants will learn to navigate complex incident timelines, coordinate cross-functional efforts, and deliver timely updates while managing sensitive information. Real-world case studies, role-playing exercises, and best practices are used to simulate incident scenarios, enabling learners to develop confidence in handling press inquiries, regulatory reporting, and stakeholder engagement during cyber crises.
This course provides a comprehensive overview of supply chain security, focusing on the risks and challenges associated with securing global supply chains in an increasingly digital and interconnected world. Participants will explore threats such as cyberattacks, data breaches, and physical vulnerabilities that can disrupt operations and compromise sensitive information. The course emphasizes best practices for identifying and mitigating risks, implementing secure processes, and ensuring the resilience of supply chains. Through case studies and practical exercises, students will gain the skills needed to develop robust security strategies that protect supply chains from end to end.
This course examines the impact of psychosocial (PS) threats on the trustworthiness of AI systems, focusing on the interactions between humans and AI participants. Participants will explore how factors such as bias, manipulation, and psychological influence can undermine trust in AI technologies. The course emphasizes strategies for identifying and mitigating these risks through ethical design, transparent communication, and user-centric approaches. Through case studies and practical exercises, students will gain the skills to assess and address psychosocial threats, fostering more reliable and trustworthy AI systems in diverse applications.
This professional seminar delves into the human element in cybersecurity, offering a deep dive into the field of cyberpsychology. Participants will explore how human behavior, decision-making, and cognitive biases influence cybersecurity practices and outcomes. The seminar highlights the psychological tactics used by attackers, such as social engineering, and examines how individual and organizational behavior can both enhance and undermine security. Through interactive discussions and case studies, attendees will gain insights into fostering a security-conscious culture, improving user awareness, and addressing human vulnerabilities to build more resilient cybersecurity frameworks.