About
The Cyber Incident Responder course is designed to enhance the knowledge, skills, and e-competencies of Information Technology (IT) or Information Security (IS) professionals to excel in the field of cybersecurity incident management. The course aims to cater to professionals at e-CF level 3 and EQF level 6, providing them with advanced capabilities to effectively respond to cybersecurity incidents either independently or as part of a cybersecurity incident response team (IRT).
Target group:
Information Technology (IT) or Information Security (IS) professionals
-
Objective 1:
The creation of an appropriately trained – specialized human resource in the cybersecurity sector, which will be the driving force to business development in the coming years in a highly competitive business environment that is transformed rapidly.
-
Objective 2
The program aims to provide all trainees with the appropriate knowledges, skills and competences, directly linked with the needs of the market, while at the same time reinforcing their mobility in the EU labour market and the servicing of the cybersecurity skills gap.
-
Objective 3
The acquisition of the necessary technical knowledge, skills and competences for the monitoring and identification of cybersecurity events as well as for the effective response and handling of cybersecurity incidents.
-
Objective 4
Re skilling IT and IS professionals to better fit the market needs for cybersecurity professionals.
-
LM0: Introduction
This module provides an overview of the Cyber Incident Responder training, introducing participants to the course content, objectives, and the Cyber Incident Responder profile. Trainees also gain insights into the market demand for Cyber Incident Responders.
-
LM1: Risk Management
Participants are introduced to the fundamentals of Cyber Security Risk Management. The module covers topics such as understanding risk assessment methodologies and conducting risk assessments effectively.
-
LM2: Incident Management.
This module delves into incident response terminology and definitions. Trainees learn about different cyber attacks and threats, develop a Cyber Incident Response Plan, understand incident response procedures, delve into malware analysis, and explore mitigation techniques. .
-
LM3: Information Systems and Network Security
Trainees gain knowledge about monitoring, logging, measurement, and evaluation processes and tools for information systems. The module covers setting up logging functionality, collecting logs, operating Security Information and Event Management (SIEM) systems, and hands-on labs for practical experience.
-
LM4: Digital Forensics and Threat Analysis
This module focuses on digital forensics, including an introduction to digital evidence, digital forensics tools, and analyzing threat intelligence information from external data sources. Participants gain insights into current cyber defense trends.
Sara Ricci
Sara Ricci is a postdoctoral researcher at Brno University of Technology, Czech Republic. She accomplished her M.Sc. degree in Mathematics at University of Pisa, Italy in 2015 and her Ph.D. studies in Computer Engineering and Mathematics Security at Universitat Rovira i Virgili, Spain in 2018. Her research interests are theoretical cryptography, in particular lattice-based and elliptic curve cryptography, and data privacy and security. She is also focused on the design of new privacy-preserving cryptographic protocols and their security analyses.
– Brno University of Technology
Argiro Chatzopoulou
Experienced Implementor, Lead Auditor and Trainer with a demonstrated history of working in the services industry. Skilled in different kinds of audits including ISO 27001, Information Systems, IT Service Management, Privacy, Quality and Business Continuity. Ms. Chatzopoulou is a person with strong communication and management skills honed through conducting more than 1500 audits, delivering more than 500 training courses and managing teams nationally or internationally.
-Apiroplus
Tamas Holczer
Tamás Holczer is an assistant professor at Budapest University of Technology and Economics, Hungary, at the laboratory of Cryptography and System Security. He is teaching network security and cyber operations for master students. His main research focus is on the security of industrial control systems with a special attention to nuclear security.
– Budapest University of Technology and Economics
Ramon Martin De Pozuelo Genis
Dr. Ramon Martin de Pozuelo received the B.Sc. and the M.Sc. degree in Telecommunications Engineering and Ph.D. degree in ICT and its Management (all with honors) by La Salle School of Engineering from Universitat Ramon Llull (URL), Barcelona, Spain. As a researcher in La Salle he participated in several European research and innovation projects related to different fields, especially in the design of heterogeneous data networks, information management and cybersecurity systems for Smart Grids and Smart Cities. In 2018 he joined Caixabank as a Project Manager for Security Innovation and Transformation in which he has been managing the participation of CaixaBank in several H2020 and Horizon Europe projects. He is a Certified Fraud Examiner (CFE) and ISACA’s Certified Information Security Manager (CISM).
– Caixabank
Mario Maawad Marcos
Mario Maawad Marcos has been working in IT field for over 20 years, including the last 20 years in Digital Security. He has been working at CaixaBank back since 2004, the first bank in Spain, as the Director of Security Innovation, Transformation & Red Team. Mario received a B.S. degree in Computer Science from the Polytechnic University of Catalonia, Barcelona in 1997 and a JD in Law, from the Open University of Catalonia, Barcelona in 2010. He also received a Postgraduate Diploma in Business Banking from the Pompeu Fabra University, Barcelona in 2009. He is a member and has participated actively creating and managing initiatives within the European Payments Council (EPC), Forum of Internet & Response Teams (FIRST), Cloud Security Alliance (CSA) among others.