CyberSecurity course catalogue

Better awareness and ability to reduce the risk of a CyberSecurity incident and to limit the resulting damage

“Attackers have all the time and resources necessary to prepare and successfully complete an attack. Whoever defends themselves must react quickly. What's more, those defending themselves often do not have the necessary Cyberculture preparation and culture. In fact, most of the attacks are successful because the victim's behaviour is not in line with consolidated CyberSecurity practices. That is why We at Exprivia consider training, in awareness and general skills, as a fundamental security control that is possibly also the least expensive. Over millions of years, man has become aware of the risks and benefits of elements such as water, earth, air and oxygen. The digital world has just arrived, and we must learn to understand what is good and what is bad.”

Domenico Raguseo,
Manager of Digital Factory CyberSecurity, Exprivia

 

The delivery model for the course is based on specific demand.
All the courses can be provided either in Italian or in English, in the classroom, or via web-conference.
Some courses, where indicated, are available on the Udemy platform.


Exprivia believes in awareness and in the value of expertise.
So it participates in the Open Badge 2.0 standard through myopenbadge.com.
After passing a test, all the courses in the catalogue offer the chance to receive a badge certifying the skills acquired.
The list of available badges can be viewed at the link.

Most incidents are caused by failure to adopt basic individual security practices in the digital field.
The course aims to provide individual and easily adoptable Best Practices thus dramatically reducing the risk of an incident.

Course duration: 1 hour
Category: Awareness
Level: Basic
Audience: End user

Available on the Udemy platform at the following link


This course touches on the main points of Python programming to give the amateur user the basics to penetrate this world.
The goal of the course is to train the user so that he can begin working with this programming language.

Course duration: 1 hour
Category: Training
Level: Basic
Audience: End user

Available on the Udemy platform at the following link

With the legal obligations deriving from the GDPR (General Data Protection Regulation), the course is a training programme for employees of companies, public bodies and all those who intend to specialise in this highly important sector.
The aim of the course is to provide solid knowledge of the regulation, and of data processing in its broadest sense.

Course duration: 1.5 hours
Category: Awareness
Level: Intermediate
Audience: employees of companies and public bodies, end users
Available on the Udemy platform at the following link

A crucial point in the spread of IoT technology is the security of the data that objects collect and transmit. Since IoT technologies involve a wide range of devices, IoT security planning is essential to its successful distribution. The volume of data they manage and transmit can be extremely dangerous, for example, when it is subject to DDoS attacks. This course provides the guide lines to avoid direct or indirect attacks that can impact privacy or compromise other systems.

Course duration: 1.5 hours
Category: Awareness
Level: Basic
Audience: employees of companies and public bodies, end users
Available on the Udemy platform at the following link

The course aims to provide an overview of best practices in service management.

Course duration: 6 hours
Category: Expertise
Level: Medium
Audience: CXOs, IT Managers, Project Managers, Program Managers, DPOs

The course aims to provide an overview of the methods of attack used, security controls and processes, and organisations to carry out the processes.

Course duration: 6 hours
Category: Expertise
Level: Medium
Audience: CXOs, IT Managers, Project Managers, Program Managers, DPOs

The course sets out to provide knowledge and practical tools to company employees and management who process personal data on a daily basis and aims to create awareness about protecting personal and company data.

The course will deal with different topics.

The general principles of Data Protection
General overview of Privacy regulations – from the Privacy Code to the EU Regulation 2016/679
Definitions
Material and territorial scope of application
Responsibilities connected to personal data processing

New obligations of the GDPR
How to ensure respect for the accountability required by the GDPR
Analysis of the new requirements introduced by the GDPR
Privacy by design and by default - practicalities of the two principles
Data Breach: how to tackle it and what it requires
Requests by interested parties - how to ensure compliance

Identifying the Privacy figures
Data processing by employees
How to correctly identify and appoint data processing officers
The Data Protection Officer
Cloud Computing - guidelines and Best Practices

Focus on special sectors
IOT - The impact of the European regulation on connected technologies
AI - how the use of artificial intelligence is governed
Internet service provider - processing of personal data and responsibilities
General Principles of Data Protection.ution.eu Web:www.ksolution.eu

Course duration: 8 hours
Category: Expertise
Level: Medium
Audience: CXOs, IT Managers, Project Managers, Program Managers, DPOs

The course aims to provide updates on regulations and directives in relation to rulings and any case studies. During the course participants can discuss specific cases and get feedback from expert, qualified personnel. Information will be given about obligations deriving from the GDPR and about identifying Privacy figures,

Course duration: 8 hours
Category: Expertise
Level: Medium
Audience: CXOs, IT Managers, Project Managers, Program Managers, DPOs

The goal of the course is the analysis of technical-legal aspects of research, the conservation and correct presentation of digital evidence as proof in the area of forensics. Different methods of "digital" investigation will be presented in light of the Italian legal system: cyber investigation techniques, defensive investigation in the area of cyber crimes and common crimes in which evidence is made of digital data or transmitted by information systems. A range of the most frequently occurring technical problems will be presented, linked to the legal problems involved in investigation activities. The "Best Practices" to be used in the field will be illustrated, for the acquisition, conservation, analysis and production of digital data found on digital devices (computers, smartphones, storage media, etc.) and in the data flows aimed at their usability in various civil and criminal cases. The course will highlight the correct methods of collecting and conserving findings and digital evidence in order to correctly preserve the chain of custody. The most common Digital Forensics tools will presented, be they commercial or open source, as well as the most suitable equipment to achieve the aims.

Course duration: 60 hours
Category: Expertise
Level: Advanced
Audience: CISOs, CSOs, IT Security Specialists, IT Security Architects

At the end of the course participants will be able to understand the main processes, the terminology, the structure and basic concepts of ISO 27001. Participants will be able to align IT services with corporate governance and information security needs and, in addition, to contribute to a current certification programme.

Course duration: 2 days
Category: Expertise
Level: Medium
Audience: CXOs , IT Managers, Project Managers, Program Managers, DPOs, CISOs, CSOs

Participants will acquire basic knowledge of the implications - for Privacy, regulations, fair competition and consumer protection - of the development of a digital economy founded on the collection and analysis of an increasingly large volume of data.

Course duration: 1 day
Category: Expertise
Level: Medium
Audience: CXOs, IT Managers, Project Managers, Program Managers, DPOs, CISOs, CSOs

This course explores what becoming digital-ready means for companies. It includes aspects such as roles and structures, culture, team work and social collaboration. It offers innovation management and Business model innovation tools to cultivate the digital innovation company ecosystem.

Course duration: 2 days
Category: Expertise
Level: Medium
Audience: CXOs, IT Managers, Project Managers, Program Managers, DPOs, CISOs, CSOs

Participants will acquire full comprehension of the principles, practices and application methods of Scrum. The course is structured so as to enable participants to freely and independently choose, with full preparation, the certification that best suits their goals. During the course the characteristics of SCRUM will be explained, the roles its involves and their contribution, with a special emphasis on the role of the Scrum Master, the mechanisms for managing the requirements, planning, progress, releases and “inspect & adapt” practices.

Course duration: 2 days
Category: Expertise
Level: Medium
Audience: CXOs IT Managers, Project Managers, Program Managers, DPOs, Development Managers