CYBERWISER.eu Intermediate Offering Level

 

 

Why choose CYBERWISER.eu Intermediate?


CYBERWISER.eu Basic is designed for users who have already received a cybersecurity training and are familiar with basic cybersecurity threats and best practices. With CYBERWISER.eu basic, you will learn about Context estabilishment, Cyber-risk assessment and Cybersecurity and risk awareness. It is also the first offering level that allows you to try existing Cyber Range training scenarios composed by up to 10 elements (Virtual Machines/Virtual Networks). At the end of the courses, you will receive a Diploma that certifies the successful completion of the offering level and you will also automatically be included in the CYBERWISER.eu Cybersecurity professional register (CyPR).

 

Who is it for?

cybersecurity training students

 

Institutions of Higher Education and Research Centres 

 

 

cybersecurity training Large Enterprises

 

Large Enterprises 

 

 

cybersecurity training Public Sector

 

Public Sector Organisations

 

 

Intermediate Course Decription

 

Course title Learning goals

Describe target of analysis, level 1  

Learn how to describe the scope and focus of the target system under analysis based on a given context and how to document the target of analysis.

Identify and describe security assets, level 1 

Learn to analyse the target description to identify and document asset-relevant information that are to be considered in the cyber-risk assessment.

Identify and describe threat profiles and high-level risks, level 1 

Learn a structured approach to organize risk-related information based on the target description and the basic constructs of the risk modelling language CORAS.

Identify risks, level 1 

Learn the basic usage of the CORAS modelling language to identify and document cyber-risks.

Awareness of Password Weakness with hands-on training 

Learn hands-on training in demonstrating how weak passwords are exploited.

 

 

What are you going to learn?

 

  • Understand how to use the UML class diagram as a basis to create a target infrastructure to simulate on the CYBERWISER.eu Cyber Range.
  • Create likelihood scales, consequences scales, and risk evaluation matrices, and understand how these scales are used in CYBERWISER.eu.
  • Analyse risk models and identify risk indicators, configure CYBERWISER.eu to obtain indicator values, and use Cyber-risk models for training and evaluation in Cybersecurity scenarios on the CYBERWISER.eu platform.
  • Explain how risk treatments may be identified using CORAS modelling language, associate risk treatments on vulnerabilities, threat scenarios, and unwanted incidents, and analyse a risk model and create appropriate risk treatments.

 

 

What they say about us

It is important to learn about Cybersecurity best practices and how you can develop them in a controlled environment. Cyber ranges can help put these to practical use. - Francisco, University of Pisa Student