The Future is Female: Celebrating International Women's Day 2026 Every day is women’s day, but the date 8th March carries a special significance: it’s International Women’s Day (IWD). Over time, this date has come to mark a global day to acknowledge the social, economic, cultural, digital and political achievements of women – a catalyst for change and a celebration at the same time. Read moreSMB Cybersecurity Report 2026 by Proton Cybersecurity became an essential skill in businesses. According to the Proton SMB Cybersecurity Report 2026, nearly 1 in 4 small and medium-sized businesses experienced a cyberattack last year, despite already using security tools. Knowing how to... Read moreWorld Economic Forum | Gender Gap Report 2025 With its Gender Gap Report, the WEF assesses global progress towards gender parity, highlighting slow but uneven gains across economies and sectors, and underlining the urgent need for more effective economic, political and institutional action to... Read moreIntermediateAdvancedDigital ExpertFirst FIDELIS Open Call for Mentors and Peer-to-Peer Support Programme Fidelis Open Call recruits expert mentors to support peer-to-peer capacity building in trustworthy digital repositories, focusing on data governance, infrastructure reliability and skills development. Common Cybersecurity Threats & Vulnerabilities for SMEs (CyberSuite) This beginner-level course provides a practical introduction to the most common cybersecurity threats and vulnerabilities affecting Small and Medium-Sized Enterprises (SMEs). Designed for non-technical professionals and SME employees as part of the... Read moreAuthentication security essentials The Multi-Factor Authentication (MFA) Setup Guide is an essential training designed to equip individuals with the knowledge and practical skills needed to secure digital identities by implementing MFA across various platforms. This self-paced course... Read morePhishing countermeasures This training equips participants with the skills to identify, prevent and mitigate phishing attacks. Designed for students, teachers, corporate employees and IT professionals, the course covers evolving phishing tactics and effective countermeasures... Read moreIncident response: Post incident activity This training equips participants with the skills to analyse, document and improve cybersecurity incident response processes. A strong post-incident review is essential for identifying weaknesses, learning from incidents and strengthening security... Read moreIncident response: Containment, eradication and recovery This training provides participants with the skills needed to effectively manage cybersecurity incidents through containment, eradication and recovery strategies. These three phases are critical for minimising damage, eliminating threats and... Read moreIncident response: Detection and analysis This training equips participants with the essential skills to detect and analyse cybersecurity incidents effectively. It focuses on identifying attack vectors, recognising security threats, analysing alerts and documenting incidents accurately... Read morePrevious1...345Page 567...171Next
The Future is Female: Celebrating International Women's Day 2026 Every day is women’s day, but the date 8th March carries a special significance: it’s International Women’s Day (IWD). Over time, this date has come to mark a global day to acknowledge the social, economic, cultural, digital and political achievements of women – a catalyst for change and a celebration at the same time. Read more
SMB Cybersecurity Report 2026 by Proton Cybersecurity became an essential skill in businesses. According to the Proton SMB Cybersecurity Report 2026, nearly 1 in 4 small and medium-sized businesses experienced a cyberattack last year, despite already using security tools. Knowing how to... Read more
World Economic Forum | Gender Gap Report 2025 With its Gender Gap Report, the WEF assesses global progress towards gender parity, highlighting slow but uneven gains across economies and sectors, and underlining the urgent need for more effective economic, political and institutional action to... Read more
IntermediateAdvancedDigital ExpertFirst FIDELIS Open Call for Mentors and Peer-to-Peer Support Programme Fidelis Open Call recruits expert mentors to support peer-to-peer capacity building in trustworthy digital repositories, focusing on data governance, infrastructure reliability and skills development.
Common Cybersecurity Threats & Vulnerabilities for SMEs (CyberSuite) This beginner-level course provides a practical introduction to the most common cybersecurity threats and vulnerabilities affecting Small and Medium-Sized Enterprises (SMEs). Designed for non-technical professionals and SME employees as part of the... Read more
Authentication security essentials The Multi-Factor Authentication (MFA) Setup Guide is an essential training designed to equip individuals with the knowledge and practical skills needed to secure digital identities by implementing MFA across various platforms. This self-paced course... Read more
Phishing countermeasures This training equips participants with the skills to identify, prevent and mitigate phishing attacks. Designed for students, teachers, corporate employees and IT professionals, the course covers evolving phishing tactics and effective countermeasures... Read more
Incident response: Post incident activity This training equips participants with the skills to analyse, document and improve cybersecurity incident response processes. A strong post-incident review is essential for identifying weaknesses, learning from incidents and strengthening security... Read more
Incident response: Containment, eradication and recovery This training provides participants with the skills needed to effectively manage cybersecurity incidents through containment, eradication and recovery strategies. These three phases are critical for minimising damage, eliminating threats and... Read more
Incident response: Detection and analysis This training equips participants with the essential skills to detect and analyse cybersecurity incidents effectively. It focuses on identifying attack vectors, recognising security threats, analysing alerts and documenting incidents accurately... Read more