This course delves into the critical role of human behavior regarding threat.
Practical primer on the threats posed by quantum computers and the main quantum-safe defenses: post-quantum cryptography (PQC) and quantum key distribution (QKD).
This course is tailored for specialists interested in learning more about cryptology and its application in modern IT technologies.
Introductory course on Metasploit for ethical hacking. Learn to set up a secure lab, identify system vulnerabilities, and simulate cyberattacks using exploits, payloads, and post-exploitation tools in a hands-on lab environment.
This training offers a comprehensive introduction to Artificial Intelligence, combining technical insight with critical reflection on its real-world implications. Through two expert-led sessions, participants will gain both a foundational understanding of AI technologies and an informed perspective on their ethical, societal, and cybersecurity impacts.