141x Filetype PDF File size 1.30 MB Source: ictkosovo.eu
ICT for KOSOVO'S Funded by the European Union Growth Call for Applications on ICT Training Program Training Modules: CYBER SECURITY OFFENSIVE 1 PRACTITIONER CYBER SECURITY 2 ETHICAL HACKER WEB APPLICATION WEB APPLICATION 3 DEVELOPMENT DEVELOPMENT 4 PROFESSIONAL PRACTITIONER JAVA AND MOBILE ENTERPRISE JAVA 5 APPLICATION APPLICATION 6 DEVELOPER DEVELOPER BIG DATA 7 PYTHON ANALYTICS / 8 DATA SCIENCE Application Period: 17 JAN 2022 - 3 FEB 2022 implementuar nga: ICT for KOSOVO'S Funded by the European Union Growth CRITERIA FOR APPLICATION SHOULD HAVE Education ICT Related studies University Degree relevant to field Degree BS High School Diploma Undergraduate BA MA, MSC Skill level in programming languages Up to 1 year Between 1 and 2 years More than 2 years Experience in the programming Fundamental awareness (basic) languages Novice (limited experience) Intermediate (Practical application) Advanced (Applied theory) Expert (Recognized Authority) Experience in Cyber Security Up to 1 year (Only for CyberSecurity applicants) Between 1 and 2 years More than 2 years Experience in IT PM Up to 1 year Between 1 and 2 years More than 2 years English Language Ability Good English language abil ity Understanding ability Language English Shqip Serbian Selec�on Criteria Modules Technical Criteria Essen�al Criteria Desired Criteria Java and Mobile Applica�on Developer So�ware Development Enterprise Java Applica�on Developer Experience Web Applica�on Developer Professional So�ware/Web Development Web Applica�on Development Prac��oner Experience Python Programming English Language Albanian and/or Cybersecurity Prac��oner IT/Cyber Security Experience Understanding Serbian Language Offensive Cyber Security - Ethical Hacker Basic Knowledge on Sta�s�cs University Diploma Big Data Analy�cs / Data Science Fundamental Knowledge on Python Programming implementuar nga: ICT for KOSOVO'S Funded by the European Union Growth Considering the essential criteria: 100% should be met • Desired criteria shall be used by the TAT to make a final decision Short description, What Learns, or Benefits will be produced from course outline 1. Module# 1: Cyber Security Practitioner DESCRIPTION This Training module aims for the training of individuals who want to under- stand the general Cyber Security features and get practised in the main aspects of cybersecurity as in the outline. This training module more focuses on the protection of organisational assets and upon completion of this module of training, you will be able to understand the details of cybersecurity mea- sures and can get employed or initiate business activity in the fields of IT Security. TARGET AUDIENCE Individuals who have the basic IT Systems, Operating Systems, Networking, It Security, Scripting, Programming, and database knowledge. One year of experi- ence in the field of IT is preferred. TRAINING CONTENT Infrastructure security and configuration management Credential management, authentication, and authorization mechanisms SQL injection and defense mechanisms Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF/XSRF) pro- tective, and HTTP headers Digital deception Introduction and Information Gathering Vulnerabilities and configuration, identity, and authentication testing Injection attacks Exploitation Password Attacks and post-exploitation Artificial Intelligence in Cyber Security implementuar nga: ICT for KOSOVO'S Funded by the European Union Growth 2. Module# 2: Offensive Cyber Security Ethical Hacker DESCRIPTION This Training module aims for the training of individuals who want to specialise in Offensive and Defensive Security -Ethical Hacking. Upon completion of this module of training, you will be able to know the defensive and offensive mea- sures of cybersecurity and work as an ethical hacker to protect the valuable assets of the entities and organisations, whereas to discover and compromise the criminal activity in the systems. TARGET AUDIENCE Individuals who have the fundamental IT Systems, Operating Systems, Net- working, It Security, Scripting, Programming, and database knowledge. Because the deep-dive activity will exist in the module applicant should have the funda- mental background for the IT Systems. You should have at least one year of cybersecurity experience. TRAINING CONTENT Information Security Fundamentals INFORMATION GATHERING – Pen-testing Phase I ENUMERATION - Pen-testing Phase II EXPLOITATION – Pen-testing Phase III WEB Pen-testing and Post Exploitation implementuar nga:
no reviews yet
Please Login to review.