Cyber Capacity Building Program
Training on product security evaluation for greater security and cyber-resilience of the ICT ecosystem
Training on product security evaluation for greater security and cyber-resilience of the ICT ecosystem
“The Kaspersky Cyber Capacity Building Program is wholly comprehensive and practical for government agencies and all organizations. We are living in the era of digitalization and disruptive technologies; hence, the call to enhance cybersecurity skills and mechanisms is crucial.
Mr. Tran Quang Hung
The National Cyber Security Center of Vietnam (NCSC Vietnam, a unit of the Authority of Information Security, part of the Ministry of Information and Communications) is always ready and willing to support Kaspersky on this program and other cybersecurity practices.”
NCSC Vietnam, Authority of Information Security, Ministry of Information and Communications, Government of Vietnam
“The topics covered in the program were very relevant to the participants and also provided them with valuable information and insights. I would like to appreciate the entire Kaspersky team who were behind this meticulously planned and well organized program packed with quality content. The interactive sessions and the problems given to the participants clearly showed the dedication and the level of efforts taken by your team to organize this program”.
Dr. Sanjay Bahl
Director General, CERT-In, Ministry of Electronics and Information Technology, Government of India
"BSSN always strives to foster and develop the human resources competencies in cybersecurity and cryptography, including through this cooperation with Kaspersky. The Cyber Capacity Building Program established a structured Cybersecurity Human Resources posture that will produce professional human resources who can adapt to technological development and have technical competencies in cybersecurity".
Mr. Hinsa Siburian
Head of National Cyber and Crypto Agency (BSSN) of Indonesia
Introduction to applications and system security; building reliable and resilient ICT infrastructure:
Duration: 1 hour.
The purpose of threat modeling is to provide systematic analysis of what controls or defenses need to be included – given the nature of the system, the probable attacker's profile, the most likely attack vectors, and the assets most desired by an attacker.
The sections includes:
Duration: 1.5 hours.
Introduction to the basic techniques of identifying vulnerabilities in software code. The purpose of the code review is to ensure that a product has no potential vulnerabilities or backdoors. We will also share best practices of Kaspersky’s Transparency Centers and how processes are organized for external reviews of our source code and software development.
This section includes:
Duration: 2.5 hours.
Code Fuzzing gives an introduction to the process of defining, developing and testing Windows-based applications through fuzzing to identify bugs and vulnerabilities. Though the training focuses on native Windows-based applications, most of the concepts – as well as the methodology and tools – can be applied to other platforms.
After completing this course, trainees will be able to:
Duration: 2.5 hours.
Introduction to and definition of approaches for building up the process of managing vulnerabilities within an organization’s ICT infrastructure:
Duration: 1 hour.