CINXE.COM

<!doctype html> <html data-n-head-ssr lang="en" data-n-head="lang"> <head data-n-head=""> <title data-n-head="true">Training</title><meta data-n-head="true" charset="utf-8"><meta data-n-head="true" name="viewport" content="width=device-width,initial-scale=1"><meta data-n-head="true" name="msapplication-TileColor" content="#da532c"><meta data-n-head="true" name="theme-color" content="#ffffff"><meta data-n-head="true" data-hid="description" name="description" content="The NATO Cooperative Cyber Defence Centre of Excellence is a multinational and interdisciplinary hub of cyber defence expertise."><link data-n-head="true" rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png"><link data-n-head="true" rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png"><link data-n-head="true" rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png"><link data-n-head="true" rel="manifest" href="/site.webmanifest"><link data-n-head="true" rel="mask-icon" href="/safari-pinned-tab.svg" color="#012169"><link rel="preload" href="/_nuxt/9fe29afc1928fac25ab8.js" as="script"><link rel="preload" href="/_nuxt/67458f637b9a91db2b1d.js" as="script"><link rel="preload" href="/_nuxt/85e01a8d92a732456575.js" as="script"><link rel="preload" href="/_nuxt/58470171c754c01ef3aa.js" as="script"><link rel="preload" href="/_nuxt/1b081b4958f9fc8b1740.js" as="script"><style data-vue-ssr-id="9fefeaf2:0 27085e90:0 17cfdfa9:0 ad96d4e8:0 d647e33c:0 68a7f73c:0 4b9b3184:0 7f59fc44:0 51fef01b:0 8fdd67a2:0 4e8c12b8:0 73b71e76:0 1bf36aeb:0 c246e94a:0 14aab60e:0">@charset "UTF-8";a,abbr,acronym,address,applet,article,aside,audio,b,big,blockquote,body,canvas,caption,center,cite,code,dd,del,details,dfn,div,dl,dt,em,embed,fieldset,figcaption,figure,footer,form,h1,h2,h3,h4,h5,h6,header,hgroup,html,i,iframe,img,ins,kbd,label,legend,li,mark,menu,nav,object,ol,output,p,pre,q,ruby,s,samp,section,small,span,strike,strong,summary,table,tbody,td,tfoot,th,thead,time,tr,tt,u,ul,var,video{border:none;margin:0;padding:0;-webkit-font-smoothing:antialiased;text-rendering:optimizeLegibility}html{box-sizing:border-box}*,:after,:before{box-sizing:inherit}article,aside,details,figcaption,figure,footer,header,hgroup,main,nav,section,summary{display:block}audio,canvas,video{display:inline-block}body{margin:0}ul{list-style-type:none}a{background:0 0;text-decoration:none}button,input{line-height:normal}input[type=search]{-webkit-appearance:textfield}input[type=search]::-webkit-search-cancel-button,input[type=search]::-webkit-search-decoration{-webkit-appearance:none}button::-moz-focus-inner,input::-moz-focus-inner{border:0;padding:0}textarea{overflow:auto;vertical-align:top}img{display:inline-block;vertical-align:middle;width:100%;max-width:100%;height:auto;-ms-interpolation-mode:bicubic}input:focus,textarea:focus{outline:0}input{margin:0;padding:0}input,select{-webkit-appearance:none;-moz-appearance:none;appearance:none}@font-face{font-family:Archivo;font-display:auto;src:url(/_nuxt/fonts/a719faa.woff);font-weight:400;font-style:normal}@font-face{font-family:Archivo;font-display:auto;src:url(/_nuxt/fonts/55d78c1.woff);font-weight:400;font-style:italic}@font-face{font-family:Archivo;font-display:auto;src:url(/_nuxt/fonts/4810199.woff);font-weight:500;font-style:normal}@font-face{font-family:Archivo;font-display:auto;src:url(/_nuxt/fonts/7656954.woff);font-weight:500;font-style:italic}@font-face{font-family:Archivo;font-display:auto;src:url(/_nuxt/fonts/c769ede.woff);font-weight:600;font-style:normal}@font-face{font-family:Archivo;font-display:auto;src:url(/_nuxt/fonts/bf1ec07.woff);font-weight:600;font-style:italic}@font-face{font-family:Archivo;font-display:auto;src:url(/_nuxt/fonts/ae196a6.woff);font-weight:700;font-style:normal}@font-face{font-family:Archivo;font-display:auto;src:url(/_nuxt/fonts/118611e.woff);font-weight:700;font-style:italic}.fade-enter-active,.fade-leave-active{-webkit-transition:opacity .5s;transition:opacity .5s}.fade-enter,.fade-leave-active{opacity:0}.page-enter-active,.page-leave-active{-webkit-transition:opacity .5s;transition:opacity .5s}.page-enter,.page-leave-active{opacity:0}a{color:#05b2db;-webkit-transition:color .3s ease;transition:color .3s ease}a:hover{color:#012169}b,strong{font-weight:500}p{font-size:1rem;line-height:1.6;margin-bottom:1.2rem}h1,h2,h3,h4,h5,h6{font-weight:400;line-height:1.2}h1{font-size:2rem;margin-bottom:2.4rem}@media (min-width:800px){h1{font-size:2.875rem}}@media (min-width:1000px){h1{font-size:2.875rem}}@media (min-width:1700px){h1{font-size:2.875rem}}h2{font-size:1.75rem;margin-bottom:1.2rem;font-weight:500}@media (min-width:800px){h2{font-size:2.125rem}}@media (min-width:1000px){h2{font-size:2.125rem}}@media (min-width:1700px){h2{font-size:2.125rem}}@media (min-width:800px){h2{font-weight:400}}h3{font-size:1.625rem;margin-bottom:.6rem;font-weight:500}@media (min-width:800px){h3{font-size:1.75rem}}@media (min-width:1000px){h3{font-size:1.75rem}}@media (min-width:1700px){h3{font-size:1.75rem}}@media (min-width:800px){h3{font-weight:400;margin-bottom:1.2rem}}h4{font-size:1.375rem;margin-bottom:1.2rem;font-weight:500}@media (min-width:800px){h4{font-size:1.5rem}}@media (min-width:1000px){h4{font-size:1.5rem}}@media (min-width:1700px){h4{font-size:1.5rem}}@media (min-width:800px){h4{font-weight:400}}h5{font-size:1rem;margin-bottom:.6rem;font-weight:500}@media (min-width:800px){h5{font-size:1rem}}@media (min-width:1000px){h5{font-size:1rem}}@media (min-width:1700px){h5{font-size:1rem}}h6{font-size:1rem;margin-bottom:.6rem}@media (min-width:800px){h6{font-size:1rem}}@media (min-width:1000px){h6{font-size:1rem}}@media (min-width:1700px){h6{font-size:1rem}}.alignnone{margin-left:0;margin-right:0;max-width:100%;height:auto}.aligncenter{display:block;height:auto}.alignleft,.alignright{height:auto;margin:1rem 0}@media (max-width:799px){.alignleft:last-child,.alignright:last-child{margin-bottom:0}}@media (min-width:800px){.alignleft{float:left;margin:0 1.5rem 1.5rem 0}.alignright{float:right;margin:0 0 1.5rem 1.5rem}}body{font-size:1rem;font-family:Archivo,sans-serif;font-weight:400;background-color:#f5f5f5;color:#012169}body.scroll-lock{overflow:hidden}html{font-size:15px}@media (min-width:800px){html{font-size:16px}}@media (min-width:1000px){html{font-size:16px}}@media (min-width:1700px){html{font-size:18px}}*{-webkit-overflow-scrolling:touch}.nuxt-progress{height:.3125rem!important}.lazyload-image,.lazyloading{opacity:0}.lazyload-image.lazyloaded{opacity:1;-webkit-transition:opacity .3s ease;transition:opacity .3s ease}.container{padding-bottom:1.875rem}@media (min-width:800px){.container{padding-bottom:3.75rem}}@media (min-width:1000px){.container{padding-bottom:6.875rem}}@media (min-width:1700px){.container{padding-bottom:7.5rem}}.container__row{width:100%;display:-webkit-box;display:flex;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;max-width:90rem;margin-right:auto;margin-left:auto}.embed-container{position:relative;padding-bottom:56.25%;overflow:hidden;max-width:100%;height:auto}.embed-container embed,.embed-container iframe,.embed-container object{position:absolute;top:0;left:0;width:100%;height:100%}.nuxt-progress{position:fixed;top:0;left:0;right:0;height:2px;width:0;opacity:1;-webkit-transition:width .1s,opacity .4s;transition:width .1s,opacity .4s;background-color:#00b3de;z-index:999999}.nuxt-progress.nuxt-progress-notransition{-webkit-transition:none;transition:none}.nuxt-progress-failed{background-color:red}.main{padding-top:41px}@media (min-width:800px){.main{padding-top:55px}}@media (min-width:1000px){.main{padding-top:65px}}.main-wrapper[data-v-43070d1a]{padding-top:41px}@media (min-width:800px){.main-wrapper[data-v-43070d1a]{padding-top:45px}}@media (min-width:1000px){.main-wrapper[data-v-43070d1a]{padding-top:51px}}@media (min-width:1700px){.main-wrapper[data-v-43070d1a]{padding-top:65px}}.header[data-v-c09ce640]{position:fixed;top:0;left:0;width:100%;border-bottom:1px solid #f5f5f5;background-color:#fff;z-index:100}.header__wrapper[data-v-c09ce640]{display:-webkit-box;-webkit-box-pack:justify;justify-content:space-between;-webkit-box-align:center;align-items:center;height:40px;width:100%;display:flex;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;padding-left:1.25rem;padding-right:1.25rem}@media (min-width:800px){.header__wrapper[data-v-c09ce640]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.header__wrapper[data-v-c09ce640]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.header__wrapper[data-v-c09ce640]{padding-left:1.625rem;padding-right:1.625rem}}@media (min-width:800px){.header__wrapper[data-v-c09ce640]{height:44px}}@media (min-width:1000px){.header__wrapper[data-v-c09ce640]{height:50px}}@media (min-width:1700px){.header__wrapper[data-v-c09ce640]{height:64px}}.header svg[data-v-c09ce640],.header__logo[data-v-c09ce640]{width:96px;height:30px}@media (min-width:800px){.header svg[data-v-c09ce640],.header__logo[data-v-c09ce640]{width:96px;height:30px}}@media (min-width:1000px){.header svg[data-v-c09ce640],.header__logo[data-v-c09ce640]{width:110px;height:34px}}@media (min-width:1700px){.header svg[data-v-c09ce640],.header__logo[data-v-c09ce640]{width:128px;height:40px}}.header__menu-toggle[data-v-c09ce640]{position:fixed;top:13px;right:1rem;width:26px;height:14px;background-color:transparent;padding:0;margin:0;border:0;box-shadow:0;z-index:30}@media (min-width:800px){.header__menu-toggle[data-v-c09ce640]{display:none}}.header__menu-toggle>span[data-v-c09ce640]{width:100%;height:2px;position:absolute;background-color:#012169;left:0;-webkit-transform:scale(1);transform:scale(1);-webkit-transition:background-color .3s ease-in-out;transition:background-color .3s ease-in-out}.header__menu-toggle>span[data-v-c09ce640]:first-child{top:0}.header__menu-toggle>span[data-v-c09ce640]:nth-child(2){top:6px}.header__menu-toggle>span[data-v-c09ce640]:nth-child(3){top:12px}.header__menu-toggle--close>span[data-v-c09ce640]{background-color:#fff}.header__menu-toggle--close>span[data-v-c09ce640]:first-child{-webkit-transform-origin:center center;transform-origin:center center;top:50%;-webkit-transform:translateY(-50%) rotate(45deg);transform:translateY(-50%) rotate(45deg)}.header__menu-toggle--close>span[data-v-c09ce640]:nth-child(2){opacity:0}.header__menu-toggle--close>span[data-v-c09ce640]:nth-child(3){-webkit-transform-origin:center center;transform-origin:center center;top:50%;-webkit-transform:translateY(-50%) rotate(-45deg);transform:translateY(-50%) rotate(-45deg)}.header__menu-toggle[data-v-c09ce640]:active{-webkit-transform:scale(.9);transform:scale(.9)}@media (max-width:799px){.main-menu[data-v-d4f26a94]{position:fixed;background-color:#012169;top:0;left:0;width:100%;height:100%;color:#fff;overflow-y:scroll;-webkit-transform:translateX(100%);transform:translateX(100%);-webkit-transition:.6s ease;transition:.6s ease}}@media (min-width:800px){.main-menu[data-v-d4f26a94]{display:-webkit-box;display:flex;-webkit-box-pack:end;justify-content:flex-end}}@media (max-width:799px){.main-menu--active[data-v-d4f26a94]{-webkit-transform:translateX(0);transform:translateX(0)}}.main-menu__wrapper[data-v-d4f26a94]{width:100%;display:-webkit-box;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;max-width:90rem;margin-right:auto;margin-left:auto;display:flex}@media (max-width:799px){.main-menu__wrapper[data-v-d4f26a94]{width:100%;height:100%;min-height:440px;-webkit-box-pack:center;justify-content:center;-webkit-box-align:center;align-items:center;-webkit-box-orient:vertical;-webkit-box-direction:normal;flex-direction:column}}.main-menu__link[data-v-d4f26a94]{font-weight:600;color:#fff;font-size:1.875rem;padding:6px 0;-webkit-transition:color .3s ease;transition:color .3s ease}@media (max-width:799px){.main-menu__link[data-v-d4f26a94]{display:inline-block}}@media (min-width:800px){.main-menu__link[data-v-d4f26a94]{font-weight:500;font-size:1rem;color:#012169;padding:0 .4rem}}@media (min-width:1000px){.main-menu__link[data-v-d4f26a94]{padding:0 .6rem}}@media (min-width:800px){.main-menu__link[data-v-d4f26a94]:last-child{padding-right:0}}.main-menu__link--active[data-v-d4f26a94],.main-menu__link[data-v-d4f26a94]:hover{color:#05b2db}.main-menu__link[data-v-d4f26a94]:focus{outline:0;text-decoration:underline}@media (max-width:799px){.main-menu--show[data-v-d4f26a94]{-webkit-transform:translateX(0);transform:translateX(0)}}.trainings-page__row[data-v-cf545066]{width:100%;display:-webkit-box;display:flex;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;max-width:90rem;margin-right:auto;margin-left:auto}.trainings-page__heading[data-v-cf545066]{padding-left:1.25rem;padding-right:1.25rem;-webkit-box-flex:0;flex:0 0 100%;max-width:100%;text-align:center}@media (min-width:800px){.trainings-page__heading[data-v-cf545066]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.trainings-page__heading[data-v-cf545066]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.trainings-page__heading[data-v-cf545066]{padding-left:1.625rem;padding-right:1.625rem}}.trainings-page__content-columns[data-v-cf545066]{margin-bottom:1.875rem}@media (min-width:800px){.trainings-page__content-columns[data-v-cf545066]{margin-bottom:3.75rem}}@media (min-width:1000px){.trainings-page__content-columns[data-v-cf545066]{margin-bottom:6.875rem}}@media (min-width:1700px){.trainings-page__content-columns[data-v-cf545066]{margin-bottom:7.5rem}}.trainings-page__content[data-v-cf545066]{padding-left:1.25rem;padding-right:1.25rem;-webkit-box-flex:0;flex:0 0 100%;max-width:100%}@media (min-width:800px){.trainings-page__content[data-v-cf545066]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.trainings-page__content[data-v-cf545066]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.trainings-page__content[data-v-cf545066]{padding-left:1.625rem;padding-right:1.625rem}}@media (min-width:800px){.trainings-page__content[data-v-cf545066]{-webkit-box-flex:0;flex:0 0 33.33333%;max-width:33.33333%}}.trainings-page__portfolio[data-v-cf545066]{padding-left:1.25rem;padding-right:1.25rem;-webkit-box-flex:0;flex:0 0 66.66667%;max-width:66.66667%}@media (min-width:800px){.trainings-page__portfolio[data-v-cf545066]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.trainings-page__portfolio[data-v-cf545066]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.trainings-page__portfolio[data-v-cf545066]{padding-left:1.625rem;padding-right:1.625rem}}.page-header[data-v-39bad662]{background-color:#012169;color:#fff;padding:1.875rem 0;position:relative;overflow:hidden}@media (min-width:800px){.page-header[data-v-39bad662]{padding:3.75rem 0}}@media (min-width:1000px){.page-header[data-v-39bad662]{padding:5rem 0}}@media (min-width:1700px){.page-header[data-v-39bad662]{padding:5.625rem 0}}.page-header[data-v-39bad662]:not(.page-header--no-margin){margin-bottom:1.875rem}@media (min-width:800px){.page-header[data-v-39bad662]:not(.page-header--no-margin){margin-bottom:3.75rem}}@media (min-width:1000px){.page-header[data-v-39bad662]:not(.page-header--no-margin){margin-bottom:6.875rem}}@media (min-width:1700px){.page-header[data-v-39bad662]:not(.page-header--no-margin){margin-bottom:7.5rem}}.page-header__wrapper[data-v-39bad662]{width:100%;display:-webkit-box;display:flex;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;max-width:90rem;margin-right:auto;margin-left:auto}.page-header__text-wrapper[data-v-39bad662]{padding-left:1.25rem;padding-right:1.25rem;z-index:2;position:relative}@media (min-width:800px){.page-header__text-wrapper[data-v-39bad662]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.page-header__text-wrapper[data-v-39bad662]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.page-header__text-wrapper[data-v-39bad662]{padding-left:1.625rem;padding-right:1.625rem}}@media (min-width:800px){.page-header__text-wrapper[data-v-39bad662]{-webkit-box-flex:0;flex:0 0 50%;max-width:50%}}.page-header__thumbnail-wrapper[data-v-39bad662]{padding-left:1.25rem;padding-right:1.25rem}@media (min-width:800px){.page-header__thumbnail-wrapper[data-v-39bad662]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.page-header__thumbnail-wrapper[data-v-39bad662]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.page-header__thumbnail-wrapper[data-v-39bad662]{padding-left:1.625rem;padding-right:1.625rem}}.page-header__image[data-v-39bad662]{width:100%}@media (max-width:799px){.page-header__image[data-v-39bad662]{margin-bottom:1rem}}.page-header__title-wrapper:last-child .page-header__title[data-v-39bad662]{margin-bottom:0}.page-header__title[data-v-39bad662]{margin-bottom:2rem}@media (min-width:1000px){.page-header__title[data-v-39bad662]{width:80%}}.page-header__content-wrapper[data-v-39bad662]>:last-child{margin-bottom:0!important}.page-header__description[data-v-39bad662]{line-height:1.2;border-left:3px solid #05b2db;padding-left:1.4rem;margin-bottom:2rem;font-size:1.625rem}@media (min-width:800px){.page-header__description[data-v-39bad662]{font-size:1.75rem}}@media (min-width:1000px){.page-header__description[data-v-39bad662]{font-size:1.75rem}}@media (min-width:1700px){.page-header__description[data-v-39bad662]{font-size:1.75rem}}@media (min-width:800px){.page-header__description[data-v-39bad662]{padding-left:2rem}}.page-header__sub-description[data-v-39bad662]{line-height:1.4;color:hsla(0,0%,98%,.8)}@media (min-width:1000px){.page-header__sub-description[data-v-39bad662]{width:80%}}.page-header__background-pattern[data-v-39bad662]{display:none}@media (min-width:800px){.page-header__background-pattern[data-v-39bad662]{display:-webkit-box;display:flex;position:absolute;left:40%;top:-100%;width:2000px;height:2000px;-webkit-transform:rotate(60deg);transform:rotate(60deg);z-index:1}}.content-block[data-v-301db0d5]{width:100%;display:-webkit-box;display:flex;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;max-width:90rem;margin-right:auto;margin-left:auto}.content-block--margin-bottom[data-v-301db0d5]{margin-bottom:1.875rem}@media (min-width:800px){.content-block--margin-bottom[data-v-301db0d5]{margin-bottom:3.75rem}}@media (min-width:1000px){.content-block--margin-bottom[data-v-301db0d5]{margin-bottom:6.875rem}}@media (min-width:1700px){.content-block--margin-bottom[data-v-301db0d5]{margin-bottom:7.5rem}}.content-block--sidebar .content-block__wrapper[data-v-301db0d5]{-webkit-box-flex:0;flex:0 0 100%;max-width:100%;padding-left:1.25rem;padding-right:1.25rem}@media (min-width:800px){.content-block--sidebar .content-block__wrapper[data-v-301db0d5]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.content-block--sidebar .content-block__wrapper[data-v-301db0d5]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.content-block--sidebar .content-block__wrapper[data-v-301db0d5]{padding-left:1.625rem;padding-right:1.625rem}}@media (min-width:800px){.content-block--sidebar .content-block__wrapper[data-v-301db0d5]{-webkit-box-flex:0;flex:0 0 66.66667%;max-width:66.66667%}}.content-block--expanded[data-v-301db0d5]{margin-bottom:0}.content-block--expanded .content-block__wrapper[data-v-301db0d5]{-webkit-box-flex:0;flex:0 0 100%;max-width:100%;padding:0}.content-block__content[data-v-301db0d5] blockquote{border-left:3px solid #05b2db;padding-left:1.4rem;line-height:1.3;font-size:1.375rem}@media (min-width:800px){.content-block__content[data-v-301db0d5] blockquote{font-size:1.5rem}}@media (min-width:1000px){.content-block__content[data-v-301db0d5] blockquote{font-size:1.5rem}}@media (min-width:1700px){.content-block__content[data-v-301db0d5] blockquote{font-size:1.5rem}}@media (min-width:800px){.content-block__content[data-v-301db0d5] blockquote{padding-left:1.6rem}}.content-block__content[data-v-301db0d5] blockquote>*{line-height:1.3;font-size:1.375rem}@media (min-width:800px){.content-block__content[data-v-301db0d5] blockquote>*{font-size:1.5rem}}@media (min-width:1000px){.content-block__content[data-v-301db0d5] blockquote>*{font-size:1.5rem}}@media (min-width:1700px){.content-block__content[data-v-301db0d5] blockquote>*{font-size:1.5rem}}.content-block__content[data-v-301db0d5] p:first-child{font-size:1rem;font-weight:500}@media (min-width:800px){.content-block__content[data-v-301db0d5] p:first-child{font-size:1rem}}@media (min-width:1000px){.content-block__content[data-v-301db0d5] p:first-child{font-size:1rem}}@media (min-width:1700px){.content-block__content[data-v-301db0d5] p:first-child{font-size:1rem}}.content-block__content[data-v-301db0d5] ol,.content-block__content[data-v-301db0d5] ul{margin-left:1.6rem;margin-bottom:1.4rem;line-height:1.6}.content-block__content[data-v-301db0d5] ol li,.content-block__content[data-v-301db0d5] ul li{padding-bottom:.4rem}.content-block__content[data-v-301db0d5] ol li>ol,.content-block__content[data-v-301db0d5] ol li>ul,.content-block__content[data-v-301db0d5] ul li>ol,.content-block__content[data-v-301db0d5] ul li>ul{margin-top:1rem;margin-bottom:0;list-style:circle}.content-block__content[data-v-301db0d5] ul{list-style:square}.content-block__content[data-v-301db0d5] p{margin-bottom:2rem}.content-block--training[data-v-301db0d5] ul{margin-left:1.4rem;margin-bottom:1rem;list-style:square}.content-block--training[data-v-301db0d5] ul li{padding-bottom:.4rem}.content-block--training[data-v-301db0d5] ul>li>ul{margin-left:0;list-style:none;margin-bottom:1rem}.content-block--training[data-v-301db0d5] ul>li>ul li:before{content:"-";margin-right:.6rem}.content-block:not(.content-block--expanded) .content-block__content[data-v-301db0d5]>*{padding-left:1.25rem;padding-right:1.25rem;width:100%;margin-left:auto;margin-right:auto}@media (min-width:800px){.content-block:not(.content-block--expanded) .content-block__content[data-v-301db0d5]>*{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.content-block:not(.content-block--expanded) .content-block__content[data-v-301db0d5]>*{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.content-block:not(.content-block--expanded) .content-block__content[data-v-301db0d5]>*{padding-left:1.625rem;padding-right:1.625rem}}@media (min-width:800px){.content-block:not(.content-block--expanded) .content-block__content[data-v-301db0d5]>:not(.alignnone):not(.aligncenter):not(.news-navigation){width:83.33333%}}@media (min-width:1000px){.content-block:not(.content-block--expanded) .content-block__content[data-v-301db0d5]>:not(.alignnone):not(.aligncenter):not(.news-navigation){width:50%}}.content-block[data-v-301db0d5]:not(.content-block--expanded) .aligncenter,.content-block[data-v-301db0d5]:not(.content-block--expanded) .alignnone{margin-top:1.2rem;margin-bottom:2.4rem}@media (min-width:800px){.content-block[data-v-301db0d5]:not(.content-block--expanded) .aligncenter,.content-block[data-v-301db0d5]:not(.content-block--expanded) .alignnone{margin-top:1.2rem}}@media (min-width:1000px){.content-block[data-v-301db0d5]:not(.content-block--expanded) .aligncenter,.content-block[data-v-301db0d5]:not(.content-block--expanded) .alignnone{display:block;width:83.33333%}}.items-filter[data-v-60e106aa]{width:100%;display:-webkit-box;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;max-width:90rem;margin-right:auto;margin-left:auto;padding-left:1.25rem;padding-right:1.25rem;display:flex;margin-bottom:1.875rem;-webkit-box-pack:center;justify-content:center}@media (min-width:800px){.items-filter[data-v-60e106aa]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.items-filter[data-v-60e106aa]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.items-filter[data-v-60e106aa]{padding-left:1.625rem;padding-right:1.625rem}}@media (min-width:800px){.items-filter[data-v-60e106aa]{margin-bottom:2.5rem}}.tag-item[data-v-27d0d06f]{background-color:#fff;color:#012169;border-radius:15px;display:inline-block;padding:.4rem .6rem .3rem;margin:0 .5rem .5rem 0;line-height:1;-webkit-transition:.3s ease;transition:.3s ease;vertical-align:baseline;font-size:.75rem}@media (min-width:800px){.tag-item[data-v-27d0d06f]{font-size:.6875rem}}@media (min-width:1000px){.tag-item[data-v-27d0d06f]{font-size:.6875rem}}@media (min-width:1700px){.tag-item[data-v-27d0d06f]{font-size:.6875rem}}.tag-item--clickable[data-v-27d0d06f]{cursor:pointer}.tag-item--clickable.tag-item--active[data-v-27d0d06f],.tag-item--clickable[data-v-27d0d06f]:hover{background-color:#012169;color:#fff}.tag-item--gray[data-v-27d0d06f]{background-color:#ddd}.tag-item--blue[data-v-27d0d06f],.tag-item--file[data-v-27d0d06f]{background-color:#012169;color:#fff}.tag-item--blue.tag-item--active[data-v-27d0d06f],.tag-item--blue[data-v-27d0d06f]:hover,.tag-item--file.tag-item--active[data-v-27d0d06f],.tag-item--file[data-v-27d0d06f]:hover{background-color:#05b2db;color:#fff}.tag-item--authors[data-v-27d0d06f]{background-color:#92d19a}.tag-item--tags[data-v-27d0d06f]{background-color:#ffe380}.tag-item--organisation[data-v-27d0d06f]{background-color:#ff9f9b}.tag-item--country[data-v-27d0d06f],.tag-item--trainings[data-v-27d0d06f]{background-color:#80d9ee}.tag-item--removable[data-v-27d0d06f]:after{content:"✕";font-size:.625rem;line-height:inherit;display:inline-block;margin-left:.3rem}.tag-item--no-margin[data-v-27d0d06f]{margin:0}.common-item[data-v-7da8e4c7]{-webkit-box-flex:0;flex:0 0 100%;max-width:100%;padding-left:1.25rem;padding-right:1.25rem;margin-bottom:2.5rem}@media (min-width:800px){.common-item[data-v-7da8e4c7]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.common-item[data-v-7da8e4c7]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.common-item[data-v-7da8e4c7]{padding-left:1.625rem;padding-right:1.625rem}}@media (min-width:800px){.common-item[data-v-7da8e4c7]{margin-bottom:2.5rem}}@media (min-width:1000px){.common-item[data-v-7da8e4c7]{margin-bottom:2.875rem}}@media (min-width:1700px){.common-item[data-v-7da8e4c7]{margin-bottom:3.25rem}}@media (min-width:600px){.common-item[data-v-7da8e4c7]{-webkit-box-flex:0;flex:0 0 50%;max-width:50%}}@media (min-width:1000px){.common-item[data-v-7da8e4c7]{-webkit-box-flex:0;flex:0 0 33.33333%;max-width:33.33333%}}.common-item__link[data-v-7da8e4c7]{display:-webkit-box;display:flex;height:100%;-webkit-box-orient:vertical;-webkit-box-direction:normal;flex-direction:column;background-color:#fff;position:relative;color:#012169}.common-item__image-wrapper[data-v-7da8e4c7]{width:100%;height:12.5rem;background:#ddd}@media (min-width:600px){.common-item__image-wrapper[data-v-7da8e4c7]{height:13.75rem}}@media (min-width:1000px){.common-item__image-wrapper[data-v-7da8e4c7]{height:16.25rem}}.common-item__image[data-v-7da8e4c7]{width:100%;height:100%;-o-object-fit:cover;object-fit:cover;font-family:"object-fit: cover"}.common-item__tags[data-v-7da8e4c7]{position:absolute;top:1rem;right:1rem}.common-item__tags[data-v-7da8e4c7] .tag-item:not(:last-child){margin-right:.4rem}.common-item__content[data-v-7da8e4c7]{padding:1.4rem 1rem}@media (min-width:800px){.common-item__content[data-v-7da8e4c7]{padding:2rem}}.common-item__content[data-v-7da8e4c7]>:last-child{margin-bottom:0}.common-item__title[data-v-7da8e4c7]{-webkit-transition:.3s ease;transition:.3s ease}.common-item__description[data-v-7da8e4c7],.common-item__time[data-v-7da8e4c7]{padding-left:1.2rem}@media (min-width:800px){.common-item__description[data-v-7da8e4c7],.common-item__time[data-v-7da8e4c7]{padding-left:1.4rem}}.common-item__description[data-v-7da8e4c7]{border-left:3px solid #05b2db}.common-item__time[data-v-7da8e4c7]{color:#9f9f9f}@media (min-width:800px){.common-item--large[data-v-7da8e4c7]{-webkit-box-flex:0;flex:0 0 66.66667%;max-width:66.66667%}.common-item--large .common-item__link[data-v-7da8e4c7]{width:100%;display:-webkit-box;display:flex;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap}.common-item--large .common-item__content[data-v-7da8e4c7],.common-item--large .common-item__image-wrapper[data-v-7da8e4c7]{-webkit-box-flex:0;flex:0 0 50%;max-width:50%}.common-item--large .common-item__image-wrapper[data-v-7da8e4c7]{height:18.75rem}.common-item--large .common-item__content[data-v-7da8e4c7]{display:-webkit-box;display:flex;-webkit-box-orient:vertical;-webkit-box-direction:normal;flex-direction:column;-webkit-box-pack:center;justify-content:center}}.common-item:hover .common-item__title[data-v-7da8e4c7]{color:#05b2db}.footer[data-v-99883df8]{background-color:#fff;padding:1.875rem 0}@media (min-width:800px){.footer[data-v-99883df8]{padding:3.75rem 0}}.footer__wrapper[data-v-99883df8]{width:100%;display:-webkit-box;display:flex;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;max-width:90rem;margin-right:auto;margin-left:auto}.footer__contacts[data-v-99883df8],.footer__name[data-v-99883df8],.footer__social[data-v-99883df8]{padding-left:1.25rem;padding-right:1.25rem}@media (min-width:800px){.footer__contacts[data-v-99883df8],.footer__name[data-v-99883df8],.footer__social[data-v-99883df8]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.footer__contacts[data-v-99883df8],.footer__name[data-v-99883df8],.footer__social[data-v-99883df8]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.footer__contacts[data-v-99883df8],.footer__name[data-v-99883df8],.footer__social[data-v-99883df8]{padding-left:1.625rem;padding-right:1.625rem}}.footer__contacts[data-v-99883df8] p,.footer__name[data-v-99883df8] p,.footer__social[data-v-99883df8] p{margin-bottom:0}@media (max-width:799px){.footer__contacts[data-v-99883df8],.footer__name[data-v-99883df8],.footer__social[data-v-99883df8]{margin-bottom:1.2rem}}.footer__name[data-v-99883df8]{-webkit-box-flex:0;flex:0 0 100%;max-width:100%}.footer__name>p[data-v-99883df8]{font-size:1.375rem;line-height:1.24}@media (min-width:800px){.footer__name>p[data-v-99883df8]{font-size:1.5rem}}@media (min-width:1000px){.footer__name>p[data-v-99883df8]{font-size:1.5rem}}@media (min-width:1700px){.footer__name>p[data-v-99883df8]{font-size:1.5rem}}@media (min-width:800px){.footer__name[data-v-99883df8]{-webkit-box-flex:0;flex:0 0 50%;max-width:50%}.footer__name>p[data-v-99883df8]{max-width:70%}}.footer__contacts[data-v-99883df8]{-webkit-box-flex:0;flex:0 0 66.66667%;max-width:66.66667%}@media (min-width:800px){.footer__contacts[data-v-99883df8]{-webkit-box-flex:0;flex:0 0 33.33333%;max-width:33.33333%}}.footer__social[data-v-99883df8]{-webkit-box-flex:0;flex:0 0 33.33333%;max-width:33.33333%}@media (min-width:1000px){.footer__social[data-v-99883df8]{-webkit-box-flex:0;flex:0 0 16.66667%;max-width:16.66667%}}.cookie-notification[data-v-43ff8dd4]{padding-top:1.25rem;padding-bottom:1.25rem;display:-webkit-box;display:flex;-webkit-box-orient:horizontal;-webkit-box-direction:normal;flex-flow:row wrap;position:fixed;background-color:#fff;bottom:0;left:0;width:100%;border-top:1px solid #f5f5f5;-webkit-box-align:center;align-items:center;z-index:500}@media (min-width:800px){.cookie-notification[data-v-43ff8dd4]{padding-top:1.25rem;padding-bottom:1.25rem}}@media (min-width:1000px){.cookie-notification[data-v-43ff8dd4]{padding-top:1.4375rem;padding-bottom:1.4375rem}}@media (min-width:1700px){.cookie-notification[data-v-43ff8dd4]{padding-top:1.625rem;padding-bottom:1.625rem}}.cookie-notification__text[data-v-43ff8dd4]{-webkit-box-flex:0;flex:0 0 100%;max-width:100%;padding-left:1.25rem;padding-right:1.25rem}@media (min-width:800px){.cookie-notification__text[data-v-43ff8dd4]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.cookie-notification__text[data-v-43ff8dd4]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.cookie-notification__text[data-v-43ff8dd4]{padding-left:1.625rem;padding-right:1.625rem}}.cookie-notification__text[data-v-43ff8dd4] p{margin-bottom:0}@media (max-width:799px){.cookie-notification__text[data-v-43ff8dd4]{margin-bottom:1rem}}@media (min-width:800px){.cookie-notification__text[data-v-43ff8dd4]{-webkit-box-flex:0;flex:0 0 75%;max-width:75%}}.cookie-notification__button-wrapper[data-v-43ff8dd4]{-webkit-box-flex:0;flex:0 0 100%;max-width:100%;padding-left:1.25rem;padding-right:1.25rem;display:-webkit-box;display:flex}@media (min-width:800px){.cookie-notification__button-wrapper[data-v-43ff8dd4]{padding-left:1.25rem;padding-right:1.25rem}}@media (min-width:1000px){.cookie-notification__button-wrapper[data-v-43ff8dd4]{padding-left:1.4375rem;padding-right:1.4375rem}}@media (min-width:1700px){.cookie-notification__button-wrapper[data-v-43ff8dd4]{padding-left:1.625rem;padding-right:1.625rem}}@media (min-width:800px){.cookie-notification__button-wrapper[data-v-43ff8dd4]{-webkit-box-flex:0;flex:0 0 25%;max-width:25%;-webkit-box-pack:end;justify-content:flex-end}}.cookie-notification__button[data-v-43ff8dd4]{border:none;box-shadow:none;background-color:transparent;border-radius:30px;display:inline-block;line-height:1.5rem;height:1.5rem;background-color:#ffc72c;color:#012169;-webkit-transition:background-color .3s ease;transition:background-color .3s ease;padding:0 .6rem;font-size:14px}@media (min-width:800px){.cookie-notification__button[data-v-43ff8dd4]{line-height:1.875rem;height:1.875rem;padding:0 1rem;font-size:1rem}}@media (min-width:1000px){.cookie-notification__button[data-v-43ff8dd4]{line-height:2rem;height:2rem}}@media (min-width:1700px){.cookie-notification__button[data-v-43ff8dd4]{line-height:2.25rem;height:2.25rem}}</style> </head> <body class="page-training" data-n-head="class"> <div data-server-rendered="true" id="__nuxt"><!----><div id="__layout"><main class="main-wrapper" data-v-43070d1a><header class="header" data-v-c09ce640><div class="header__wrapper" data-v-c09ce640><a href="/" aria-label="Home page" alt="Home page" class="header__logo" data-v-c09ce640><svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" x="0" y="0" viewBox="0 0 320 100" xml:space="preserve" data-v-c09ce640><style>.st0{fill:#012169}</style><path d="M127.2 40.7c0-2.3-1.8-4.1-4.1-4.1h-4.7c-2.3 0-4.1 1.8-4.1 4.1v18.6c0 2.2 1.9 4.1 4.1 4.1h4.7c2.3 0 4.1-1.9 4.1-4.1v-3.2h7v3.2c0 6.1-5 11.1-11.1 11.1h-4.7c-6.1 0-11.1-5.1-11.1-11.1V40.7c0-6.1 5-11.1 11.1-11.1h4.7c6.2 0 11.1 4.9 11.1 11.1v3.2h-7v-3.2zM163.4 40.7c0-2.3-1.8-4.1-4.1-4.1h-4.7c-2.3 0-4.1 1.8-4.1 4.1v18.6c0 2.2 1.9 4.1 4.1 4.1h4.7c2.3 0 4.1-1.9 4.1-4.1v-3.2h7v3.2c0 6.1-5 11.1-11.1 11.1h-4.7c-6.1 0-11.1-5.1-11.1-11.1V40.7c0-6.1 5-11.1 11.1-11.1h4.7c6.2 0 11.1 4.9 11.1 11.1v3.2h-7v-3.2zM206.6 40.7v18.6c0 6.1-5 11.1-11.1 11.1H179.7V29.6h15.8c6.1 0 11.1 4.9 11.1 11.1zm-7 0c0-2.3-1.8-4.1-4.1-4.1h-8.8v26.8h8.8c2.3 0 4.1-1.9 4.1-4.1V40.7zM235.8 40.7c0-2.3-1.8-4.1-4.1-4.1H227c-2.3 0-4.1 1.8-4.1 4.1v18.6c0 2.2 1.9 4.1 4.1 4.1h4.7c2.3 0 4.1-1.9 4.1-4.1v-3.2h7v3.2c0 6.1-5 11.1-11.1 11.1H227c-6.1 0-11.1-5.1-11.1-11.1V40.7c0-6.1 5-11.1 11.1-11.1h4.7c6.2 0 11.1 4.9 11.1 11.1v3.2h-7v-3.2zM263.2 70.4c-6.1 0-11.1-5.1-11.1-11.1V40.7c0-6.1 5-11.1 11.1-11.1h4.7c6.2 0 11.1 4.9 11.1 11.1v18.6c0 6.1-5 11.1-11.1 11.1h-4.7zm8.8-11.1V40.7c0-2.3-1.8-4.1-4.1-4.1h-4.7c-2.3 0-4.1 1.8-4.1 4.1v18.6c0 2.2 1.9 4.1 4.1 4.1h4.7c2.3 0 4.1-1.9 4.1-4.1zM295.3 36.6v8.9h17.5v7h-17.5v10.9h19.8v7h-26.8V29.6h26.8v7h-19.8z" class="st0"></path><g><path d="M86.5 33.8c-2.2-5.2-5.3-9.8-9.2-13.8-3.9-3.9-8.6-7.1-13.8-9.2-5-2.1-10.5-3.2-16.2-3.2-5.8 0-11.2 1.2-16.2 3.2-5.2 2.2-9.9 5.3-13.8 9.2-3.9 3.9-7.1 8.6-9.2 13.8C6 38.8 4.8 44.2 4.8 50h7c0-4.8 1-9.4 2.7-13.6 1.8-4.3 4.4-8.2 7.7-11.5 3.3-3.3 7.2-5.9 11.5-7.7 4.2-1.7 8.8-2.7 13.6-2.7 4.8 0 9.4 1 13.6 2.7 4.3 1.8 8.2 4.4 11.5 7.7 3.3 3.3 5.9 7.2 7.7 11.5 1.7 4.2 2.7 8.8 2.7 13.6s-1 9.4-2.7 13.6c-1.8 4.3-4.4 8.2-7.7 11.5-3.3 3.3-7.2 5.9-11.5 7.7-4.2 1.7-8.8 2.7-13.6 2.7-4.8 0-9.4-1-13.6-2.7L31 89.3c5 2.1 10.5 3.2 16.2 3.2 5.8 0 11.2-1.2 16.2-3.2 5.2-2.2 9.8-5.3 13.8-9.2 3.9-3.9 7.1-8.6 9.2-13.8 2.1-5 3.2-10.5 3.2-16.2s-1-11.3-3.1-16.3z" class="st0"></path><path d="M47.3 78.3c3.8 0 7.5-.8 10.8-2.2 3.5-1.4 6.6-3.5 9.2-6.1 2.6-2.6 4.7-5.7 6.1-9.2 1.4-3.3 2.2-7 2.2-10.8s-.8-7.5-2.2-10.8c-1.4-3.5-3.5-6.6-6.1-9.2-2.6-2.6-5.7-4.7-9.2-6.1-3.3-1.4-7-2.2-10.8-2.2v7c2.9 0 5.6.6 8.1 1.6 2.6 1.1 4.9 2.7 6.9 4.6 2 2 3.5 4.3 4.6 6.9 1 2.5 1.6 5.3 1.6 8.1s-.6 5.6-1.6 8.1c-1.1 2.6-2.7 4.9-4.6 6.9-2 2-4.3 3.5-6.9 4.6-2.5 1-5.3 1.6-8.1 1.6-2.9 0-5.6-.6-8.1-1.6-2.6-1.1-4.9-2.7-6.9-4.6-2-2-3.5-4.3-4.6-6.9-1-2.5-1.6-5.3-1.6-8.1s.6-5.6 1.6-8.1l-6.5-2.7c-1.4 3.3-2.2 7-2.2 10.8s.8 7.5 2.2 10.8c1.4 3.5 3.5 6.6 6.1 9.2 2.6 2.6 5.7 4.7 9.2 6.1 3.3 1.5 7 2.3 10.8 2.3z" class="st0"></path><path d="M52.3 55c-.7.7-1.4 1.2-2.3 1.5l2.7 6.5c1.7-.7 3.3-1.8 4.6-3.1 1.3-1.3 2.3-2.9 3.1-4.6.7-1.7 1.1-3.5 1.1-5.4s-.4-3.7-1.1-5.4c-.7-1.7-1.8-3.3-3.1-4.6-1.3-1.3-2.9-2.3-4.6-3.1-1.7-.7-3.5-1.1-5.4-1.1-1.9 0-3.7.4-5.4 1.1-1.7.7-3.3 1.8-4.6 3.1-1.3 1.3-2.3 2.9-3.1 4.6-.7 1.7-1.1 3.5-1.1 5.4s.4 3.7 1.1 5.4c.7 1.7 1.8 3.3 3.1 4.6 1.3 1.3 2.9 2.3 4.6 3.1l2.7-6.5c-.9-.4-1.7-.9-2.3-1.5-.7-.7-1.2-1.4-1.5-2.3-.3-.8-.5-1.8-.5-2.7s.2-1.9.5-2.7c.4-.9.9-1.7 1.5-2.3.7-.7 1.4-1.2 2.3-1.5.8-.3 1.8-.5 2.7-.5 1 0 1.9.2 2.7.5.9.4 1.7.9 2.3 1.5.7.7 1.2 1.4 1.5 2.3.3.8.5 1.8.5 2.7s-.2 1.9-.5 2.7c-.3.9-.8 1.7-1.5 2.3z" class="st0"></path></g></svg></a> <div class="main-menu" data-v-d4f26a94 data-v-c09ce640><nav class="main-menu__wrapper" data-v-d4f26a94><a href="/about-us" class="main-menu__link" data-v-d4f26a94>About us</a> <a href="/research" class="main-menu__link" data-v-d4f26a94>Research</a> <a href="/library/publications" class="main-menu__link" data-v-d4f26a94>Library</a> <a href="/training" class="main-menu__link main-menu__link--active" data-v-d4f26a94>Training</a> <a href="/exercises" class="main-menu__link" data-v-d4f26a94>Exercises</a> <a href="/cycon" class="main-menu__link" data-v-d4f26a94>CyCon</a> <a href="/careers" class="main-menu__link" data-v-d4f26a94>Careers</a> <a href="/news" class="main-menu__link" data-v-d4f26a94>News</a> <a href="/contact" class="main-menu__link" data-v-d4f26a94>Contact</a></nav></div></div> <button aria-label="Menu Toggle" class="header__menu-toggle" data-v-c09ce640><span data-v-c09ce640></span> <span data-v-c09ce640></span> <span data-v-c09ce640></span></button></header> <div class="container" data-v-cf545066><header class="page-header" data-v-39bad662 data-v-cf545066><div class="page-header__wrapper" data-v-39bad662><div class="page-header__text-wrapper" data-v-39bad662><div class="page-header__title-wrapper" data-v-39bad662><h1 class="page-header__title" data-v-39bad662>Training</h1></div> <!----></div> <!----></div></header> <div class="container__content" data-v-cf545066><div class="trainings-page" data-v-cf545066><div class="trainings-page__row trainings-page__content-columns" data-v-cf545066><div class="trainings-page__content" data-v-cf545066><div class="content-block content-block--expanded" data-v-301db0d5 data-v-cf545066><article class="content-block__wrapper" data-v-301db0d5><div class="content-block__content" data-v-301db0d5><table style="border-collapse:collapse;width:99.6374%;height:166px"> <tbody> <tr style="height:24px"> <td style="width:100%;height:24px"></td> <td style="height:24px"></td> </tr> <tr style="height:10px"> <td style="width:100%;height:54px;background-color:navy;text-align:center" rowspan="2"><a href="/uploads/2025/04/2025_NATO_CCD_COE_Training_Catalogue_final.pdf"><strong><span style="font-size:18pt;color:#fff">Training Catalogue for 2025</span></strong></a></td> <td style="height:30px"></td> </tr> <tr style="height:24px"> <td style="width:100%;height:24px"></td> </tr> <tr style="height:24px"> <td style="width:100%;height:24px"></td> <td style="height:24px"></td> </tr> <tr style="height:24px"> <td style="width:100%;height:64px;background-color:navy;text-align:center"><a href="/uploads/2025/03/National-Training-POCs.pdf"><span style="color:#fff;font-size:18pt"><strong>Education & Training Point of Contact (POC) in your country</strong></span></a></td> <td style="height:64px"></td> </tr> </tbody> </table> <p> </p> <p><strong><span style="font-size:14pt">If you want to attend the course:</span></strong></p> <ul> <li><strong><span style="font-size:14pt">Contact your National E&T POC (see the list above) in order to get a course registration code</span></strong></li> <li><strong><span style="font-size:14pt">Register online by clicking on the selected course below</span></strong></li> </ul> </div></article> </div></div> <div class="trainings-page__content" data-v-cf545066><div class="content-block content-block--expanded content-block--training" data-v-301db0d5 data-v-cf545066><article class="content-block__wrapper" data-v-301db0d5><div class="content-block__content" data-v-301db0d5><h2>Training Portfolio</h2> <h4>Strategic Level Training</h4> <ul> <li>Executive Cyber Seminar</li> </ul> <h4>Operational Level Training</h4> <ul> <li>Integrating Cyberspace Considerations into Operational Planning Course</li> <li>Critical Information Infrastructure Protection Course</li> </ul> <h4>Legal Training</h4> <ul> <li>International Law of Cyber Operations Course</li> </ul> </div></article> </div></div> <div class="trainings-page__content" data-v-cf545066><div class="content-block content-block--expanded content-block--training" data-v-301db0d5 data-v-cf545066><article class="content-block__wrapper" data-v-301db0d5><div class="content-block__content" data-v-301db0d5><h4 style="text-align:left">Technical Training</h4> <ul> <li style="text-align:left">Malware and Exploits Essentials Course</li> <li style="text-align:left">IT Systems Attacks and Defence Course</li> <li style="text-align:left">Introductory Digital Forensics Course</li> <li style="text-align:left">Industrial Control Systems Security Introductory Course</li> <li>Reverse Engineering Malware Course</li> <li>Exploit Advanced Course</li> </ul> </div></article> </div></div></div> <div class="trainings-page__row" data-v-cf545066><h2 class="trainings-page__heading" data-v-cf545066>Upcoming Courses:</h2></div> <div class="trainings-page__row" data-v-cf545066><div class="items-filter" data-v-60e106aa data-v-cf545066><span class="tag-item tag-item--clickable tag-item--trainings" data-v-27d0d06f data-v-60e106aa><span data-v-27d0d06f>Law</span></span><span class="tag-item tag-item--clickable tag-item--trainings" data-v-27d0d06f data-v-60e106aa><span data-v-27d0d06f>Operational</span></span><span class="tag-item tag-item--clickable tag-item--trainings" data-v-27d0d06f data-v-60e106aa><span data-v-27d0d06f>Strategic</span></span><span class="tag-item tag-item--clickable tag-item--trainings" data-v-27d0d06f data-v-60e106aa><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--clickable tag-item--trainings" data-v-27d0d06f data-v-60e106aa><span data-v-27d0d06f>e-Learning</span></span></div></div> <div class="trainings-page__row" data-v-cf545066><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/international-law-of-cyber-operations-may-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Law.png" data-srcset="/uploads/2018/12/Law.png 1000w, /uploads/2018/12/Law-300x240.png 300w, /uploads/2018/12/Law-768x614.png 768w, /uploads/2018/12/Law-45x36.png 45w, /uploads/2018/12/Law-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Law</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>International Law of Cyber Operations (May 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>Course Aim The aim of the course is to provide personnel working within the legal framework of NATO cyberspace operations...</p> <time class="common-item__time" data-v-7da8e4c7>19 – 23 May 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/exploit-advanced-course-june-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Technical.png" data-srcset="/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Exploit Advanced Course (June 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>This 5-day course will provide a very practical training for skills needed in exploitation research and malware analysis. We will...</p> <time class="common-item__time" data-v-7da8e4c7>2 – 6 June 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/executive-cyber-seminar-7" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Strategic.png" data-srcset="/uploads/2018/12/Strategic.png 1000w, /uploads/2018/12/Strategic-300x240.png 300w, /uploads/2018/12/Strategic-768x614.png 768w, /uploads/2018/12/Strategic-45x36.png 45w, /uploads/2018/12/Strategic-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Strategic</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Executive Cyber Seminar (June 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>This seminar has been designed for senior level staff, primarily in NATO and defence, who are new into post and/or...</p> <time class="common-item__time" data-v-7da8e4c7>9 – 11 June 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/introductory-digital-forensics-course-june-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Technical.png" data-srcset="/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Introductory Digital Forensics Course (June 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>Course Aim The course is targeted at technical IT staff who are used to working with IT in roles such...</p> <time class="common-item__time" data-v-7da8e4c7>16 – 20 June 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/locked-shields-forensics-workshop-june-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Technical.png" data-srcset="/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Locked Shields Forensics Workshop (June 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>Aim of the workshop Locked Shields Forensic Workshop (LSFW) is a hands-on analysis of the Locked Shields DFIR challenge. Participants...</p> <time class="common-item__time" data-v-7da8e4c7>25 – 27 June 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/malware-and-exploit-essentials-course-september-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Technical.png" data-srcset="/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Malware and Exploit Essentials Course (September 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>The Malware and Exploit Essentials course will provide deep technical insights for cyber defenders into techniques that malware uses to...</p> <time class="common-item__time" data-v-7da8e4c7>1 – 5 September 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/industrial-control-systems-security-introductory-course-september-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Technical.png" data-srcset="/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Industrial Control Systems Security Introductory Course (September 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>Course Aim The aim of this course is to explain security issues of ICS/SCADA environments, and to provide students with...</p> <time class="common-item__time" data-v-7da8e4c7>8 – 12 September 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/integrating-cyberspace-considerations-into-operational-planning-september-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Operational.png" data-srcset="/uploads/2018/12/Operational.png 1000w, /uploads/2018/12/Operational-300x240.png 300w, /uploads/2018/12/Operational-768x614.png 768w, /uploads/2018/12/Operational-45x36.png 45w, /uploads/2018/12/Operational-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Operational</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Integrating Cyberspace Considerations Into Operational Planning (September 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>The aim of this course to provide a comprehensive knowledge of cyberspace as a military operational domain, to guide operational...</p> <time class="common-item__time" data-v-7da8e4c7>15 – 19 September 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/international-law-of-cyber-operations-september-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Law.png" data-srcset="/uploads/2018/12/Law.png 1000w, /uploads/2018/12/Law-300x240.png 300w, /uploads/2018/12/Law-768x614.png 768w, /uploads/2018/12/Law-45x36.png 45w, /uploads/2018/12/Law-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Law</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>International Law of Cyber Operations (September 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>Course Aim The aim of the course is to provide personnel working within the legal framework of NATO cyberspace operations...</p> <time class="common-item__time" data-v-7da8e4c7>22 – 26 September 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/introductory-digital-forensics-course-october-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Technical.png" data-srcset="/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Introductory Digital Forensics Course (October 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>Course Aim The course is targeted at technical IT staff who are used to working with IT in roles such...</p> <time class="common-item__time" data-v-7da8e4c7>13 – 17 October 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/it-systems-attack-and-defence-course-october-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Technical.png" data-srcset="/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>IT Systems Attack and Defence Course (October 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>IT Systems Attack and Defence is a practical 5-day course, intended for system administrators, developers and other technical personnel. The...</p> <time class="common-item__time" data-v-7da8e4c7>20 – 24 October 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/cyber-threat-intelligence-course-october-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Technical.png" data-srcset="/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Cyber Threat Intelligence Course (October 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>Course Aim The aim of the course is to provide national intelligence practitioners with the skills and knowledge required to...</p> <time class="common-item__time" data-v-7da8e4c7>27 October – 7 November 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/executive-cyber-seminar-november-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Strategic.png" data-srcset="/uploads/2018/12/Strategic.png 1000w, /uploads/2018/12/Strategic-300x240.png 300w, /uploads/2018/12/Strategic-768x614.png 768w, /uploads/2018/12/Strategic-45x36.png 45w, /uploads/2018/12/Strategic-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Strategic</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Executive Cyber Seminar (November 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>This seminar has been designed for senior level staff, primarily in NATO and defence, who are new into post and/or...</p> <time class="common-item__time" data-v-7da8e4c7>3 – 5 November 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/critical-information-infrastructure-protection-course-may-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Operational.png" data-srcset="/uploads/2018/12/Operational.png 1000w, /uploads/2018/12/Operational-300x240.png 300w, /uploads/2018/12/Operational-768x614.png 768w, /uploads/2018/12/Operational-45x36.png 45w, /uploads/2018/12/Operational-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Operational</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Critical Information Infrastructure Protection Course (Nov 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>This 5-day (4-day if online) unclassified course is intended for mid-level managers responsible for the protection of Critical Information Infrastructure....</p> <time class="common-item__time" data-v-7da8e4c7>10 – 14 November 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/international-law-of-cyber-operations-december-2025" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/Law.png" data-srcset="/uploads/2018/12/Law.png 1000w, /uploads/2018/12/Law-300x240.png 300w, /uploads/2018/12/Law-768x614.png 768w, /uploads/2018/12/Law-45x36.png 45w, /uploads/2018/12/Law-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Law</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>International Law of Cyber Operations (December 2025)</h4> <p class="common-item__description" data-v-7da8e4c7>Course Aim The aim of the course is to provide personnel working within the legal framework of NATO cyberspace operations...</p> <time class="common-item__time" data-v-7da8e4c7>8 – 12 December 2025</time></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/cyber-defence-monitoring-adl-420" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Cyber Defence Monitoring (ADL 430)</h4> <p class="common-item__description" data-v-7da8e4c7>This e-Learning course is a mandatory e-learning module of the residential Cyber Defence Monitoring courses and can be used as...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/international-law-of-cyber-operations-course-adl-420" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Law</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>International Law of Cyber Operations Course (ADL 420)</h4> <p class="common-item__description" data-v-7da8e4c7>This e-Learning course is a mandatory  e-learning module of the residential International Law of Cyber Operations  Course. The aim of this course...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/operational-cyber-threat-intelligence-course-adl-230" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Operational</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Operational Cyber Threat Intelligence Course (ADL 230)</h4> <p class="common-item__description" data-v-7da8e4c7>This e-Learning course is a mandatory e-learning module of the residential Operational Cyber Threat Intelligence course. The aim of this...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/it-systems-attack-and-defence-3" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>IT Systems Attack and Defence (ADL 394)</h4> <p class="common-item__description" data-v-7da8e4c7>This e-Learning course is a mandatory  e-learning module of the residential IT Systems Attacks and Defence course. The aim of this course...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/malware-and-exploit-essentials-2" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Malware and Exploit Essentials (ADL 383)</h4> <p class="common-item__description" data-v-7da8e4c7>This course is a mandatory  e-learning module of the residential Malware and Exploit Essentials course. The aim of this course to provide...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/integrating-cyber-considerations-into-operational-planning" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Operational</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Integrating Cyber Considerations into Operational Planning (ADL 375)</h4> <p class="common-item__description" data-v-7da8e4c7>This course is a mandatory e-learning module of the residential Integrating Cyber Considerations into Operational Planning course. The aim of...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/information-security-management-system-course" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Information Security Management System (ADL 343)</h4> <p class="common-item__description" data-v-7da8e4c7>To support the preparation of participants in the Centre residential technical courses, the Centre provides an online web-based course on...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/systematic-approaches-to-the-mitigation-of-cyber-threats-course" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Systematic Approaches to the Mitigation of Cyber Threats (ADL 349)</h4> <p class="common-item__description" data-v-7da8e4c7>To support the preparation of participants in the Botnet Mitigation Course, the Centre provides an online web-based course on systematic...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/fighting-a-botnet-attack-a-case-study-course" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Fighting a Botnet Attack: Case Study (ADL 348)</h4> <p class="common-item__description" data-v-7da8e4c7>To support the preparation of participants in the Botnet Mitigation Course, the Centre provides an online web-based course on fighting...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/critical-infrastructure-and-industrial-control-systems-course" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Critical Infrastructure and Industrial Control Systems (ADL 347)</h4> <p class="common-item__description" data-v-7da8e4c7>To support the preparation of participants in the Industrial Control Systems Security Course, the Centre provides an online web-based course...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/web-application-security-course" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Web Application Security (ADL 346)</h4> <p class="common-item__description" data-v-7da8e4c7>To support the preparation of participants in the Web Applications Attack and Defence Course, the Centre provides an online web-based...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/network-and-log-monitoring-course" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Network and Log Monitoring (ADL 345)</h4> <p class="common-item__description" data-v-7da8e4c7>To support the preparation of participants in the different modules to the Cyber Defence Monitoring Suite, the Centre provides an...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/digital-forensics-and-digital-evidence-course" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Technical</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Digital Forensics and Digital Evidence (ADL 344)</h4> <p class="common-item__description" data-v-7da8e4c7>To support the preparation of participants in the Introductory Digital Forensics Course, the Centre provides an online web-based course on...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/cyber-awareness-course-for-system-administrators" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Cyber Awareness Course for System Administrators (ADL 335)</h4> <p class="common-item__description" data-v-7da8e4c7>The course aims to enhance the network and system administrators’ skills regarding the different aspects of awareness regarding the current...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/cyber-defence-awareness-e-course" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Cyber Defence Awareness (ADL 076)</h4> <p class="common-item__description" data-v-7da8e4c7>The Cyber Defence Awareness e-Learning course aims to enhance the general user’s awareness of cyber security risks and measures to...</p> <!----></div></a></div><div class="common-item" data-v-7da8e4c7 data-v-cf545066><a href="/training/cyber-awareness-course-tallinn-manual-module" class="common-item__link" data-v-7da8e4c7><div class="common-item__image-wrapper" data-v-7da8e4c7><img data-sizes="auto" data-src="/uploads/2018/12/e-Learning.png" data-srcset="/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w" alt="" class="lazyload-image lazyload image-item common-item__image" data-v-7da8e4c7></div> <div class="common-item__tags" data-v-7da8e4c7><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>Law</span></span><span class="tag-item tag-item--no-margin tag-item--gray tag-item--trainings" data-v-27d0d06f data-v-7da8e4c7><span data-v-27d0d06f>e-Learning</span></span></div> <div class="common-item__content" data-v-7da8e4c7><h4 class="common-item__title" data-v-7da8e4c7>Cyber Awareness, Tallinn Manual Module (ADL 365)</h4> <p class="common-item__description" data-v-7da8e4c7>The course aims to prepare the participants of the International Law of Cyber Operations Course (residential course of CCDCOE), providing...</p> <!----></div></a></div></div></div></div></div> <footer class="footer" data-v-99883df8><div class="footer__wrapper" data-v-99883df8><div class="footer__name" data-v-99883df8><p data-v-99883df8>The NATO Cooperative Cyber Defence Centre of Excellence</p></div> <div class="footer__contacts" data-v-99883df8><div class="footer__content" data-v-99883df8><p>ccdcoe-at-ccdcoe.org<br> +372 7176 800<br> Filtri tee 5, Tallinn 10132, Estonia</p> </div></div> <div class="footer__social" data-v-99883df8><div class="footer__content" data-v-99883df8><p><a href="https://www.linkedin.com/company/natoccdcoe/">LinkedIn</a></p> <p><a href="https://x.com/ccdcoe">X</a></p> <p><a href="https://www.youtube.com/user/natoccdcoe">Youtube</a></p> <p><a href="https://www.flickr.com/photos/133800821@N02/albums">Flickr</a></p> <p><a href="https://www.facebook.com/ccdcoe">Facebook </a></p> <p> </p> <p> </p> <p> </p> </div></div></div></footer> <!----></main></div></div><script>window.__NUXT__=function(e,i,t,a,n,r,h,s,l,d,m,g,o,p,u,x,c,_,w,b,f,k,y,v,C,T,D,A,L,S,q,I,E,z,O,M,P,j,K,B,N,R,G,W,F,J,V,H,U,Z,X,Y,Q,$,ee,ie,te,ae,ne,re,he,se,le,de,me,ge,oe,pe,ue,xe,ce,_e,we,be,fe,ke,ye,ve,Ce,Te,De,Ae,Le,Se,qe,Ie,Ee,ze,Oe,Me,Pe,je,Ke,Be,Ne,Re,Ge,We,Fe,Je,Ve,He,Ue,Ze,Xe,Ye,Qe,$e,ei,ii,ti,ai,ni,ri){return{layout:"default",data:[{data:{ID:"30",slug:"training",title:"Training",content:'<table style="border-collapse: collapse; width: 99.6374%; height: 166px;">\n<tbody>\n<tr style="height: 24px;">\n<td style="width: 100%; height: 24px;"></td>\n<td style="height: 24px;"></td>\n</tr>\n<tr style="height: 10px;">\n<td style="width: 100%; height: 54px; background-color: #000080; text-align: center;" rowspan="2"><a href="/uploads/2025/04/2025_NATO_CCD_COE_Training_Catalogue_final.pdf"><strong><span style="font-size: 18pt; color: #ffffff;">Training Catalogue for 2025</span></strong></a></td>\n<td style="height: 30px;"></td>\n</tr>\n<tr style="height: 24px;">\n<td style="width: 100%; height: 24px;"></td>\n</tr>\n<tr style="height: 24px;">\n<td style="width: 100%; height: 24px;"></td>\n<td style="height: 24px;"></td>\n</tr>\n<tr style="height: 24px;">\n<td style="width: 100%; height: 64px; background-color: #000080; text-align: center;"><a href="/uploads/2025/03/National-Training-POCs.pdf"><span style="color: #ffffff; font-size: 18pt;"><strong>Education &amp; Training Point of Contact (POC) in your country</strong></span></a></td>\n<td style="height: 64px;"></td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n<p><strong><span style="font-size: 14pt;">If you want to attend the course:</span></strong></p>\n<ul>\n<li><strong><span style="font-size: 14pt;">Contact your National E&amp;T POC (see the list above) in order to get a course registration code</span></strong></li>\n<li><strong><span style="font-size: 14pt;">Register online by clicking on the selected course below</span></strong></li>\n</ul>\n',acf:{training_portfolio_column_1:"<h2>Training Portfolio</h2>\n<h4>Strategic Level Training</h4>\n<ul>\n<li>Executive Cyber Seminar</li>\n</ul>\n<h4>Operational Level Training</h4>\n<ul>\n<li>Integrating Cyberspace Considerations into Operational Planning Course</li>\n<li>Critical Information Infrastructure Protection Course</li>\n</ul>\n<h4>Legal Training</h4>\n<ul>\n<li>International Law of Cyber Operations Course</li>\n</ul>\n",training_portfolio_column_2:'<h4 style="text-align: left;">Technical Training</h4>\n<ul>\n<li style="text-align: left;">Malware and Exploits Essentials Course</li>\n<li style="text-align: left;">IT Systems Attacks and Defence Course</li>\n<li style="text-align: left;">Introductory Digital Forensics Course</li>\n<li style="text-align: left;">Industrial Control Systems Security Introductory Course</li>\n<li>Reverse Engineering Malware Course</li>\n<li>Exploit Advanced Course</li>\n</ul>\n'},trainings:[{slug:"international-law-of-cyber-operations-may-2025",title:"International Law of Cyber Operations (May 2025)",excerpt:ve,post_date:"2024-10-21 14:18:32",thumbnail:{ID:3111,title:ee,url:h,alt:a,caption:a,description:a,width:e,height:i,srcset:ye,sizes:{thumbnail:ke,"thumbnail-width":r,"thumbnail-height":r,medium:fe,"medium-width":u,"medium-height":p,medium_large:be,"medium_large-width":l,"medium_large-height":s,large:h,"large-width":e,"large-height":i,thumbnail_lqip:we,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":ge,"1400px-width":g,"1400px-height":o,"1600px":h,"1600px-width":e,"1600px-height":i,"1800px":h,"1800px-width":e,"1800px-height":i,"2000px":h,"2000px-width":e,"2000px-height":i,"2200px":h,"2200px-width":e,"2200px-height":i,"2400px":h,"2400px-width":e,"2400px-height":i,"2800px":h,"2800px-width":e,"2800px-height":i,"3200px":h,"3200px-width":e,"3200px-height":i,"3500px":h,"3500px-width":e,"3500px-height":i,"1536x1536":h,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":h,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"05/19/2025",ending_date:"05/23/2025"},registration_time:{registration_starts:A,registration_ends:"03/21/2025"},location:L,participation_fee:S,register_link:"https://cvent.me/wmNWEZ"},taxonomies:{"trainings-categories":[K]}},{slug:"exploit-advanced-course-june-2025",title:"Exploit Advanced Course (June 2025)",excerpt:"This 5-day course will provide a very practical training for skills needed in exploitation research and malware analysis. We will...",post_date:"2024-10-22 09:40:05",thumbnail:{ID:P,title:q,url:n,alt:a,caption:a,description:a,width:e,height:i,srcset:j,sizes:{thumbnail:M,"thumbnail-width":r,"thumbnail-height":r,medium:O,"medium-width":u,"medium-height":p,medium_large:z,"medium_large-width":l,"medium_large-height":s,large:n,"large-width":e,"large-height":i,thumbnail_lqip:E,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":I,"1400px-width":g,"1400px-height":o,"1600px":n,"1600px-width":e,"1600px-height":i,"1800px":n,"1800px-width":e,"1800px-height":i,"2000px":n,"2000px-width":e,"2000px-height":i,"2200px":n,"2200px-width":e,"2200px-height":i,"2400px":n,"2400px-width":e,"2400px-height":i,"2800px":n,"2800px-width":e,"2800px-height":i,"3200px":n,"3200px-width":e,"3200px-height":i,"3500px":n,"3500px-width":e,"3500px-height":i,"1536x1536":n,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":n,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"06/02/2025",ending_date:"06/06/2025"},registration_time:{registration_starts:A,registration_ends:"03/28/2025"},location:L,participation_fee:S,register_link:"https://cvent.me/WVDKRL"},taxonomies:{"trainings-categories":[_]}},{slug:"executive-cyber-seminar-7",title:"Executive Cyber Seminar (June 2025)",excerpt:ti,post_date:"2024-10-21 11:31:01",thumbnail:{ID:3113,title:ce,url:x,alt:a,caption:a,description:a,width:e,height:i,srcset:Le,sizes:{thumbnail:Ie,"thumbnail-width":r,"thumbnail-height":r,medium:Oe,"medium-width":u,"medium-height":p,medium_large:Me,"medium_large-width":l,"medium_large-height":s,large:x,"large-width":e,"large-height":i,thumbnail_lqip:Pe,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":je,"1400px-width":g,"1400px-height":o,"1600px":x,"1600px-width":e,"1600px-height":i,"1800px":x,"1800px-width":e,"1800px-height":i,"2000px":x,"2000px-width":e,"2000px-height":i,"2200px":x,"2200px-width":e,"2200px-height":i,"2400px":x,"2400px-width":e,"2400px-height":i,"2800px":x,"2800px-width":e,"2800px-height":i,"3200px":x,"3200px-width":e,"3200px-height":i,"3500px":x,"3500px-width":e,"3500px-height":i,"1536x1536":x,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":x,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"06/09/2025",ending_date:"06/11/2025"},registration_time:{registration_starts:"02/03/2025",registration_ends:Ke},location:"Bruxelles",participation_fee:"no course fee ",register_link:"https://cvent.me/3VqRV9"},taxonomies:{"trainings-categories":[xe]}},{slug:"introductory-digital-forensics-course-june-2025",title:"Introductory Digital Forensics Course (June 2025)",excerpt:Ne,post_date:"2024-10-22 10:58:50",thumbnail:{ID:P,title:q,url:n,alt:a,caption:a,description:a,width:e,height:i,srcset:j,sizes:{thumbnail:M,"thumbnail-width":r,"thumbnail-height":r,medium:O,"medium-width":u,"medium-height":p,medium_large:z,"medium_large-width":l,"medium_large-height":s,large:n,"large-width":e,"large-height":i,thumbnail_lqip:E,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":I,"1400px-width":g,"1400px-height":o,"1600px":n,"1600px-width":e,"1600px-height":i,"1800px":n,"1800px-width":e,"1800px-height":i,"2000px":n,"2000px-width":e,"2000px-height":i,"2200px":n,"2200px-width":e,"2200px-height":i,"2400px":n,"2400px-width":e,"2400px-height":i,"2800px":n,"2800px-width":e,"2800px-height":i,"3200px":n,"3200px-width":e,"3200px-height":i,"3500px":n,"3500px-width":e,"3500px-height":i,"1536x1536":n,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":n,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"06/16/2025",ending_date:"06/20/2025"},registration_time:{registration_starts:A,registration_ends:"04/11/2025"},location:L,participation_fee:S,register_link:"https://cvent.me/KNQPQV"},taxonomies:{"trainings-categories":[_]}},{slug:"locked-shields-forensics-workshop-june-2025",title:"Locked Shields Forensics Workshop (June 2025)",excerpt:"Aim of the workshop Locked Shields Forensic Workshop (LSFW) is a hands-on analysis of the Locked Shields DFIR challenge. Participants...",post_date:"2024-10-22 11:09:40",thumbnail:{ID:P,title:q,url:n,alt:a,caption:a,description:a,width:e,height:i,srcset:j,sizes:{thumbnail:M,"thumbnail-width":r,"thumbnail-height":r,medium:O,"medium-width":u,"medium-height":p,medium_large:z,"medium_large-width":l,"medium_large-height":s,large:n,"large-width":e,"large-height":i,thumbnail_lqip:E,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":I,"1400px-width":g,"1400px-height":o,"1600px":n,"1600px-width":e,"1600px-height":i,"1800px":n,"1800px-width":e,"1800px-height":i,"2000px":n,"2000px-width":e,"2000px-height":i,"2200px":n,"2200px-width":e,"2200px-height":i,"2400px":n,"2400px-width":e,"2400px-height":i,"2800px":n,"2800px-width":e,"2800px-height":i,"3200px":n,"3200px-width":e,"3200px-height":i,"3500px":n,"3500px-width":e,"3500px-height":i,"1536x1536":n,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":n,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"06/25/2025",ending_date:"06/27/2025"},registration_time:{registration_starts:A,registration_ends:Ke},location:L,participation_fee:"On-line : 0€ (1 free slot per CCDCOE member nation and NATO bodies for registration)",register_link:"https://cvent.me/lde34g"},taxonomies:{"trainings-categories":[_]}},{slug:"malware-and-exploit-essentials-course-september-2025",title:"Malware and Exploit Essentials Course (September 2025)",excerpt:"The Malware and Exploit Essentials course will provide deep technical insights for cyber defenders into techniques that malware uses to...",post_date:"2024-10-22 11:24:57",thumbnail:{ID:P,title:q,url:n,alt:a,caption:a,description:a,width:e,height:i,srcset:j,sizes:{thumbnail:M,"thumbnail-width":r,"thumbnail-height":r,medium:O,"medium-width":u,"medium-height":p,medium_large:z,"medium_large-width":l,"medium_large-height":s,large:n,"large-width":e,"large-height":i,thumbnail_lqip:E,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":I,"1400px-width":g,"1400px-height":o,"1600px":n,"1600px-width":e,"1600px-height":i,"1800px":n,"1800px-width":e,"1800px-height":i,"2000px":n,"2000px-width":e,"2000px-height":i,"2200px":n,"2200px-width":e,"2200px-height":i,"2400px":n,"2400px-width":e,"2400px-height":i,"2800px":n,"2800px-width":e,"2800px-height":i,"3200px":n,"3200px-width":e,"3200px-height":i,"3500px":n,"3500px-width":e,"3500px-height":i,"1536x1536":n,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":n,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"09/01/2025",ending_date:Re},registration_time:{registration_starts:A,registration_ends:"07/04/2025"},location:L,participation_fee:S,register_link:"https://cvent.me/dxzkYb"},taxonomies:{"trainings-categories":[_]}},{slug:"industrial-control-systems-security-introductory-course-september-2025",title:"Industrial Control Systems Security Introductory Course (September 2025)",excerpt:"Course Aim The aim of this course is to explain security issues of ICS/SCADA environments, and to provide students with...",post_date:"2024-10-22 11:36:30",thumbnail:{ID:P,title:q,url:n,alt:a,caption:a,description:a,width:e,height:i,srcset:j,sizes:{thumbnail:M,"thumbnail-width":r,"thumbnail-height":r,medium:O,"medium-width":u,"medium-height":p,medium_large:z,"medium_large-width":l,"medium_large-height":s,large:n,"large-width":e,"large-height":i,thumbnail_lqip:E,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":I,"1400px-width":g,"1400px-height":o,"1600px":n,"1600px-width":e,"1600px-height":i,"1800px":n,"1800px-width":e,"1800px-height":i,"2000px":n,"2000px-width":e,"2000px-height":i,"2200px":n,"2200px-width":e,"2200px-height":i,"2400px":n,"2400px-width":e,"2400px-height":i,"2800px":n,"2800px-width":e,"2800px-height":i,"3200px":n,"3200px-width":e,"3200px-height":i,"3500px":n,"3500px-width":e,"3500px-height":i,"1536x1536":n,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":n,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"09/08/2025",ending_date:Ge},registration_time:{registration_starts:A,registration_ends:"07/11/2025"},location:L,participation_fee:S,register_link:"https://cvent.me/x0W1yX"},taxonomies:{"trainings-categories":[_]}},{slug:"integrating-cyberspace-considerations-into-operational-planning-september-2025",title:"Integrating Cyberspace Considerations Into Operational Planning (September 2025)",excerpt:"The aim of this course to provide a comprehensive knowledge of cyberspace as a military operational domain, to guide operational...",post_date:"2024-10-22 14:08:09",thumbnail:{ID:3112,title:ue,url:c,alt:a,caption:a,description:a,width:e,height:i,srcset:ai,sizes:{thumbnail:Ce,"thumbnail-width":r,"thumbnail-height":r,medium:Te,"medium-width":u,"medium-height":p,medium_large:ri,"medium_large-width":l,"medium_large-height":s,large:c,"large-width":e,"large-height":i,thumbnail_lqip:Se,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":qe,"1400px-width":g,"1400px-height":o,"1600px":c,"1600px-width":e,"1600px-height":i,"1800px":c,"1800px-width":e,"1800px-height":i,"2000px":c,"2000px-width":e,"2000px-height":i,"2200px":c,"2200px-width":e,"2200px-height":i,"2400px":c,"2400px-width":e,"2400px-height":i,"2800px":c,"2800px-width":e,"2800px-height":i,"3200px":c,"3200px-width":e,"3200px-height":i,"3500px":c,"3500px-width":e,"3500px-height":i,"1536x1536":c,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":c,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"09/15/2025",ending_date:"09/19/2025"},registration_time:{registration_starts:A,registration_ends:"07/18/2024"},location:L,participation_fee:S,register_link:"https://cvent.me/zBAGxM"},taxonomies:{"trainings-categories":[ie]}},{slug:"international-law-of-cyber-operations-september-2025",title:"International Law of Cyber Operations (September 2025)",excerpt:ve,post_date:"2024-10-23 10:34:48",thumbnail:{ID:3111,title:ee,url:h,alt:a,caption:a,description:a,width:e,height:i,srcset:ye,sizes:{thumbnail:ke,"thumbnail-width":r,"thumbnail-height":r,medium:fe,"medium-width":u,"medium-height":p,medium_large:be,"medium_large-width":l,"medium_large-height":s,large:h,"large-width":e,"large-height":i,thumbnail_lqip:we,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":ge,"1400px-width":g,"1400px-height":o,"1600px":h,"1600px-width":e,"1600px-height":i,"1800px":h,"1800px-width":e,"1800px-height":i,"2000px":h,"2000px-width":e,"2000px-height":i,"2200px":h,"2200px-width":e,"2200px-height":i,"2400px":h,"2400px-width":e,"2400px-height":i,"2800px":h,"2800px-width":e,"2800px-height":i,"3200px":h,"3200px-width":e,"3200px-height":i,"3500px":h,"3500px-width":e,"3500px-height":i,"1536x1536":h,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":h,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"09/22/2025",ending_date:"09/26/2025"},registration_time:{registration_starts:A,registration_ends:Ee},location:L,participation_fee:S,register_link:"https://cvent.me/WVN7wy"},taxonomies:{"trainings-categories":[K]}},{slug:"introductory-digital-forensics-course-october-2025",title:"Introductory Digital Forensics Course (October 2025)",excerpt:Ne,post_date:"2024-10-22 14:33:59",thumbnail:{ID:P,title:q,url:n,alt:a,caption:a,description:a,width:e,height:i,srcset:j,sizes:{thumbnail:M,"thumbnail-width":r,"thumbnail-height":r,medium:O,"medium-width":u,"medium-height":p,medium_large:z,"medium_large-width":l,"medium_large-height":s,large:n,"large-width":e,"large-height":i,thumbnail_lqip:E,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":I,"1400px-width":g,"1400px-height":o,"1600px":n,"1600px-width":e,"1600px-height":i,"1800px":n,"1800px-width":e,"1800px-height":i,"2000px":n,"2000px-width":e,"2000px-height":i,"2200px":n,"2200px-width":e,"2200px-height":i,"2400px":n,"2400px-width":e,"2400px-height":i,"2800px":n,"2800px-width":e,"2800px-height":i,"3200px":n,"3200px-width":e,"3200px-height":i,"3500px":n,"3500px-width":e,"3500px-height":i,"1536x1536":n,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":n,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"10/13/2025",ending_date:"10/17/2025"},registration_time:{registration_starts:A,registration_ends:Ee},location:L,participation_fee:S,register_link:"https://cvent.me/ldedxa"},taxonomies:{"trainings-categories":[_]}},{slug:"it-systems-attack-and-defence-course-october-2025",title:"IT Systems Attack and Defence Course (October 2025)",excerpt:"IT Systems Attack and Defence is a practical 5-day course, intended for system administrators, developers and other technical personnel. The...",post_date:"2024-10-22 14:16:51",thumbnail:{ID:P,title:q,url:n,alt:a,caption:a,description:a,width:e,height:i,srcset:j,sizes:{thumbnail:M,"thumbnail-width":r,"thumbnail-height":r,medium:O,"medium-width":u,"medium-height":p,medium_large:z,"medium_large-width":l,"medium_large-height":s,large:n,"large-width":e,"large-height":i,thumbnail_lqip:E,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":I,"1400px-width":g,"1400px-height":o,"1600px":n,"1600px-width":e,"1600px-height":i,"1800px":n,"1800px-width":e,"1800px-height":i,"2000px":n,"2000px-width":e,"2000px-height":i,"2200px":n,"2200px-width":e,"2200px-height":i,"2400px":n,"2400px-width":e,"2400px-height":i,"2800px":n,"2800px-width":e,"2800px-height":i,"3200px":n,"3200px-width":e,"3200px-height":i,"3500px":n,"3500px-width":e,"3500px-height":i,"1536x1536":n,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":n,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"10/20/2025",ending_date:"10/24/2025"},registration_time:{registration_starts:A,registration_ends:"08/22/2025"},location:L,participation_fee:S,register_link:"https://cvent.me/G9B93W"},taxonomies:{"trainings-categories":[_]}},{slug:"cyber-threat-intelligence-course-october-2025",title:"Cyber Threat Intelligence Course (October 2025)",excerpt:"Course Aim The aim of the course is to provide national intelligence practitioners with the skills and knowledge required to...",post_date:"2024-10-23 10:20:16",thumbnail:{ID:P,title:q,url:n,alt:a,caption:a,description:a,width:e,height:i,srcset:j,sizes:{thumbnail:M,"thumbnail-width":r,"thumbnail-height":r,medium:O,"medium-width":u,"medium-height":p,medium_large:z,"medium_large-width":l,"medium_large-height":s,large:n,"large-width":e,"large-height":i,thumbnail_lqip:E,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":I,"1400px-width":g,"1400px-height":o,"1600px":n,"1600px-width":e,"1600px-height":i,"1800px":n,"1800px-width":e,"1800px-height":i,"2000px":n,"2000px-width":e,"2000px-height":i,"2200px":n,"2200px-width":e,"2200px-height":i,"2400px":n,"2400px-width":e,"2400px-height":i,"2800px":n,"2800px-width":e,"2800px-height":i,"3200px":n,"3200px-width":e,"3200px-height":i,"3500px":n,"3500px-width":e,"3500px-height":i,"1536x1536":n,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":n,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"10/27/2025",ending_date:"11/07/2025"},registration_time:{registration_starts:A,registration_ends:Re},location:L,participation_fee:S,register_link:"https://cvent.me/AmedZ8"},taxonomies:{"trainings-categories":[_]}},{slug:"executive-cyber-seminar-november-2025",title:"Executive Cyber Seminar (November 2025)",excerpt:ti,post_date:"2024-10-23 10:25:13",thumbnail:{ID:3113,title:ce,url:x,alt:a,caption:a,description:a,width:e,height:i,srcset:Le,sizes:{thumbnail:Ie,"thumbnail-width":r,"thumbnail-height":r,medium:Oe,"medium-width":u,"medium-height":p,medium_large:Me,"medium_large-width":l,"medium_large-height":s,large:x,"large-width":e,"large-height":i,thumbnail_lqip:Pe,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":je,"1400px-width":g,"1400px-height":o,"1600px":x,"1600px-width":e,"1600px-height":i,"1800px":x,"1800px-width":e,"1800px-height":i,"2000px":x,"2000px-width":e,"2000px-height":i,"2200px":x,"2200px-width":e,"2200px-height":i,"2400px":x,"2400px-width":e,"2400px-height":i,"2800px":x,"2800px-width":e,"2800px-height":i,"3200px":x,"3200px-width":e,"3200px-height":i,"3500px":x,"3500px-width":e,"3500px-height":i,"1536x1536":x,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":x,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"11/03/2025",ending_date:"11/05/2025"},registration_time:{registration_starts:A,registration_ends:ze},location:L,participation_fee:"no course fee",register_link:"https://cvent.me/EVxR1o"},taxonomies:{"trainings-categories":[xe]}},{slug:"critical-information-infrastructure-protection-course-may-2025",title:"Critical Information Infrastructure Protection Course (Nov 2025)",excerpt:"This 5-day (4-day if online) unclassified course is intended for mid-level managers responsible for the protection of Critical Information Infrastructure....",post_date:"2024-10-30 12:30:41",thumbnail:{ID:3112,title:ue,url:c,alt:a,caption:a,description:a,width:e,height:i,srcset:ai,sizes:{thumbnail:Ce,"thumbnail-width":r,"thumbnail-height":r,medium:Te,"medium-width":u,"medium-height":p,medium_large:ri,"medium_large-width":l,"medium_large-height":s,large:c,"large-width":e,"large-height":i,thumbnail_lqip:Se,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":qe,"1400px-width":g,"1400px-height":o,"1600px":c,"1600px-width":e,"1600px-height":i,"1800px":c,"1800px-width":e,"1800px-height":i,"2000px":c,"2000px-width":e,"2000px-height":i,"2200px":c,"2200px-width":e,"2200px-height":i,"2400px":c,"2400px-width":e,"2400px-height":i,"2800px":c,"2800px-width":e,"2800px-height":i,"3200px":c,"3200px-width":e,"3200px-height":i,"3500px":c,"3500px-width":e,"3500px-height":i,"1536x1536":c,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":c,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"11/10/2025",ending_date:"11/14/2025"},registration_time:{registration_starts:A,registration_ends:Ge},location:L,participation_fee:S,register_link:"https://cvent.me/oN8dd9"},taxonomies:{"trainings-categories":[ie]}},{slug:"international-law-of-cyber-operations-december-2025",title:"International Law of Cyber Operations (December 2025)",excerpt:ve,post_date:"2024-10-23 10:41:56",thumbnail:{ID:3111,title:ee,url:h,alt:a,caption:a,description:a,width:e,height:i,srcset:ye,sizes:{thumbnail:ke,"thumbnail-width":r,"thumbnail-height":r,medium:fe,"medium-width":u,"medium-height":p,medium_large:be,"medium_large-width":l,"medium_large-height":s,large:h,"large-width":e,"large-height":i,thumbnail_lqip:we,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":ge,"1400px-width":g,"1400px-height":o,"1600px":h,"1600px-width":e,"1600px-height":i,"1800px":h,"1800px-width":e,"1800px-height":i,"2000px":h,"2000px-width":e,"2000px-height":i,"2200px":h,"2200px-width":e,"2200px-height":i,"2400px":h,"2400px-width":e,"2400px-height":i,"2800px":h,"2800px-width":e,"2800px-height":i,"3200px":h,"3200px-width":e,"3200px-height":i,"3500px":h,"3500px-width":e,"3500px-height":i,"1536x1536":h,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":h,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:"12/08/2025",ending_date:"12/12/2025"},registration_time:{registration_starts:A,registration_ends:ze},location:L,participation_fee:S,register_link:"https://cvent.me/MlW4Ka"},taxonomies:{"trainings-categories":[K]}},{slug:"cyber-defence-monitoring-adl-420",title:"Cyber Defence Monitoring (ADL 430)",excerpt:"This e-Learning course is a mandatory e-learning module of the residential Cyber Defence Monitoring courses and can be used as...",post_date:"2022-09-28 09:22:39",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},registration_time:{registration_starts:a,registration_ends:a},location:a,participation_fee:a,register_link:a},taxonomies:{"trainings-categories":[_,b]}},{slug:"international-law-of-cyber-operations-course-adl-420",title:"International Law of Cyber Operations Course (ADL 420)",excerpt:"This e-Learning course is a mandatory  e-learning module of the residential International Law of Cyber Operations  Course. The aim of this course...",post_date:"2022-03-24 09:01:23",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},registration_time:{registration_starts:a,registration_ends:a},location:$,participation_fee:a,register_link:a},taxonomies:{"trainings-categories":[K,b]}},{slug:"operational-cyber-threat-intelligence-course-adl-230",title:"Operational Cyber Threat Intelligence Course (ADL 230)",excerpt:"This e-Learning course is a mandatory e-learning module of the residential Operational Cyber Threat Intelligence course. The aim of this...",post_date:"2021-08-25 09:24:55",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},registration_time:{registration_starts:a,registration_ends:a},location:$,participation_fee:"free",register_link:a},taxonomies:{"trainings-categories":[ie,b]}},{slug:"it-systems-attack-and-defence-3",title:"IT Systems Attack and Defence (ADL 394)",excerpt:"This e-Learning course is a mandatory  e-learning module of the residential IT Systems Attacks and Defence course. The aim of this course...",post_date:"2021-03-10 08:27:25",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},registration_time:{registration_starts:a,registration_ends:a},location:$,participation_fee:le,register_link:a},taxonomies:{"trainings-categories":[_,b]}},{slug:"malware-and-exploit-essentials-2",title:"Malware and Exploit Essentials (ADL 383)",excerpt:"This course is a mandatory  e-learning module of the residential Malware and Exploit Essentials course. The aim of this course to provide...",post_date:"2020-09-16 10:01:38",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},registration_time:{registration_starts:a,registration_ends:a},location:$,participation_fee:le,register_link:a},taxonomies:{"trainings-categories":[_,b]}},{slug:"integrating-cyber-considerations-into-operational-planning",title:"Integrating Cyber Considerations into Operational Planning (ADL 375)",excerpt:"This course is a mandatory e-learning module of the residential Integrating Cyber Considerations into Operational Planning course. The aim of...",post_date:"2020-05-21 09:06:13",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},registration_time:{registration_starts:a,registration_ends:a},location:$,participation_fee:le,register_link:a},taxonomies:{"trainings-categories":[ie,b]}},{slug:"information-security-management-system-course",title:"Information Security Management System (ADL 343)",excerpt:"To support the preparation of participants in the Centre residential technical courses, the Centre provides an online web-based course on...",post_date:"2018-10-16 10:33:42",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:J,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[_,b]}},{slug:"systematic-approaches-to-the-mitigation-of-cyber-threats-course",title:"Systematic Approaches to the Mitigation of Cyber Threats (ADL 349)",excerpt:"To support the preparation of participants in the Botnet Mitigation Course, the Centre provides an online web-based course on systematic...",post_date:"2018-10-16 10:30:14",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:J,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[_,b]}},{slug:"fighting-a-botnet-attack-a-case-study-course",title:"Fighting a Botnet Attack: Case Study (ADL 348)",excerpt:"To support the preparation of participants in the Botnet Mitigation Course, the Centre provides an online web-based course on fighting...",post_date:"2018-10-16 10:29:17",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:le,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[_,b]}},{slug:"critical-infrastructure-and-industrial-control-systems-course",title:"Critical Infrastructure and Industrial Control Systems (ADL 347)",excerpt:"To support the preparation of participants in the Industrial Control Systems Security Course, the Centre provides an online web-based course...",post_date:"2018-10-16 10:28:11",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:J,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[_,b]}},{slug:"web-application-security-course",title:"Web Application Security (ADL 346)",excerpt:"To support the preparation of participants in the Web Applications Attack and Defence Course, the Centre provides an online web-based...",post_date:"2018-10-16 10:26:58",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:J,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[_,b]}},{slug:"network-and-log-monitoring-course",title:"Network and Log Monitoring (ADL 345)",excerpt:"To support the preparation of participants in the different modules to the Cyber Defence Monitoring Suite, the Centre provides an...",post_date:"2018-10-16 10:25:54",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:J,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[_,b]}},{slug:"digital-forensics-and-digital-evidence-course",title:"Digital Forensics and Digital Evidence (ADL 344)",excerpt:"To support the preparation of participants in the Introductory Digital Forensics Course, the Centre provides an online web-based course on...",post_date:"2018-10-16 10:19:24",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:J,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[_,b]}},{slug:"cyber-awareness-course-for-system-administrators",title:"Cyber Awareness Course for System Administrators (ADL 335)",excerpt:"The course aims to enhance the network and system administrators’ skills regarding the different aspects of awareness regarding the current...",post_date:"2018-10-16 10:03:08",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:"free",register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[b]}},{slug:"cyber-defence-awareness-e-course",title:"Cyber Defence Awareness (ADL 076)",excerpt:"The Cyber Defence Awareness e-Learning course aims to enhance the general user’s awareness of cyber security risks and measures to...",post_date:"2018-10-16 09:45:20",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:ni,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[b]}},{slug:"cyber-awareness-course-tallinn-manual-module",title:"Cyber Awareness, Tallinn Manual Module (ADL 365)",excerpt:"The course aims to prepare the participants of the International Law of Cyber Operations Course (residential course of CCDCOE), providing...",post_date:"2018-10-16 09:40:34",thumbnail:{ID:v,title:w,url:t,alt:a,caption:a,description:a,width:e,height:i,srcset:y,sizes:{thumbnail:k,"thumbnail-width":r,"thumbnail-height":r,medium:f,"medium-width":u,"medium-height":p,medium_large:C,"medium_large-width":l,"medium_large-height":s,large:t,"large-width":e,"large-height":i,thumbnail_lqip:T,"thumbnail_lqip-width":d,"thumbnail_lqip-height":m,"1400px":D,"1400px-width":g,"1400px-height":o,"1600px":t,"1600px-width":e,"1600px-height":i,"1800px":t,"1800px-width":e,"1800px-height":i,"2000px":t,"2000px-width":e,"2000px-height":i,"2200px":t,"2200px-width":e,"2200px-height":i,"2400px":t,"2400px-width":e,"2400px-height":i,"2800px":t,"2800px-width":e,"2800px-height":i,"3200px":t,"3200px-width":e,"3200px-height":i,"3500px":t,"3500px-width":e,"3500px-height":i,"1536x1536":t,"1536x1536-width":e,"1536x1536-height":i,"2048x2048":t,"2048x2048-width":e,"2048x2048-height":i}},acf:{date:{starting_date:a,ending_date:a},location:a,participation_fee:ni,register_link:a,registration_time:{registration_starts:a,registration_ends:a}},taxonomies:{"trainings-categories":[K,b]}}]}}],error:null,state:{taxonomies:{careers_types:[{name:"Interns",term_id:444,slug:"interns"},{name:"Jobs",term_id:443,slug:"jobs"},{name:"Scholars",term_id:554,slug:"scholars"}],incyder_organisations:[{name:"APEC",term_id:400,slug:"apec",full_name:"Asia-Pacific Economic Cooperation"},{name:"ASEAN",term_id:60,slug:"asean",full_name:"Association of Southeast Asian Nations"},{name:"AU",term_id:439,slug:"au",full_name:"African Union"},{name:"CoE",term_id:397,slug:"council-of-europe",full_name:"Council of Europe"},{name:"CommW",term_id:441,slug:"commw",full_name:"Commonwealth of Nations"},{name:"ECOWAS",term_id:411,slug:"ecowas",full_name:"Economic Community of West African States"},{name:"EU",term_id:390,slug:"eu",full_name:"European Union"},{name:"G7",term_id:62,slug:"g7",full_name:"Group of Seven"},{name:"ICANN",term_id:451,slug:"icann",full_name:"The Internet Corporation for Assigned Names and Numbers"},{name:"ITU",term_id:388,slug:"itu",full_name:"International Telecommunication Union"},{name:_e,term_id:378,slug:oe,full_name:"North Atlantic Treaty Organisation"},{name:"OAS",term_id:403,slug:"oas",full_name:"Organization of American States"},{name:"OECD",term_id:399,slug:"oecd",full_name:"Organisation for Economic Co-operation and Development"},{name:"OSCE",term_id:401,slug:"osce",full_name:"Organization for Security and Co-operation in Europe"},{name:"SADC",term_id:466,slug:"sadc",full_name:"Southern African Development Community "},{name:"SCO",term_id:410,slug:"sco",full_name:"Shanghai Cooperation Organisation"},{name:"UN",term_id:384,slug:"un",full_name:"United Nations"}],incyder_years:[{name:B,term_id:474,slug:B},{name:B,term_id:475,slug:"2020-2020"},{name:Z,term_id:460,slug:Z},{name:X,term_id:383,slug:X},{name:Y,term_id:450,slug:Y},{name:Q,term_id:445,slug:Q},{name:F,term_id:442,slug:F},{name:G,term_id:440,slug:G},{name:R,term_id:119,slug:R},{name:H,term_id:118,slug:H},{name:V,term_id:412,slug:V},{name:U,term_id:117,slug:U},{name:W,term_id:409,slug:W},{name:N,term_id:408,slug:N},{name:he,term_id:407,slug:he},{name:ae,term_id:406,slug:ae},{name:"2005",term_id:405,slug:"2005"},{name:"2004",term_id:404,slug:"2004"},{name:de,term_id:402,slug:de},{name:"2002",term_id:398,slug:"2002"},{name:"2001",term_id:395,slug:"2001"},{name:ne,term_id:394,slug:ne},{name:"1999",term_id:393,slug:"1999"},{name:"1998",term_id:392,slug:"1998"},{name:"1995",term_id:391,slug:"1995"},{name:"1988",term_id:387,slug:"1988"},{name:"1949",term_id:379,slug:"1949"}],groups:[{name:"Advisory Board",term_id:116,slug:"advisory-board"},{name:"Ambassadors",term_id:114,slug:"ambassadors"},{name:"Non-active",term_id:522,slug:"non-active"},{name:"Senior Fellows",term_id:115,slug:"senior-fellows"},{name:"Team",term_id:121,slug:"team"}],publications_authors:[{name:"A. Ertan",term_id:495,slug:"a-ertan"},{name:"Adam Botek",term_id:467,slug:"adam-botek"},{name:"Agostino Panico",term_id:218,slug:"agostino-panico"},{name:"Ahmet Balci",term_id:489,slug:"ahmet-balci"},{name:"Alar Kuusik",term_id:575,slug:"alar-kuusik"},{name:"Alejandro Granja",term_id:544,slug:"alejandro-granja"},{name:"Aleksi Kajander",term_id:592,slug:"aleksi-kajander"},{name:"Alexander Cendoya",term_id:227,slug:"alexander-cendoya"},{name:"Alexander Klimburg (Ed.)",term_id:344,slug:"alexander-klimburg-ed"},{name:"Alexander Kott",term_id:434,slug:"alexander-kott"},{name:"Alexander Verschoor-Kirss",term_id:207,slug:"alexander-verschoor-kirss"},{name:"Alexandra Sergueeva",term_id:516,slug:"alexandra-sergueeva"},{name:"Alexandria Farar",term_id:253,slug:"alexandria-farar"},{name:"Alivia Coon",term_id:518,slug:"alivia-coon"},{name:"Alvaro Botas Munoz",term_id:297,slug:"alvaro-botas-munoz"},{name:"Alžběta Bajerová",term_id:169,slug:"alzbeta-bajerova"},{name:"Amy Ertan",term_id:531,slug:"amy-ertan"},{name:"Amy Ertran",term_id:551,slug:"amy-ertran"},{name:"Andreas Palm",term_id:574,slug:"andreas-palm"},{name:"Andres Ojamaa",term_id:371,slug:"andres-ojamaa"},{name:"Andrii Davydiuk",term_id:609,slug:"andrii-davydiuk"},{name:"Ann Väljataga",term_id:246,slug:"ann-valjataga"},{name:"Ann Väljataga (Ed.)",term_id:510,slug:"ann-valjataga-ed"},{name:"Anna-Maria Osula",term_id:187,slug:"anna-maria-osula"},{name:"Anna-Maria Osula (Ed.)",term_id:304,slug:"anna-maria-osula-ed"},{name:"Anna-Maria Talihärm (Osula)",term_id:357,slug:"anna-maria-taliharm-osula"},{name:"Anna-Maria Talihärm (Osula) (Eds.)",term_id:365,slug:"anna-maria-taliharm-osula-eds"},{name:"Annita Larissa Sciacovelli",term_id:612,slug:"annita-larissa-sciacovelli"},{name:"Arthur Oliver Thomson",term_id:601,slug:"arthur-oliver-thomson"},{name:"Artūrs Lavrenovs",term_id:501,slug:"arturs-lavrenovs"},{name:"Asaf Lubin",term_id:570,slug:"asaf-lubin"},{name:"Aurimas Kuprys",term_id:587,slug:"aurimas-kuprys"},{name:"Ben Valk",term_id:532,slug:"ben-valk"},{name:"Benoît LeBlanc",term_id:437,slug:"benoit-leblanc"},{name:"Berend Valk",term_id:555,slug:"berend-valk"},{name:"Bernhards Blumbergs",term_id:172,slug:"bernhards-blumbergs"},{name:"CCDCOE Contributors",term_id:508,slug:"ccdcoe-contributors"},{name:"CCDCOE Law Branch Researchers",term_id:247,slug:"ccdcoe-law-branch-researchers"},{name:"CCDCOE Researchers",term_id:493,slug:"ccdcoe-researchers"},{name:"CCDCOE Strategy and Law Branch researchers",term_id:470,slug:"ccdcoe-strategy-and-law-branch-researchers"},{name:"CCDCOE Strategy and Operations Branch researchers",term_id:485,slug:"ccdcoe-strategy-and-operations-branch-researchers"},{name:"CCDCOE Strategy and Tech Branch researchers",term_id:484,slug:"ccdcoe-strategy-and-tech-branch-researchers"},{name:"CCDCOE Strategy Branch researchers",term_id:482,slug:"ccdcoe-strategy-branch-researchers"},{name:"CDR. Robert Buckles",term_id:578,slug:"cdr-robert-buckles"},{name:"Christian Braccini",term_id:215,slug:"christian-braccini"},{name:"Christian Czosseck",term_id:345,slug:"christian-czosseck"},{name:"Co-publication of 12 partner organisations facilitated by ITU",term_id:126,slug:"co-publication-of-12-partner-organisations-facilitated-by-itu"},{name:"Co-publication with partner organisations facilitated by ITU",term_id:553,slug:"co-publication-with-partner-organisations-facilitated-by-itu"},{name:"Colonel David Wallace",term_id:154,slug:"colonel-david-wallace"},{name:"Corinne J.N. Cath",term_id:260,slug:"corinne-j-n-cath"},{name:"Costel-Marius Gheorghevici",term_id:535,slug:"costel-marius-gheorghevici"},{name:"D. Gao",term_id:595,slug:"d-gao"},{name:"Damjan Štrucl",term_id:529,slug:"damjan-strucl"},{name:"Dan Ungureanu",term_id:490,slug:"dan-ungureanu"},{name:"Daniel P. Bagge",term_id:191,slug:"daniel-p-bagge"},{name:"David van Weel",term_id:556,slug:"david-van-weel"},{name:"Davide Giovannelli",term_id:536,slug:"davide-giovannelli"},{name:"Deborah Housen-Couriel",term_id:177,slug:"deborah-housen-couriel"},{name:"Dominik Skokowski",term_id:184,slug:"dominik-skokowski"},{name:"Dominik Zachar",term_id:548,slug:"dominik-zachar"},{name:"Dr Bill Boothby",term_id:327,slug:"dr-bill-boothby"},{name:"Dr Edward Barrett",term_id:334,slug:"dr-edward-barrett"},{name:"Dr Jassim Happa",term_id:322,slug:"dr-jassim-happa"},{name:"Dr Katharina Ziolkowski (Ed.)",term_id:307,slug:"dr-katharina-ziolkowski-ed"},{name:"Dr Marco Roscini",term_id:319,slug:"dr-marco-roscini"},{name:"Dr Mariarosaria Taddeo",term_id:326,slug:"dr-mariarosaria-taddeo"},{name:"Dr Massimo Durante",term_id:336,slug:"dr-massimo-durante"},{name:"Dr Patrick Taylor",term_id:320,slug:"dr-patrick-taylor"},{name:"Dr Sana Saleh",term_id:325,slug:"dr-sana-saleh"},{name:"Dr. Joe Burton",term_id:156,slug:"dr-joe-burton"},{name:"Edward Kim",term_id:517,slug:"edward-kim"},{name:"Elaine Korzak",term_id:512,slug:"elaine-korzak"},{name:"Emin Çalışkan",term_id:255,slug:"emin-caliskan"},{name:"Emre",term_id:523,slug:"emre"},{name:"Emre Halisdemir",term_id:524,slug:"emre-halisdemir"},{name:"Eneken Tikk",term_id:362,slug:"eneken-tikk"},{name:"Eneken Tikk (Ed.)",term_id:368,slug:"eneken-tikk-ed"},{name:"Enn Tõugu",term_id:353,slug:"enn-tougu"},{name:"Enrique Diez",term_id:254,slug:"enrique-diez"},{name:"Ensar Şeker",term_id:457,slug:"ensar-seker"},{name:"Erika Matsak",term_id:360,slug:"erika-matsak"},{name:"Erwin Orye",term_id:503,slug:"erwin-orye"},{name:"Experts experts from the Romanian Intelligence Service and the Ministry of National Defence",term_id:506,slug:"experts-experts-from-the-romanian-intelligence-service-and-the-ministry-of-national-defence"},{name:"Experts from the Romanian Intelligence Service and the Ministry of National Defence",term_id:507,slug:"experts-from-the-romanian-intelligence-service-and-the-ministry-of-national-defence"},{name:"Fabio Biondi",term_id:525,slug:"fabio-biondi"},{name:"Federico Clemente",term_id:492,slug:"federico-clemente"},{name:"Felix Leder",term_id:376,slug:"felix-leder"},{name:"Francisco Jesús Rubio Melón",term_id:r,slug:"francisco-jesus-rubio-melon"},{name:"Franz-Stefan Gady",term_id:559,slug:"franz-stefan-gady"},{name:"Frederico Clemente",term_id:487,slug:"frederico-clemente"},{name:"G. Hage",term_id:596,slug:"g-hage"},{name:"gabor",term_id:583,slug:"gabor"},{name:"Gabor Visky",term_id:584,slug:"gabor-visky"},{name:"Gabriel Klein",term_id:370,slug:"gabriel-klein"},{name:"Garret Derian-Toth",term_id:514,slug:"garret-derian-toth"},{name:"Garrett Derian-Toth",term_id:521,slug:"garrett-derian-toth"},{name:"Geert Alberghs",term_id:355,slug:"geert-alberghs"},{name:"George Christou",term_id:605,slug:"george-christou"},{name:"Gergely Szentgáli",term_id:283,slug:"gergely-szentgali"},{name:"Giuseppe Buonocore",term_id:526,slug:"giuseppe-buonocore"},{name:"Grete Toompere",term_id:541,slug:"grete-toompere"},{name:"Gry-Mona Nordli",term_id:543,slug:"gry-mona-nordli"},{name:"Gunnar Faith-Ell",term_id:481,slug:"gunnar-faith-ell"},{name:"H.Rõigas",term_id:209,slug:"h-roigas"},{name:"Hannes Krause",term_id:310,slug:"hannes-krause"},{name:"Hayretdin Bahşi",term_id:217,slug:"hayretdin-bahsi"},{name:"Hendrik Ploom",term_id:573,slug:"hendrik-ploom"},{name:"Henrik Beckvard",term_id:456,slug:"henrik-beckvard"},{name:"Henrik Beckvard (Ed.)",term_id:472,slug:"henrik-beckvard-ed"},{name:"Henry Rõgas",term_id:453,slug:"henry-rogas"},{name:"Henry Rõigas",term_id:178,slug:"henry-roigas"},{name:"Henry Rõigas (Eds.)",term_id:203,slug:"henry-roigas-eds"},{name:"Henry Wu",term_id:590,slug:"henry-wu"},{name:"Hilda Hadan",term_id:519,slug:"hilda-hadan"},{name:"Ihsan Burak Tolga",term_id:128,slug:"ihsan-burak-tolga"},{name:"Ihsan Tolga",term_id:480,slug:"ihsan-tolga"},{name:"Ingrid Winther",term_id:542,slug:"ingrid-winther"},{name:"Ivo A. Ivanov",term_id:349,slug:"ivo-a-ivanov"},{name:"Izabela Albrycht",term_id:183,slug:"izabela-albrycht"},{name:"James A. Lewis",term_id:272,slug:"james-a-lewis"},{name:"James Bret Michael",term_id:373,slug:"james-bret-michael"},{name:"Jan Stinissen",term_id:314,slug:"jan-stinissen"},{name:"Jan Stinissen (Eds.)",term_id:311,slug:"jan-stinissen-eds"},{name:"Jan Wünsche",term_id:533,slug:"jan-wunsche"},{name:"Jared Stancombe",term_id:520,slug:"jared-stancombe"},{name:"Jaromir Vondruška",term_id:491,slug:"jaromir-vondruska"},{name:"Jason Healey",term_id:557,slug:"jason-healey"},{name:"Jeffrey Carr",term_id:313,slug:"jeffrey-carr"},{name:"Jeremy K. Davis",term_id:561,slug:"jeremy-k-davis"},{name:"Jesse Wojtkowiak",term_id:206,slug:"jesse-wojtkowiak"},{name:"Joanna Świątkowska",term_id:182,slug:"joanna-swiatkowska"},{name:"Joep Aarts",term_id:606,slug:"joep-aarts"},{name:"Josh Gold",term_id:494,slug:"josh-gold"},{name:"Jüri Kivimaa",term_id:145,slug:"juri-kivimaa"},{name:"K. Floyd",term_id:496,slug:"k-floyd"},{name:"K. Hoving",term_id:563,slug:"k-hoving"},{name:"K. Pelletier",term_id:597,slug:"k-pelletier"},{name:"K. Rachamallu",term_id:598,slug:"k-rachamallu"},{name:"Kadri Kaska",term_id:212,slug:"kadri-kaska"},{name:"Kadri Kaska (Ed.)",term_id:458,slug:"kadri-kaska-ed"},{name:"Kadri Peeters",term_id:577,slug:"kadri-peeters"},{name:"Kaie Maennel",term_id:197,slug:"kaie-maennel"},{name:"Karina Filipczak",term_id:295,slug:"karina-filipczak"},{name:"Karlis Podins",term_id:337,slug:"karlis-podins"},{name:"Karlis Podins (Eds.)",term_id:366,slug:"karlis-podins-eds"},{name:"Katharina Ziolkowski",term_id:341,slug:"katharina-ziolkowski"},{name:"Katharina Ziolkowski (Eds.)",term_id:346,slug:"katharina-ziolkowski-eds"},{name:"Katriina Härma",term_id:245,slug:"katriina-harma"},{name:"Katrin Nyman Metcalf",term_id:160,slug:"katrin-nyman-metcalf"},{name:"Keiko Kono",term_id:473,slug:"keiko-kono"},{name:"Kenneth Geers",term_id:136,slug:"kenneth-geers"},{name:"Kenneth Geers (Ed.)",term_id:292,slug:"kenneth-geers-ed"},{name:"Kenneth Geers (Eds.)",term_id:367,slug:"kenneth-geers-eds"},{name:"Kimmo Heinäaro",term_id:502,slug:"kimmo-heinaaro"},{name:"Kris van der Meij",term_id:219,slug:"kris-van-der-meij"},{name:"Krzysztof Rzadca",term_id:436,slug:"krzysztof-rzadca"},{name:"László Kovács",term_id:282,slug:"laszlo-kovacs"},{name:"Laura G. Brent",term_id:560,slug:"laura-g-brent"},{name:"Lauri Aasmann",term_id:348,slug:"lauri-aasmann"},{name:"Lauri Lindström",term_id:180,slug:"lauri-lindstrom"},{name:"Lauri Lindström (Eds.)",term_id:279,slug:"lauri-lindstrom-eds"},{name:"Lea Hriciková",term_id:274,slug:"lea-hricikova"},{name:"Liina Areng",term_id:312,slug:"liina-areng"},{name:"Liina Lumiste (née Hirv)",term_id:465,slug:"liina-lumiste-nee-hirv"},{name:"Liis Vihul",term_id:308,slug:"liis-vihul"},{name:"Lisa Catherina Schauss",term_id:581,slug:"lisa-catherina-schauss"},{name:"Lisa Schauss",term_id:552,slug:"lisa-schauss"},{name:"Lorena Trinberg",term_id:224,slug:"lorena-trinberg"},{name:"Lt. Col. Aurimas Kuprys",term_id:582,slug:"lt-col-aurimas-kuprys"},{name:"Lt. Col. Gry-Mona Nordli",term_id:580,slug:"lt-col-gry-mona-nordli"},{name:"LTC Jan Stinissen",term_id:342,slug:"ltc-jan-stinissen"},{name:"Lucie Kadlecová",term_id:190,slug:"lucie-kadlecova"},{name:"Ludovica Glorioso",term_id:261,slug:"ludovica-glorioso"},{name:"Ludovica Glorioso (Ed.)",term_id:303,slug:"ludovica-glorioso-ed"},{name:"Ludovica Glorioso (Eds.)",term_id:175,slug:"ludovica-glorioso-eds"},{name:"Luigi Mancini",term_id:438,slug:"luigi-mancini"},{name:"Lukas Bortnik",term_id:505,slug:"lukas-bortnik"},{name:"M. Zoetekouw",term_id:188,slug:"m-zoetekouw"},{name:"M.Veenendaal (Eds.)",term_id:210,slug:"m-veenendaal-eds"},{name:"Maarja Naagel",term_id:462,slug:"maarja-naagel"},{name:"Maggie Gray",term_id:546,slug:"maggie-gray"},{name:"Marcel Scherrenburg",term_id:488,slug:"marcel-scherrenburg"},{name:"Marco De Falco",term_id:347,slug:"marco-de-falco"},{name:"Mari Kert-Saint Aubyn",term_id:299,slug:"mari-kert-saint-aubyn"},{name:"Maria Rosaria Taddeo",term_id:262,slug:"maria-rosaria-taddeo"},{name:"Maria Tolppa",term_id:476,slug:"maria-tolppa"},{name:"Mariarosaria Taddeo",term_id:174,slug:"mariarosaria-taddeo"},{name:"Mario Huis in ‘t veld",term_id:220,slug:"mario-huis-in-t-veld"},{name:"Marko Jahnke",term_id:372,slug:"marko-jahnke"},{name:"Markus Kont",term_id:196,slug:"markus-kont"},{name:"Markus Maybaum",term_id:278,slug:"markus-maybaum"},{name:"Markus Maybaum (Eds.)",term_id:338,slug:"markus-maybaum-eds"},{name:"Marta Stroppa",term_id:603,slug:"marta-stroppa"},{name:"Marten Zwanenburg",term_id:607,slug:"marten-zwanenburg"},{name:"Martin Drašar",term_id:435,slug:"martin-drasar"},{name:"Massimiliano Signoretti",term_id:459,slug:"massimiliano-signoretti"},{name:"Matthijs Veenendaal",term_id:211,slug:"matthijs-veenendaal"},{name:"Mauno Pihelgas",term_id:152,slug:"mauno-pihelgas"},{name:"Michael N. Schmitt",term_id:251,slug:"michael-n-schmitt"},{name:"Michael P. Fischerkeller",term_id:602,slug:"michael-p-fischerkeller"},{name:"Michael R. Grimaila",term_id:351,slug:"michael-r-grimaila"},{name:"Michael Widmann",term_id:486,slug:"michael-widmann"},{name:"Michaela Prucková",term_id:513,slug:"michaela-pruckova"},{name:"Michaela Semecká",term_id:193,slug:"michaela-semecka"},{name:"Michal Sadloň",term_id:216,slug:"michal-sadlon"},{name:"Mikk Raud",term_id:228,slug:"mikk-raud"},{name:"N. Perez",term_id:566,slug:"n-perez"},{name:"N.Pissanidis",term_id:208,slug:"n-pissanidis"},{name:"NATO CCDCOE",term_id:329,slug:"nato-ccdcoe"},{name:"Nikolaos Pissanidis",term_id:225,slug:"nikolaos-pissanidis"},{name:"Olaf M. Maennel",term_id:234,slug:"olaf-m-maennel"},{name:"Oleksandr Potii",term_id:610,slug:"oleksandr-potii"},{name:"P. Pernik",term_id:497,slug:"p-pernik"},{name:"Pablo Andreu Barasoain",term_id:352,slug:"pablo-andreu-barasoain"},{name:"Pascal Brangetto",term_id:213,slug:"pascal-brangetto"},{name:"Patrycjusz Zdzichowski",term_id:293,slug:"patrycjusz-zdzichowski"},{name:"Paul Theron",term_id:433,slug:"paul-theron"},{name:"Pavel Grigorenko",term_id:356,slug:"pavel-grigorenko"},{name:"Pawel Nizinski",term_id:340,slug:"pawel-nizinski"},{name:"Peeter Lorents",term_id:359,slug:"peeter-lorents"},{name:"Peter Wahlgren",term_id:374,slug:"peter-wahlgren"},{name:"Philippe Mitsuya Zotz",term_id:509,slug:"philippe-mitsuya-zotz"},{name:"Philippe Zotz",term_id:537,slug:"philippe-zotz"},{name:"Pietro Gargiulo",term_id:611,slug:"pietro-gargiulo"},{name:"Pilleriin Lillemets",term_id:579,slug:"pilleriin-lillemets"},{name:"Piret Pernik",term_id:205,slug:"piret-pernik"},{name:"Prof Neil C. Rowe",term_id:321,slug:"prof-neil-c-rowe"},{name:"Prof Paul Cornish",term_id:318,slug:"prof-paul-cornish"},{name:"Prof Pompeu Casanovas",term_id:317,slug:"prof-pompeu-casanovas"},{name:"Prof. Giovanni Sartor",term_id:331,slug:"prof-giovanni-sartor"},{name:"Prof. Luciano Floridi",term_id:333,slug:"prof-luciano-floridi"},{name:"Prof. Randall Dipert",term_id:330,slug:"prof-randall-dipert"},{name:"Prof. Sandra Braman",term_id:332,slug:"prof-sandra-braman"},{name:"Prof. Selmer Bringsjord",term_id:335,slug:"prof-selmer-bringsjord"},{name:"Raik Jakschis",term_id:179,slug:"raik-jakschis"},{name:"Rain Liivoja",term_id:461,slug:"rain-liivoja"},{name:"Rain Liivoja (Ed.)",term_id:511,slug:"rain-liivoja-ed"},{name:"Rain Ottis",term_id:139,slug:"rain-ottis"},{name:"Raul Rikk",term_id:377,slug:"raul-rikk"},{name:"Richard Matthews",term_id:527,slug:"richard-matthews"},{name:"Riina Maigre",term_id:361,slug:"riina-maigre"},{name:"Risto Vaarandi",term_id:143,slug:"risto-vaarandi"},{name:"Rokas Šalaševičius",term_id:572,slug:"rokas-salasevicius"},{name:"Rónán O’Flaherty",term_id:545,slug:"ronan-oflaherty"},{name:"Russell Buchan",term_id:569,slug:"russell-buchan"},{name:"Ryan Walsh",term_id:515,slug:"ryan-walsh"},{name:"S. Workinger",term_id:600,slug:"s-workinger"},{name:"Samuele De Tomas Colatin",term_id:479,slug:"samuele-de-tomas-colatin"},{name:"Sebastian Brüggemann",term_id:350,slug:"sebastian-bruggemann"},{name:"Sebastian Cymutta",term_id:499,slug:"sebastian-cymutta"},{name:"Steven van de Put",term_id:608,slug:"steven-van-de-put"},{name:"Sungbaek Cho",term_id:530,slug:"sungbaek-cho"},{name:"Sungbaek Cho; Kārlis Podiņš; Damjan Štrucl; Urmet Tomp; Grete Toompere; Ingrid Winther;",term_id:539,slug:"sungbaek-cho-karlis-podins-damjan-strucl-urmet-tomp-grete-toompere-ingrid-winther"},{name:"T. Lawrence",term_id:564,slug:"t-lawrence"},{name:"T. Liu",term_id:565,slug:"t-liu"},{name:"T. Sterns",term_id:599,slug:"t-sterns"},{name:"T. Stevens Eds.",term_id:498,slug:"t-stevens-eds"},{name:"Taťána Jančárková",term_id:463,slug:"tatana-jancarkova"},{name:"Teemu Uolevi Väisänen",term_id:296,slug:"teemu-uolevi-vaisanen"},{name:"Teemu Väisänen",term_id:151,slug:"teemu-vaisanen"},{name:"Thomas C. Wingfield",term_id:375,slug:"thomas-c-wingfield"},{name:"Thomas Wingfield (Eds.)",term_id:354,slug:"thomas-wingfield-eds"},{name:"Tomáš Minárik",term_id:201,slug:"tomas-minarik"},{name:"Tomáš Minárik (Eds.)",term_id:181,slug:"tomas-minarik-eds"},{name:"Tony Lawrence",term_id:576,slug:"tony-lawrence"},{name:"Toomas Kirt",term_id:358,slug:"toomas-kirt"},{name:"Toomas Lepik",term_id:198,slug:"toomas-lepik"},{name:"Torsten Corall",term_id:244,slug:"torsten-corall"},{name:"Urmas Ruuto",term_id:534,slug:"urmas-ruuto"},{name:"Urmet Tomp",term_id:540,slug:"urmet-tomp"},{name:"Václav Borovička",term_id:192,slug:"vaclav-borovicka"},{name:"Vasco Prates",term_id:585,slug:"vasco-prates"},{name:"Vasileios Anastopoulos",term_id:562,slug:"vasileios-anastopoulos"},{name:"Veeli Oeselg",term_id:571,slug:"veeli-oeselg"},{name:"Veronika Datzer",term_id:586,slug:"veronika-datzer"},{name:"Virpratap Vikram",term_id:558,slug:"virpratap-vikram"},{name:"Vytautas Butrimas",term_id:281,slug:"vytautas-butrimas"},{name:"Wolff Heintschel von Heinegg",term_id:276,slug:"wolff-heintschel-von-heinegg"}],focus_areas:[{name:ee,term_id:449,slug:K},{name:_e,term_id:568,slug:oe},{name:"Operations",term_id:448,slug:"operations"},{name:"Policy",term_id:567,slug:"policy"},{name:"Strategy",term_id:447,slug:"strategy"},{name:"Technology",term_id:446,slug:"technology"},{name:"UN",term_id:591,slug:"un"}],publications_types:[{name:"Article",term_id:63,slug:"article"},{name:"Book",term_id:73,slug:"book"},{name:"Paper",term_id:588,slug:"paper"},{name:"Report",term_id:528,slug:"report"},{name:"Short Analysis",term_id:594,slug:"short-analysis"},{name:"Video",term_id:81,slug:"video"}],publications_years:[{name:se,term_id:604,slug:se},{name:te,term_id:589,slug:te},{name:me,term_id:547,slug:me},{name:re,term_id:500,slug:re},{name:B,term_id:477,slug:B},{name:Z,term_id:455,slug:Z},{name:X,term_id:82,slug:X},{name:Y,term_id:167,slug:Y},{name:Q,term_id:199,slug:Q},{name:F,term_id:248,slug:F},{name:G,term_id:305,slug:G},{name:R,term_id:328,slug:R},{name:H,term_id:343,slug:H},{name:V,term_id:64,slug:V},{name:U,term_id:363,slug:U},{name:W,term_id:92,slug:W},{name:N,term_id:89,slug:N}],strategy_documents_authors:[{name:"N/A",term_id:428,slug:"non-nato"},{name:_e,term_id:421,slug:oe}],strategy_documents_categories:[{name:"Cyber security strategies",term_id:99,slug:"cyber-security-strategies"},{name:"National defence and security strategies",term_id:102,slug:"national-defence-and-security-strategies"},{name:"National legislation",term_id:107,slug:"national-legislation"},{name:"Statements on intl. law",term_id:468,slug:"intl-law-statements"},{name:"Country reports",term_id:95,slug:"country-reports"}],strategy_documents_countries:[{name:"Africa",term_id:418,slug:"africa"},{name:"Americas",term_id:419,slug:"americas"},{name:"Asia &amp; Oceania",term_id:417,slug:"asia-oceania"},{name:"Europe",term_id:420,slug:"europe"}],strategy_documents_years:[{name:se,term_id:s,slug:se},{name:te,term_id:613,slug:te},{name:me,term_id:550,slug:me},{name:re,term_id:504,slug:re},{name:B,term_id:478,slug:B},{name:Z,term_id:464,slug:Z},{name:X,term_id:426,slug:X},{name:Y,term_id:422,slug:Y},{name:Q,term_id:427,slug:Q},{name:F,term_id:413,slug:F},{name:G,term_id:423,slug:G},{name:R,term_id:424,slug:R},{name:H,term_id:430,slug:H},{name:V,term_id:425,slug:V},{name:U,term_id:108,slug:U},{name:W,term_id:105,slug:W},{name:N,term_id:103,slug:N},{name:he,term_id:100,slug:he},{name:ae,term_id:96,slug:ae},{name:de,term_id:549,slug:de},{name:ne,term_id:431,slug:ne},{name:"1992",term_id:538,slug:"1992"}],trainings_categories:[{name:ee,term_id:52,slug:K},{name:ue,term_id:124,slug:ie},{name:ce,term_id:123,slug:xe},{name:q,term_id:122,slug:_},{name:w,term_id:125,slug:b}]},siteData:{title:"CCDCOE",description:"The NATO Cooperative Cyber Defence Centre of Excellence is a multinational and interdisciplinary hub of cyber defence expertise.",intern_block:{intern_block_title:"Cooperation",intern_block_text:"Our success is built on mutually beneficial collaboration with various partners. Let us know if you are interested in cooperation with us!",intern_block_link:{title:"Send request",url:"mailto:ccdcoe@ccdcoe.org",target:"_blank"}},footer_group:{footer_column_1:"<p>ccdcoe-at-ccdcoe.org<br />\n+372 7176 800<br />\nFiltri tee 5, Tallinn 10132, Estonia</p>\n",footer_column_2:'<p><a href="https://www.linkedin.com/company/natoccdcoe/">LinkedIn</a></p>\n<p><a href="https://x.com/ccdcoe">X</a></p>\n<p><a href="https://www.youtube.com/user/natoccdcoe">Youtube</a></p>\n<p><a href="https://www.flickr.com/photos/133800821@N02/albums">Flickr</a></p>\n<p><a href="https://www.facebook.com/ccdcoe">Facebook </a></p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n'},cookie_notification:{text:"<p>This website uses cookies for analytical purposes to allow us to improve the content. These cookies do not collect information that enables direct identification of the website user. You can disable these cookies at any time by changing the settings of the browser on the device you are using.</p>\n",button_text:"I understand"}}},serverRendered:!0}}(1e3,800,"/uploads/2018/12/e-Learning.png","","/uploads/2018/12/Technical.png",150,"/uploads/2018/12/Law.png",614,768,45,36,985,788,240,300,"/uploads/2018/12/Strategic.png","/uploads/2018/12/Operational.png","technical","e-Learning","e-learning","/uploads/2018/12/e-Learning-300x240.png","/uploads/2018/12/e-Learning-150x150.png","/uploads/2018/12/e-Learning.png 1000w, /uploads/2018/12/e-Learning-300x240.png 300w, /uploads/2018/12/e-Learning-768x614.png 768w, /uploads/2018/12/e-Learning-45x36.png 45w, /uploads/2018/12/e-Learning-985x788.png 985w",3110,"/uploads/2018/12/e-Learning-768x614.png","/uploads/2018/12/e-Learning-45x36.png","/uploads/2018/12/e-Learning-985x788.png","11/01/2024","Tallinn","500 € course fee (1 free slot per CCDCOE member nation and NATO bodies)","Technical","/uploads/2018/12/Technical-985x788.png","/uploads/2018/12/Technical-45x36.png","/uploads/2018/12/Technical-768x614.png","/uploads/2018/12/Technical-300x240.png","/uploads/2018/12/Technical-150x150.png",3114,"/uploads/2018/12/Technical.png 1000w, /uploads/2018/12/Technical-300x240.png 300w, /uploads/2018/12/Technical-768x614.png 768w, /uploads/2018/12/Technical-45x36.png 45w, /uploads/2018/12/Technical-985x788.png 985w","law","2020","2008","2013","2014","2009","2015","This is a free course","2011","2012","2010","2019","2018","2017","2016","e-Learning course","Law","operational","2023","2006","2000","2021","2007","2024","This is a free course.","2003","2022","/uploads/2018/12/Law-985x788.png","nato",0,"Operational","strategic","Strategic","NATO","/uploads/2018/12/Law-45x36.png","/uploads/2018/12/Law-768x614.png","/uploads/2018/12/Law-300x240.png","/uploads/2018/12/Law-150x150.png","/uploads/2018/12/Law.png 1000w, /uploads/2018/12/Law-300x240.png 300w, /uploads/2018/12/Law-768x614.png 768w, /uploads/2018/12/Law-45x36.png 45w, /uploads/2018/12/Law-985x788.png 985w","Course Aim The aim of the course is to provide personnel working within the legal framework of NATO cyberspace operations...","/uploads/2018/12/Operational-150x150.png","/uploads/2018/12/Operational-300x240.png",0,0,"/uploads/2018/12/Strategic.png 1000w, /uploads/2018/12/Strategic-300x240.png 300w, /uploads/2018/12/Strategic-768x614.png 768w, /uploads/2018/12/Strategic-45x36.png 45w, /uploads/2018/12/Strategic-985x788.png 985w","/uploads/2018/12/Operational-45x36.png","/uploads/2018/12/Operational-985x788.png","/uploads/2018/12/Strategic-150x150.png","07/25/2025","10/10/2025","/uploads/2018/12/Strategic-300x240.png","/uploads/2018/12/Strategic-768x614.png","/uploads/2018/12/Strategic-45x36.png","/uploads/2018/12/Strategic-985x788.png","05/09/2025",0,"Course Aim The course is targeted at technical IT staff who are used to working with IT in roles such...","09/05/2025","09/12/2025",0,0,0,0,0,0,0,0,0,0,0,0,0,"This seminar has been designed for senior level staff, primarily in NATO and defence, who are new into post and/or...","/uploads/2018/12/Operational.png 1000w, /uploads/2018/12/Operational-300x240.png 300w, /uploads/2018/12/Operational-768x614.png 768w, /uploads/2018/12/Operational-45x36.png 45w, /uploads/2018/12/Operational-985x788.png 985w","free\r\n","/uploads/2018/12/Operational-768x614.png")</script><script src="/_nuxt/9fe29afc1928fac25ab8.js" defer></script><script src="/_nuxt/1b081b4958f9fc8b1740.js" defer></script><script src="/_nuxt/67458f637b9a91db2b1d.js" defer></script><script src="/_nuxt/85e01a8d92a732456575.js" defer></script><script src="/_nuxt/58470171c754c01ef3aa.js" defer></script> <script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'92cbedad4f75c84f',t:'MTc0NDA1NDExMC4wMDAwMDA='};var a=document.createElement('script');a.nonce='';a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10