Programs /
Cisco: Implementation of Secure Digital Platforms

Cisco: Implementation of Secure Digital Platforms

The program reveals tendencies that affect the development of modern technology and helps organizations withstand challenges when they implement digital platforms
The registration is closed. The next opportunity to enroll will be in the upcoming autumn season
scroll
Program Description
The program provides participants with knowledge of cybersecurity, infrastructure transformation, and hybrid collaboration and communication
More information

Cisco is the worldwide leader in the IT and network fields. It offers a program that helps companies and organizations transform methods of communication, connection, and cooperation.

The program is divided into three basic modules that are related to the three strategic focuses of Cisco. The modules aim to create a secure and intelligent platform for digital administration.

The participants will have the opportunity to acquire new practical skills, considering Ukrainian and international experience in solving similar problems.

Moreover, the program involves modules that are not related to each other. Therefore, the participants can select and complete them separately

Who is this program for

The program is designed for participants who strive to increase their knowledge level in the field of modern technology and systems

The expected outcome for program participants

01
Awareness of modern threats to IT systems and digital infrastructure
02
Acquiring methods for reliable cybersecurity systems
03
Awareness of the basis for building hybrid infrastructures that include clouds, the Internet, SaaS, and data processing centers
04
Application of modern methods and technology to organize a secure working place
05
Studying the experience of G2C service building through ML technology

Program details

3 weeks
Offline
Ukrainian
Requirements
Basic level of knowledge and experience working with modern IT technologies
Course Start
February, 2024
Call for applications
November 28 — December 28, 2023

Lecturers

Andrii Ovrashko
System Engineer with over 11 years of experience at Cisco, specializing in the development and implementation of complex IT infrastructure modernization projects
Yuri Dovhan
Architecture Systems Engineer at Cisco
Volodymyr Iliban
Security Account Manager at Cisco
Oleksandr Mamenko
System Engineer at Cisco Systems with 11 years of industry experience
Ihor Sukaylo
Business Development Manager with over 17 years of experience at Cisco, primarily focused on collaboration infrastructure
MODULES

Program structure

Lecture 1
How cyber breaches occur
The presentation reveals the mechanisms by which attackers gain unauthorized access to systems. The main emphasis is on social engineering, phishing methods and exploitation of software vulnerabilities. Examples of attacks that took place in Ukraine and approaches used by attackers, in particular hacker groups from the Russian Federation. Participants will learn how to recognize and react to typical attacks.
Lecture 2
Cybersecurity technologies and solutions from A to Z
The session takes an in-depth look at modern protection technologies and cyber security solutions used in organizations in Ukraine. The module includes a description of the main use cases of security solutions and typical tasks to be solved. Complex cases of implementation of protection solutions in organizations of Ukraine are also considered on the basis of examples
Lecture 3
Best practices for building and operating cybersecurity systems
Participants will be introduced to the methodology and approaches to creating reliable security systems.The course focuses on the relationship between technology, human resources and business processes. In particular, risk management strategies, personnel training, response to security incidents and the construction of a Security Operation Center are considered. Particular attention is paid to the practical experience of applying international and Ukrainian standards, guidance documents and recommendations on cyber protection when building security systems
Lecture 1
Proactive IT in a Hybrid World: Transitioning to the Digital Future with Enhanced Transparency and Efficiency
Public Cloud, Internet, and Software as a Service are fundamentally reshaping the IT architecture of the modern enterprise. This process creates a significant gap in monitoring transparency, as key infrastructure and applications extend beyond enterprise walls. The Internet has become a network for transmitting traffic of business-critical applications, yet monitoring capabilities remain far from what organizations had in their own data centers.

Within the scope of this presentation, an overview of modern capabilities allowing organizations to perceive the Cloud, Internet, and SaaS services as their own infrastructure environment will be provided
Lecture 2
Building out country-wide distributed networks. Best practices and new trends
Recently, there has been a shift in the paradigm of building distributed networks in the infrastructures of enterprises, organizations and departments in connection with the transition to hybrid types of work and the widespread use of cloud technologies. The boundaries of networks are blurring, which makes them more vulnerable to external threats, problems arise with scaling, management and introduction of new services. As a result, IT departments must ensure that their IT infrastructure supports a distributed workforce across multiple locations, implementing secure and segmented access to critical applications across multiple cloud environments.

This session will propose new approaches to building distributed networks of enterprises and organizations. Best practices and experience of implementing segmented access from different locations and ways of connecting to important applications, taking into account modern threats and trends
Lecture 3
High Availability of Applications with Modern Data Center Infrastructure Approach
Digitization initiatives rely on reliable application performance..

Nowadays applications may exist either in private DC, or in Cloud DC, or even in Hybrid infrastructure.The distributed structure of the work of applications poses new challenges for IT.The requirements for the security of the services are changing our approaches to the development of data center infrastructure.

As part of the presentation, new approaches for ensuring the operation of modern data centers will be considered.

A single network from the private data center to the cloud.A network that understands applications and optimizes its work accordingly.

Modern server platforms and hyperconverged solutions for applications hosting.Infrastructure management and monitoring systems of modern data centers
Lecture 1
Improving the provision of quality and controlled public services for citizens through collaborative solutions using artificial intelligence technology
Accessibility of public services for citizens is a top priority in a modern democratic society. Every citizen should have access to the services provided by the state at any time, in a convenient way, from any place. But at the same time, every government official who communicates with citizens represents the state itself. Therefore, in addition to the issues of accessibility of services, the issue of control over the quality of information provision is one of the most important. The issue of creating accessible, controllable and high-quality G2C services will be discussed in this presentation. The report will cover examples of building G2C services in Ukraine, the reasons that led to their modernization and the results obtained.
Lecture 2
Ensuring efficient and safe work of employees in modern realities
Recent years have created perhaps the greatest number of challenges in terms of changing work processes and employees' jobs. The urgent transition to remote work during COVID, adaptation to the realities of work during the war, all this created changes and allowed us to gain some experience. And, if the urgent introduction of any services made the speed of implementation a primary requirement, now it's time to address the issue of efficiency and security of these services. Today, we hear about employee mobility and cloud services from different sides, but on the other hand, we, like no one else, feel the requirements for the security and efficiency of these very mobile workplaces. Therefore, we need to find a symbiosis between the cloud and corporate infrastructure, between mobility and functionality. The issues of building a workplace and optimizing workflows in such a "hybrid" environment will be discussed during this presentation.
Ready to get started with the program?
Apply now
Contact information
Profile information
Participation goals
Thank you for registering for the program «Cisco: Implementation of Secure Digital Platforms» Our manager will contact you shortly
Oops! Something went wrong while submitting the form.
Registration Сlosed
Please provide your email, and we will notify you about the next intake
Помилка надсилання заявки