KODE Project – Gjilan 2023 – Cyber Security
  • Home
  • Academy
  • Kode project – gjilan 2023 – cyber security

Cyber Security Academy Program – Gjilan Region


Our main contribution is to provide materials and know-how, for mixed curricula, tailored to the ICT industry requirements in which we operate.

Program offers theoretical and practical lessons covering Network Administrator tailored made curricula. Hands-on experience with real customers in live environment and laboratory activities.

Peer Learning, Communication and Team-Work are other important job required skills that candidates will develop throughout this program.

Successful candidate will be prepared to fully join the high demand of labor market and guarantee a career path for themselves.


KODE Project

The Government of Kosovo has been supported from the World Bank to implement the Kosovo Digital Economy (KODE) Project. The KODE Project implemented by the Ministry of Economy will finance the critical fundamentals needed for digital transformation and Policy fulfillment. It will provide high speed broadband infrastructure and support access to labor markets, new sources of knowledge, and public services to households and institutions in Project areas. At the national level, the Project will train and connect youth to employment opportunities through YOU Program and improve access to knowledge sources, including to better reaching and collaborations opportunities to High Educational Institutions.


Youth Online and Upward (YOU) Program

YOU Program will finance provision of training for young people and their connection to working opportunities. The activities will primarily cater to unemployed or underemployed young men and women to increase their ability to compete in relevant segments of work. The Program will skill beneficiaries to perform IT and IT‐enabled services. It is expected that through this training the beneficiaries will increase their employability in the local ICT market.

Duration of training 6 Months
Course and in company training 300 hours in total
Training start July 2023
Who can apply? Any person over 16+
Required language skills Good knowledge of English
Course requirement Basic understanding of
Computer Networks
Course Fee Gratis

What are you waiting for?
Apply by clicking or scanning the following QR code.

Training includes the following topics:

· Knowledge of cybersecurity, including the impact of threats.

· Recognize the evolving cyber threat landscape, including different characteristics of cyberattacks, malware and cryptocurrency.

· Protection of data using authentication, encryption and backup.

· Learn what networks do and how they operate.

· Essentials of network devices and how to configure them.

· Understanding of core networking concepts (TCP/IP, DNS, DHCP, HTTP/S, SSH) and network troubleshooting (tcpdump, wireshark)

· Characteristics and benefits of Cloud and Virtualization technologies.

· Security and Risk Management

· Asset Security

· Security Architecture and Engineering

· Communication and Network Security

· Identity and Access Management (IAM)

· Security Assessment and Testing

· Security Operations

· Software Development Security

This training module is organized in a way that includes theory-focusing lessons, lab activities as well as practice-oriented exercises.

Expected Results from Academy Program

Successful Candidate should be able to engage responsibilities below:

· Global implications of cyber threats

· Ways in which networks are vulnerable to attack

· Impact of cyber-attacks on industries

· Approach to threat detection and defense

· Why cybersecurity is a growing profession

· Opportunities available for pursuing network security certifications

· Describe the tactics, techniques and procedures used by cybercriminals.

· Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

· Describe technologies, products and procedures used to protect confidentiality, ensure integrity and provide high availability.

· Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.

· Explain the purpose of laws related to cybersecurity.