{"id":721,"date":"2023-10-19T15:32:31","date_gmt":"2023-10-19T15:32:31","guid":{"rendered":"https:\/\/www.cybersecpro-project.eu\/?page_id=721"},"modified":"2026-03-04T14:32:28","modified_gmt":"2026-03-04T14:32:28","slug":"deliverables","status":"publish","type":"page","link":"https:\/\/www.cybersecpro-project.eu\/index.php\/deliverables\/","title":{"rendered":"Deliverables"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"721\" class=\"elementor elementor-721\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-59e18efb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"59e18efb\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1447b7f\" data-id=\"1447b7f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71bc22a1 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"71bc22a1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Deliverables<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53488139 elementor-widget elementor-widget-heading\" data-id=\"53488139\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Find all Deliverables produced by CyberSecPro here<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61b15159 elementor-widget__width-auto elementor-absolute elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"61b15159\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Deliverables<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-94e4c8f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"94e4c8f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f2e9554\" data-id=\"f2e9554\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57e236d elementor-widget elementor-widget-spacer\" data-id=\"57e236d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eb595a elementor-widget elementor-widget-heading\" data-id=\"7eb595a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Work Package 2<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16f5ac2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16f5ac2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f5bb579\" data-id=\"f5bb579\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-376355a elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"376355a\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-981c52b\" data-id=\"981c52b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba3f253 elementor-widget elementor-widget-heading\" data-id=\"ba3f253\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 2.1<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0adb567 elementor-widget elementor-widget-heading\" data-id=\"0adb567\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Practical Skills Gaps in\nEurope: Market Demand and Analyses<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f479c3a elementor-widget elementor-widget-text-editor\" data-id=\"f479c3a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThe CybeSecPro Deliverable D2.1 report investigates the cybersecurity practical skills gaps\nin Europe and analyses the market demand for these skills. The report acknowledges that a complete list\nof cybersecurity practical skills can be complex and interpreted differently by EU nations and\norganisations. For that reason, the report combines them into a list of cybersecurity practical knowledge\nareas and highly essential practical skills. The deliverable also aims at the market driven and\npractitioner&#8217;s approach, therefore, adopted development methodology combines the practical and\napplied research, including an integrated research model. This deliverable captures the cybersecurity\nskill sets needed by the markets, the practical skills offered in the EU academic programmes and the\ngaps between demand and supply of practical skills. Special attention will be given to the three industrial\nsectors: health, energy and maritime. The deliverable reflects the outcomes of tasks T2.1 and T2.2.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78e38ba elementor-align-right elementor-widget elementor-widget-button\" data-id=\"78e38ba\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=834\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1093552 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1093552\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e8864ae\" data-id=\"e8864ae\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29e83da elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"29e83da\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-8129ba8\" data-id=\"8129ba8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b5f0fe elementor-widget elementor-widget-heading\" data-id=\"5b5f0fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 2.2<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba02dac elementor-widget elementor-widget-heading\" data-id=\"ba02dac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Blended CyberSecPro technological\ntraining interactive technologies and\nacademic practice<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb965a5 elementor-widget elementor-widget-text-editor\" data-id=\"fb965a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tCyberSecPro (D2.1) undertook a market-driven investigation to identify EU cybersecurity industry\nknowledge and skills. This analysis (D2.2) of CSP partner courses and tools provided significant\ninsights. Out of 81 courses assessed, 52% were undergraduate, 20% graduate, 9% summer school, and\n19% professional training. Based on CSP partner offerings and market demand, these courses were\ndivided into in-demand and high-demand knowledge domains. In addition, 64 CSP partner cybersecurity\nproducts were evaluated for applicability to different knowledge areas. To determine ENISA role\nalignment, CSP partner courses were compared to the European Cybersecurity Framework (ECSF). CSP\nclasses covered certain responsibilities effectively, but others poorly. However, several ECSF courses\ncovered numerous knowledge areas, satisfying market demand and frameworks.\nRecommendations include expanding course variety, promote networking and collaboration between\nstudents and cybersecurity professionals. It is also necessary to standardize certifications for courses and\ntools, and align CyberSecPro program with ECSF to prepare students for ENISA-specified professional\ncareers. Also, the integration of technical and human aspects of cybersecurity with interdisciplinary\napproaches, ensuring material accessibility, and providing students with easy access to textbooks,\nresearch articles, and information-sharing platforms will be needed. Another recommendation for the\nCyberSecPro program will be a need to update course material and resources often to reflect industry\ndevelopments and developing technologies, and create a feedback loop with program participants, CSP\npartners, and industry experts to analyse and implement user software improvement proposals. Meeting\nthese recommendations will make CyberSecPro a diverse and adaptable resource for cybersecurity\neducation for the EU, and meet the everchanging industry standards.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c55dd1 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"1c55dd1\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=963\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ac016ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ac016ce\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b61fe83\" data-id=\"b61fe83\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cd47d9 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4cd47d9\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-be8628b\" data-id=\"be8628b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f4c0d7 elementor-widget elementor-widget-heading\" data-id=\"4f4c0d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 2.3<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bea8be9 elementor-widget elementor-widget-heading\" data-id=\"bea8be9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CyberSecPro Programme\nSpecifications<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9ac3d3 elementor-widget elementor-widget-text-editor\" data-id=\"f9ac3d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This deliverable outlines the structure, requirements, and specifications of the CyberSecPro<br \/>education and training programme. The main findings of this deliverable are as follows:<\/p><ol><li>By following four selection criteria (namely market demand, relevance to the European<br \/>Cybersecurity Skills Framework (ECSF), availability of education and training<br \/>resources, as well as importance to the effective protection of European cyber<br \/>infrastructure and systems) ten knowledge areas have been identified that will set the<br \/>scope of the CyberSecPro education and training programme. By the careful analysis<br \/>and selection of these knowledge areas, the general structure of the programme is<br \/>established and direction to the CyberSecPro partners in the continuation of the project<br \/>provided.<\/li><li>The existing education and training offerings by CyberSecPro partners have been<br \/>mapped to the identified knowledge areas, and relevant training modules have been<br \/>selected. This ensures that the programme is built upon established resources and<br \/>expertise.<\/li><li>The constraints and requirements for the adoption of the CyberSecPro programme have<br \/>been analysed, encompassing business, technical, legal, social, and financial barriers.<br \/>Solutions to overcome these barriers have been presented, emphasising the need for<br \/>strategic planning, effective communication, and persistent efforts. These findings help<br \/>anticipate and address potential blockages in the programme&#8217;s implementation,<br \/>achievement, and validation.<\/li><li>A total of 68 user stories and 461 requirements for the implementation of the dynamic<br \/>curriculum management (DCM) system have been developed. These requirements<br \/>have been categorised into functional, non-functional, constraint, and supplemental<br \/>requirements, with different levels of priority. They will serve as the foundation for the<br \/>subsequent stages of development and implementation of the DCM system.<\/li><li>Assessment criteria for the selection of a DCM system have been established, and<br \/>available systems on the market have been evaluated accordingly. Moodle has been<br \/>identified as the chosen system. An analysis was conducted mapping the previously<br \/>identified requirements to Moodle to uncover areas where the system already meets the<br \/>requirements and areas where modifications or adaptations need to be made. This<br \/>ensures that the chosen system is able to meet the specific needs of the CyberSecPro<br \/>education and training programme.<\/li><\/ol><p>By addressing these key findings, the CyberSecPro education and training programme can be<br \/>designed and implemented effectively, providing a comprehensive and relevant training<br \/>experience for participants while overcoming any potential challenges<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bdff15 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"8bdff15\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=968\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-17b6065 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17b6065\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-92a52e3\" data-id=\"92a52e3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82356fb elementor-widget elementor-widget-spacer\" data-id=\"82356fb\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-888028d elementor-widget elementor-widget-heading\" data-id=\"888028d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Work Package 3<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-15e1245 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15e1245\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-48cfc97\" data-id=\"48cfc97\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4ce8b3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"c4ce8b3\" data-element_type=\"widget\" id=\"D3\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-20bca55\" data-id=\"20bca55\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-347af7a elementor-widget elementor-widget-heading\" data-id=\"347af7a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 3.1<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a731296 elementor-widget elementor-widget-heading\" data-id=\"a731296\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CyberSecPro Programme Main\nComponents and Procedures<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce88b16 elementor-widget elementor-widget-text-editor\" data-id=\"ce88b16\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThis deliverable outlines the main components and procedures of the CyberSecPro (CSP)\nprogramme. This document presents the CSP programme&#8217;s general-purpose or model syllabi with its\ntraining modules and the Dynamic Curriculum Management (DCM) system. This deliverable reflects\nthe outcomes of tasks T3.1 and T3.2. It focuses on the CSP training modules, model syllabi, templates,\nand key elements of the individual training modules specifically tailored to the health, energy, and\nmaritime sectors. The online DCM portfolio encompasses various training modules, including general\nacademic courses, online courses, training, workshops, cyber exercise sessions, sector-specific\nseminars, hackathons, and interactive cybersecurity labs. The outcomes are a model syllabus for CSP&#8217;s\nmain 12 generic training modules.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd96cf5 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"bd96cf5\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=982\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61336c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61336c2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8267113\" data-id=\"8267113\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d69c9d elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0d69c9d\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-12ca413\" data-id=\"12ca413\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4949d8a elementor-widget elementor-widget-heading\" data-id=\"4949d8a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 3.2<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af6b5fe elementor-widget elementor-widget-heading\" data-id=\"af6b5fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CyberSecPro Cybersecurity\nCertification Schema Proposal<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c78eb50 elementor-widget elementor-widget-text-editor\" data-id=\"c78eb50\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The CyberSecPro cybersecurity certification schema proposal acknowledges the<br \/>certification scheme unavailability of professional cybersecurity trainings, as well as the absence of a<br \/>European Authority for approving both the trainings and the organisations which perform them. On<br \/>these grounds, the manuscript sheds light on the certification landscape regarding relevant organisations<br \/>and bodies in international and European level. Then, the standards, the criteria, and the processes<br \/>regarding professional certifications are thoroughly discussed and assessed. The manuscript concludes<br \/>with a proposal of three schemes which namely are:<\/p><ul><li><strong>Scheme A:<\/strong> Sector-agnostic scheme for a professional cybersecurity programme,<\/li><li><strong>Scheme B:<\/strong> Descriptions of the 12 training modules,<\/li><li><strong>Scheme C:<\/strong> Syllabi of the 12 training modules.<\/li><\/ul><p>The deliverable reflects the Task 3.3 outcomes.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa4f190 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"aa4f190\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1100\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9754539 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9754539\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-45fa16e\" data-id=\"45fa16e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-752aef4 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"752aef4\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-c8b797f\" data-id=\"c8b797f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22f1b13 elementor-widget elementor-widget-heading\" data-id=\"22f1b13\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 3.3<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15ae7df elementor-widget elementor-widget-heading\" data-id=\"15ae7df\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CyberSecPro Portfolio of\nCybersecurity Curricula Targeted to\nHealth<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-701da7f elementor-widget elementor-widget-text-editor\" data-id=\"701da7f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThe CyberSecPro (CSP) portfolio of cybersecurity curricula and detailed syllabi targeted the\ncritical sector of healthcare. The report is a collection of CSP training courses designed to enhance the\nskills of healthcare professionals in the realm of cybersecurity. The content of the syllabi combines CSP\ngeneric and sector specific aspects to provide holistic CSP module training for the critical health sector.\nThe deliverable reflects the outcomes of Task 3.4.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6688c9 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"a6688c9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1093\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7728ad3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7728ad3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-12ff42f\" data-id=\"12ff42f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f65b352 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"f65b352\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-89c2b4d\" data-id=\"89c2b4d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6dfb53 elementor-widget elementor-widget-heading\" data-id=\"e6dfb53\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 3.4<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc9b2d6 elementor-widget elementor-widget-heading\" data-id=\"dc9b2d6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CyberSecPro Bundle of\nCybersecurity Curricula for\nEnergy Sector<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e93839 elementor-widget elementor-widget-text-editor\" data-id=\"4e93839\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The CyberSecPro (CSP) Deliverable D3.4 corresponds to the outcomes of T3.5 regarding the <em>\u201cEnergy Specific Curricula\u201d<\/em> with deadline for Month 18. The proposal of this deliverable is to provide a comprehensive cybersecurity programme portfolio targeted to the energy sector and focused on intensifying knowledge and practical skills in line with the current security challenges facing the sector.<br \/>Likewise, this deliverable also exposes the methodological process carried out in T3.5. It deals with aligning the syllabi of the 12 CPS generic training modules defined in D3.1 to the particularities of the energy scenarios, adapting and parametrising relevant inputs contemplated in the D3.1 templates to specific use cases and applications. The resulting parametrisation is widely outlined throughout this document, where the Cyber Security Body of Knowledge (CyBoK) framework has continued to be a<br \/>reference for the process of integration and adaptation of topics, facilitating the completeness of content.<br \/>Additionally, this process is also attributed to the intensive collaboration of the CSP partners who have demonstrated expertise and competencies in the fields of cybersecurity, energy and education. All of this experience, combined with a methodology for aligning with previous works, have certainly helped<br \/>to establish the 12 CPS sector-specific training modules in the form of courses, seminars, practical exercises, workshops, summer schools, etc. with the final proposal to showcase its value proposition for the operational phase.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7aff3a elementor-align-right elementor-widget elementor-widget-button\" data-id=\"c7aff3a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1107\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-44d0ac8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44d0ac8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b9dfc42\" data-id=\"b9dfc42\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-962502d elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"962502d\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-cc577bc\" data-id=\"cc577bc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-93c5839 elementor-widget elementor-widget-heading\" data-id=\"93c5839\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 3.5<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e5474c elementor-widget elementor-widget-heading\" data-id=\"3e5474c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CyberSecPro Portfolio of\nCybersecurity Curricula Targeted to\nMaritime<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6f69c5 elementor-widget elementor-widget-text-editor\" data-id=\"b6f69c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tMaritime stakeholders are relying on specific systems, namely VMS (vessel\nmonitoring systems), AIS (Automatic Identification Systems) and GNSS (Global Navigations\nby Satellite Systems) to ensure their movements at sea. They use specific professional tools as\nport control (PCS) and cargo controls (CCS) systems to monitor their activity and are largely\nintegrated in the overall supply chains with highly interconnected systems that are as many\npotential sources as possible for threats.\nThe education of maritime stakeholders is broad in addition to the specialists that are operating\ndirectly the incident event management and incident response, mostly in close coordination\nwith national administrations (customs, border security forces and port authorities). From the\ncrew of a ship to the CIS information security officer of a company or a harbour, a broad area of training\nis needed adapted to their needs and skills. Crews of ships must be trained on their specific systems to\nmaintain an ad-hoc security level of their navigation. Shipping companies must ensure that their systems\nare operating, avoiding major shutdowns as the ones observed on MAERSK in 2017 and CMA CGMin\n2021 (the attacks on these companies impacted them with losses estimated at more than 100M\u20ac for\neach). At least, the security of ships and their navigations systems are crucial to the security of crews\nthat are navigating on them.\nThe following modules described hereafter are proposing seminars, courses and workshop aiming at\ndeveloping a cybersecurity culture to maritime stakeholders, developing skills to avoid incidents and\nattacks and reducing risks for the sector.\nThe deliverable reflects the Task 3.6 outcomes.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffcacfd elementor-align-right elementor-widget elementor-widget-button\" data-id=\"ffcacfd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1112\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-88861ff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88861ff\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b359a26\" data-id=\"b359a26\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-baaa979 elementor-widget elementor-widget-spacer\" data-id=\"baaa979\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65e47d4 elementor-widget elementor-widget-heading\" data-id=\"65e47d4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Work Package 4<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b6ec870 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b6ec870\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-097a555\" data-id=\"097a555\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d66e48d elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"d66e48d\" data-element_type=\"widget\" id=\"D4\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-2b2619e\" data-id=\"2b2619e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e19e76 elementor-widget elementor-widget-heading\" data-id=\"4e19e76\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 4.1<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1c9936 elementor-widget elementor-widget-heading\" data-id=\"d1c9936\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CyberSecPro Training Operational Plan<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b31bc31 elementor-widget elementor-widget-text-editor\" data-id=\"b31bc31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThe CyberSecPro Deliverable D4.1 deliverable reflects the outcomes of tasks T4.1 and T4.2\ntill Month 11. Therefore it outlines the operational scalable offering for the CyberSecPro training\nmodules, which cover the ten prioritized CyberSecPro knowledge areas. Consequently, this deliverable\nlists all the training modules that each partner intends to develop and offer. These are then grouped into\na list of 12 CyberSecPro modules, with various synergies proposed to assist in crafting their syllabi and\nfacilitating their operation. Evaluation forms for trainers and trainees are provided, as well as a\nmethodology for planning and implementing Massive Open Online Courses (MOOCs). Moreover, the\ndeliverable aims at providing mobilization mechanisms in order to attract and engage internal and\nexternal trainees and trainers.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f0e0ee elementor-align-right elementor-widget elementor-widget-button\" data-id=\"2f0e0ee\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=988\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-412cfbf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"412cfbf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-9be831a\" data-id=\"9be831a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3c3785 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"f3c3785\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-f70ca53\" data-id=\"f70ca53\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d02d01a elementor-widget elementor-widget-heading\" data-id=\"d02d01a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 4.2<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2ba5da elementor-widget elementor-widget-heading\" data-id=\"f2ba5da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Reports and Training Material on the\nCybersecurity Principles and\nManagement\nTraining Modules<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caad9b8 elementor-widget elementor-widget-text-editor\" data-id=\"caad9b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This deliverable presents the outcomes of T4.3 up to the conclusion of CyberSecPro in Month 39 (February 2026). Hence, it comprehensively records all CSP modules corresponding to the capability category Cybersecurity Principle and Management implemented by the end of February 2026. The document presents quantitative information on hosting site, learners enrolled, background of learners, evaluation forms of learners, evaluation forms of trainers, income, scholarship\/sponsorships, training levels, delivery formats, and sectoral coverage across energy, health, maritime, and general cybersecurity domains. The deliverable includes descriptive analysis of training deployment, illustrating implementation patterns and participation across different module categories and sectors. Moreover, it describes the context of the documentation task and the documentation methodology including the definition of a record comprising the relevant information per module.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b54ca3 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"2b54ca3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=997\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-34088cf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34088cf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1e00181\" data-id=\"1e00181\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe349a9 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"fe349a9\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-9eb384b\" data-id=\"9eb384b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fcd952c elementor-widget elementor-widget-heading\" data-id=\"fcd952c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 4.3<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f222737 elementor-widget elementor-widget-heading\" data-id=\"f222737\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Reports and Training Material on the\nCybersecurity Tools Modules<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9785570 elementor-widget elementor-widget-text-editor\" data-id=\"9785570\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\"p1\">This deliverable presents the outcomes of Task T4.4 up to the conclusion of CyberSecPro in Month 39 (February 2026). Accordingly, it comprehensively records all CSP modules corresponding to the capability category \u201cCybersecurity Tools and Technologies\u201d implemented by the end of February 2026. The document provides quantitative information on the hosting site, learner enrolments, learner background, trainee evaluation forms, trainer evaluation forms, income, scholarships\/sponsorships, training levels, delivery formats, and sectoral coverage across energy, health, maritime, and general cybersecurity domains. The deliverable includes descriptive analysis of training deployment, illustrating implementation patterns and participation across different module categories and sectors. Finally, it describes the context of the documentation task and the documentation methodology, including the definition of a record comprising the relevant information per module.<\/p><div class=\"ghost-text-message\" style=\"display: block;\">Connected! You can switch to your editor<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bed8b49 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"bed8b49\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1392\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b538d43 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b538d43\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c1ca914\" data-id=\"c1ca914\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a00f11e elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"a00f11e\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-8f2aed9\" data-id=\"8f2aed9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-548abec elementor-widget elementor-widget-heading\" data-id=\"548abec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 4.4<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-962613a elementor-widget elementor-widget-heading\" data-id=\"962613a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Reports and Training Material on\nthe Emerging Technologies Modules<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65a2523 elementor-widget elementor-widget-text-editor\" data-id=\"65a2523\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\"p1\">This deliverable reports on the implementation of training modules on emerging technologies developed within the CyberSecPro (CSP) project under Task T4.5 about \u201cOperating the training modules on emerging technologies\u201d. It provides a consolidated overview of CSP modules implementation addressing cybersecurity in emerging digital technologies, critical infrastructure security, and software security. The document provides quantitative data on hosting sites, learner enrolment, backgrounds, learners and trainer evaluations, income, scholarships, training levels, delivery methods, and sector coverage in energy, health, maritime, and cybersecurity fields. It offers a comprehensive overview of training program metrics and sectoral focus areas. The deliverable includes an initial descriptive analysis of training deployment, illustrating implementation patterns and participation across different module categories and sectors. Overall, the document serves as evidence of the effective deployment and reach of the CyberSecPro training programme on emerging technologies and supports the assessment of progress toward the project\u2019s capacity-building and skills development objectives.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6955246 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"6955246\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1395\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b9ed10c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b9ed10c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ca25995\" data-id=\"ca25995\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e9a808 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4e9a808\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-9c0259c\" data-id=\"9c0259c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76a13b2 elementor-widget elementor-widget-heading\" data-id=\"76a13b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 4.5<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a29cf9 elementor-widget elementor-widget-heading\" data-id=\"0a29cf9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Reports and Training Material on\nCybersecurity Offensive Practices\nModules<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cecbe9 elementor-widget elementor-widget-text-editor\" data-id=\"1cecbe9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\"p1\">This deliverable presents the outcomes of T4.6 up to the conclusion of CyberSecPro in Month 39 (February 2026). Hence, it comprehensively records all CSP modules corresponding to the capability category Cybersecurity Offensive Practices implemented by the end of February 2026. The document presents quantitative information on hosting site, learners enrolled, background of learners, evaluation forms of learners, evaluation forms of trainers, income, scholarship\/sponsorships, training levels, delivery formats, and sectoral coverage across energy, health, maritime, and general cybersecurity domains. The deliverable includes an initial descriptive analysis of training deployment, illustrating implementation patterns and participation across different module categories and sectors. Moreover, it describes the context of the documentation task and the documentation methodology including the definition of a record comprising the relevant information per module.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d6f0d6 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"5d6f0d6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1400\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40dbfcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"40dbfcf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3241bfd\" data-id=\"3241bfd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1751fa elementor-widget elementor-widget-spacer\" data-id=\"c1751fa\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b42e95a elementor-widget elementor-widget-heading\" data-id=\"b42e95a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Work Package 5<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60a1d21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60a1d21\" data-element_type=\"section\" id=\"D52\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0ce13fd\" data-id=\"0ce13fd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29433ef elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"29433ef\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-0aafeb9\" data-id=\"0aafeb9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-591f096 elementor-widget elementor-widget-heading\" data-id=\"591f096\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 5.1<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4949a4 elementor-widget elementor-widget-heading\" data-id=\"c4949a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Evaluation Methodology<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc4359b elementor-widget elementor-widget-text-editor\" data-id=\"dc4359b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>CyberSecPro (D5.1) details the evaluation methodology developed to assess satisfaction levels among trainers and trainees, as well as to evaluate MOOCs and training materials through peer-review processes. Unlike earlier surveys within the project, this approach is purpose-driven and tailored to capture experiential feedback rather than technical competencies. The report outlines the tools and strategies used for collecting and analysing both quantitative and qualitative data, emphasising user satisfaction, content relevance, and perceived effectiveness. By distinguishing its objectives from previous assessments, D5.1 establishes a nuanced framework that supports continuous improvement through stakeholder-driven insights. Recommendations also guide future analysis and data use to ensure CyberSecPro\u2019s training activities remain engaging, relevant, and aligned with participant expectations across the EU cybersecurity education landscape.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a22d5e elementor-align-right elementor-widget elementor-widget-button\" data-id=\"2a22d5e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1428\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c9f150 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c9f150\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-33124d9\" data-id=\"33124d9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd9c25d elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"fd9c25d\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-58b16ae\" data-id=\"58b16ae\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a78bf6e elementor-widget elementor-widget-heading\" data-id=\"a78bf6e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 5.2<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e910dcc elementor-widget elementor-widget-heading\" data-id=\"e910dcc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Evaluation and Best Practices<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11782c2 elementor-widget elementor-widget-text-editor\" data-id=\"11782c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This deliverable reports the results of the evaluation of CyberSecPro\u2019s training modules and the\u00a0identification of best practices that support effective cybersecurity education across Europe. Building on the evaluation framework established in D5.1, this deliverable assesses learner satisfaction, training\u00a0effectiveness, practical relevance, and alignment with workforce needs, and synthesises the practices\u00a0that have proven most successful across consortium training activities.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d852f66 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"d852f66\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1327\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4196a24 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4196a24\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d5f667f\" data-id=\"d5f667f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f542cb3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"f542cb3\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-e1ab9e9\" data-id=\"e1ab9e9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b36e72 elementor-widget elementor-widget-heading\" data-id=\"1b36e72\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 5.3<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe7ec16 elementor-widget elementor-widget-heading\" data-id=\"fe7ec16\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CyberSecPro Certification Schema<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4184813 elementor-widget elementor-widget-text-editor\" data-id=\"4184813\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The CyberSecPro project identified the lack of a unified European certification framework for professional cybersecurity training, resulting in fragmented, non-interoperable programmes with limited mutual recognition. This issue is particularly acute in sector-specific contexts, where rapid digitalisation contrasts with low cybersecurity maturity and inconsistent skill development, restricting cross-sector mobility. The project proposes a structured certification schema comprising modular training aligned with defined competencies and subject to higher-level recognition, such as by the ECCC. The sector-specific professional training scheme integrates theoretical and practical learning, maps micro-credentials to ECTS credits, aligns with ECSF profiles and competences, and offers trainees up to 60 ECTS credits.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-566ffdd elementor-align-right elementor-widget elementor-widget-button\" data-id=\"566ffdd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1406\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07396a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07396a9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eae6d3a\" data-id=\"eae6d3a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e7f91df elementor-widget elementor-widget-spacer\" data-id=\"e7f91df\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d8cd55 elementor-widget elementor-widget-heading\" data-id=\"2d8cd55\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Work Package 6<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-99fe199 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"99fe199\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-a03b851\" data-id=\"a03b851\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d59c4a elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"6d59c4a\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-6062f35\" data-id=\"6062f35\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-058f221 elementor-widget elementor-widget-heading\" data-id=\"058f221\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 6.1<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e2b6e4 elementor-widget elementor-widget-heading\" data-id=\"2e2b6e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Dissemination, Communication Plan\nand Exploitation<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5830419 elementor-widget elementor-widget-text-editor\" data-id=\"5830419\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThis document reports the dissemination, communication and exploitation plan for the CyberSecPro\nproject. The approach is incremental and dynamic and considers the growth of material and experience\nthat the project partners will elaborate.\nThis document also presents the dissemination and communication objectives and approach and lists\nplanned publications and events. It describes the target audience and communication channels we plan\nto adopt as project.\nSimilarly, the exploitation and innovation approach presented in this document cover business scenarios\nand models, exploitation approach, knowledge and intellectual property management and protection,\nand sustainability.\nIndividual dissemination, communication, and exploitation activities from each partner focus on\nspecificities of each partner and how they can contribute to increase the impact of the overall results.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69dbbd4 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"69dbbd4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=838\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4186529 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4186529\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c339d03\" data-id=\"c339d03\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54f3766 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"54f3766\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-8205fed\" data-id=\"8205fed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3e830d elementor-widget elementor-widget-heading\" data-id=\"c3e830d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 6.2<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48d38e1 elementor-widget elementor-widget-heading\" data-id=\"48d38e1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Report on Dissemination and\nCommunication Activities<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0defc93 elementor-widget elementor-widget-text-editor\" data-id=\"0defc93\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This deliverable (D6.2) reports on the dissemination and communication activities implemented within the CyberSecPro project up to Month 38 (M38). It presents the key communication assets (visual identity, templates and marketing materials, and the admin platform), the channels and formats used to reach target audiences, and performance against the Grant Agreement KPIs.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5b3e39 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"f5b3e39\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1412\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-368f45f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"368f45f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-9b179c8\" data-id=\"9b179c8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fcd44f4 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"fcd44f4\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-80cd87b\" data-id=\"80cd87b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3996c08 elementor-widget elementor-widget-heading\" data-id=\"3996c08\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 6.3<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50d06ab elementor-widget elementor-widget-heading\" data-id=\"50d06ab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Overall Exploitation, Sustainability\nand Business Plans<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f093938 elementor-widget elementor-widget-text-editor\" data-id=\"f093938\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This deliverable defines the exploitation, sustainability, and business framework for the CyberSecPro project beyond its funded duration under the DIGITAL-2021-SKILLS-01 programme. It consolidates the project\u2019s four Key Exploitable Results (KERs), sector-specific cybersecurity training modules, structured MOOC pathways, the Moodle-based Dynamic Curriculum Management (DCM) platform and a certification-oriented skills validation approach aligned with the European Cybersecurity Skills Framework (ECSF). The document presents a structured exploitation model based on three progressive deployment scenarios. The deliverable integrates market positioning, competitive analysis, business modelling logic, and indicative financial envelopes to define the operational conditions required for sustainable post-project continuation. The financial analysis focuses on minimum operational sustainability thresholds rather than speculative growth projections. Long-term sustainability is framed around institutional adoption, governance clarity, structured content maintenance, and defined operational responsibilities. The document provides a decision-support framework enabling the consortium to determine the most appropriate continuation model after project closure.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38e8da8 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"38e8da8\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1415\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3e2f6c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e2f6c1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-eed0c88\" data-id=\"eed0c88\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-137fcd2 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"137fcd2\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-64eebb7\" data-id=\"64eebb7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e89946 elementor-widget elementor-widget-heading\" data-id=\"5e89946\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 6.4<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a6224d elementor-widget elementor-widget-heading\" data-id=\"4a6224d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Grouped Exploitation Plans<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e8a728 elementor-widget elementor-widget-text-editor\" data-id=\"2e8a728\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\"p1\">This deliverable presents the group exploitation plans of the CyberSecPro project, documenting how the consortium translates its key exploitable results (KERs) into coordinated, multi- partner pathways for post-project continuation and impact. Building on a structured methodology from KERs to exploitation pathways to action-oriented plans, the report consolidates group-level exploitation options across education, open access\/public impact, industry and professional training, community building, and commercialisation. It then develops detailed group exploitation plans for three priority pathways: (1) development of (joint) master programmes, (2) public availability of training materials as OER, and (3) research &amp; development follow-on activities.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35ffba5 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"35ffba5\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1417\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-262c6e8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"262c6e8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-01817b7\" data-id=\"01817b7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6520bd1 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"6520bd1\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-0623354\" data-id=\"0623354\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae3bebd elementor-widget elementor-widget-heading\" data-id=\"ae3bebd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverable 6.5<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d5c2b0 elementor-widget elementor-widget-heading\" data-id=\"3d5c2b0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Individual Exploitation Plans<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b979d09 elementor-widget elementor-widget-text-editor\" data-id=\"b979d09\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This deliverable consolidates the individual exploitation plans of CyberSecPro partners, documenting how organisations are integrating and sustaining key exploitable result 1 (KER1; the modular training portfolio) beyond the funding period. It presents a comparable, partner-by-partner view of baseline educational offers and the concrete pathways through which CyberSecPro outputs are being embedded into university curricula and company training catalogues to generate long-term value for learners and labour-market stakeholders.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66487c3 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"66487c3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1419\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b856261 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b856261\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9555123\" data-id=\"9555123\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c26e0b elementor-widget elementor-widget-spacer\" data-id=\"3c26e0b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4064bac elementor-widget elementor-widget-heading\" data-id=\"4064bac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Collaboration<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0b156af elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b156af\" data-element_type=\"section\" id=\"IRA\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8dc0b6f\" data-id=\"8dc0b6f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6653e24 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"6653e24\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-61a87c7\" data-id=\"61a87c7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-705ec4c elementor-widget elementor-widget-heading\" data-id=\"705ec4c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">CyberSecPro and Curium Comparative Analysis<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11c0bbf elementor-widget elementor-widget-heading\" data-id=\"11c0bbf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">of the Cybersecurity Incident Responder Role Across Frameworks<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dd3bdd elementor-widget elementor-widget-text-editor\" data-id=\"8dd3bdd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\"p1\"><b>Cybersecurity Incident Responders<\/b> play a critical role in defending organizations by handling and mitigating cyber incidents. Multiple national and international skills frameworks define this role, each outlining the Incident Responder\u2019s mission, key tasks, required skills\/abilities, and knowledge. In this analysis, we compare how the Incident Responder role is characterized across eight frameworks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a45e23 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"9a45e23\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecpro-project.eu\/?sdm_process_download=1&#038;download_id=1381\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4fdb74a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4fdb74a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7875b67\" data-id=\"7875b67\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Find all Deliverables produced by CyberSecPro here Work Package 2 Deliverable 2.1 Cybersecurity Practical Skills Gaps in Europe: Market Demand and Analyses The CybeSecPro Deliverable D2.1 report investigates the cybersecurity practical skills gaps in Europe and analyses the market demand for these skills. The report acknowledges that a complete list of cybersecurity practical skills can [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-721","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cybersecpro-project.eu\/index.php\/wp-json\/wp\/v2\/pages\/721"}],"collection":[{"href":"https:\/\/www.cybersecpro-project.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cybersecpro-project.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecpro-project.eu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecpro-project.eu\/index.php\/wp-json\/wp\/v2\/comments?post=721"}],"version-history":[{"count":89,"href":"https:\/\/www.cybersecpro-project.eu\/index.php\/wp-json\/wp\/v2\/pages\/721\/revisions"}],"predecessor-version":[{"id":1433,"href":"https:\/\/www.cybersecpro-project.eu\/index.php\/wp-json\/wp\/v2\/pages\/721\/revisions\/1433"}],"wp:attachment":[{"href":"https:\/\/www.cybersecpro-project.eu\/index.php\/wp-json\/wp\/v2\/media?parent=721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}