About the Digital Training Hub


The Digital Training Hub is a regional mission aimed at transforming how cybersecurity talent is developed, shared, and strengthened. It offers an immersive, flexible, and engaging experience that blends hands-on training, collaborative mentorship, and challenges tailored to every role and skill level in the field.

We aim to be a direct response to the constant challenges brought on by digital transformation—empowering resilient and proactive individuals who are ready to anticipate what’s next. This hub was created to nurture, motivate, and connect those who are called to protect the digital future.

Our structure is pioneering, as it is based on the NICE framework (National Initiative for Cybersecurity Education), allowing for a clear and personalized progression according to each role and level — from those just starting out to more advanced professionals.

This hub is made possible by a powerful alliance: CRDF Global, an international organization specializing in capacity building and digital security, leads the initiative alongside key players such as the Cybersec Cluster, a driving force in strengthening the Latin American cybersecurity ecosystem; and Hackrocks, experts in gamified training; and the strategic support of MICITT.




 



Who Should Attend?

  • Beginners looking to learn about cybersecurity and begin their professional journey.
  • Practitioners looking to enhance their capacity and build new skillsets.
  • Experts looking to practice their skills in challenges while staying up to date on modern developments.

The Digital Training Hub is for those who believe that cybersecurity is something to train for… and to transform together.

 



 

What Participants Will Experience

Courses containing Labs, Lectures, and challenges focused on multiple cybersecurity roles:
  • Security Operations Center (SOC) Analyst
    • SOC Analysts form the backbone of a Security Operations Center (SOC). They monitor security systems, detect and analyze threats, and ensure the organization's IT infrastructure remains secure. SOC Analysts act as the eyes and ears of the cybersecurity team, providing critical insights to maintain operational integrity and thwart potential attacks.

      A SOC Analyst is responsible for identifying, analyzing, and mitigating cybersecurity threats to ensure the confidentiality, integrity, and availability of an organization's information assets. The role evolves through three levels of expertise: Entry-Level Analyst, Coordinator, and Specialized Expert.

  • Incident Responder
    • Incident Responders act as a crucial line of defense in maintaining an organization’s cybersecurity posture. They are tasked with identifying and mitigating threats, triaging alerts, and ensuring effective escalation and resolution of incidents. As the organization's cybersecurity first responders, they safeguard network resources and maintain operational stability during and after cyber incidents.

  • Penetration Tester
    • The role of a Penetration Tester (or Pentester) is to simulate cyberattacks on systems, networks, and applications to identify vulnerabilities before malicious actors can exploit them. This includes performing detailed investigations, penetration testing, vulnerability testing, and forensic analysis. Pentesters use a range of ethical hacking techniques and security tools to evaluate and strengthen an organization's security posture.

  • Cyber Architect
    • The Cyber Architect must have an in-depth understanding of several core concepts and technical areas relevant to their role. The role focuses on designing and implementing secure architecture for systems and networks, while considering organizational needs, compliance, and emerging threats. They are responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational missions and business processes. 

  • Chief Information Security Officer (CISO)
    • The CISO is responsible for defining and leading the organization’s cybersecurity strategy, policy development, and overall management of cybersecurity operations. The role requires a strategic leader who can assess and mitigate risks, ensure compliance, manage resources, and communicate cybersecurity goals and policies effectively to all stakeholders. The CISO plays a key role in making high-level decisions related to cybersecurity initiatives, resources, and alignment with business objectives. The NICE Framework helps outline the skills, knowledge, and tasks needed to excel at this level, ensuring that cybersecurity operations align with organizational goals while mitigating risks and improving security. 

  • Cyber Threat Intelligence Analyst
    • Threat Intelligence Analysts serve as the intelligence arm of the cybersecurity team. Their role is to continuously monitor the threat landscape, gather data from multiple internal and external sources, and produce actionable insights. By correlating threat indicators, profiling attackers, and identifying trends, they help organizations anticipate and prevent cyber attacks. Their work informs security operations, risk management, and incident response planning.

      Each lesson, challenge, and simulation is designed to be both practical and exciting—but above all, to make a lasting impact. Because here, it’s not just about learning skills: it’s about building community, recognizing achievements, sharing experiences, and shaping a new model of training.




Platform Registration Form


Free Registration and Participation

This e-learning platform is offered free of charge. Enrollment happens continuously and credentials are administered monthly. Please register here to indicate your interest in the Digital Training Hub.

Following your registration submission, CRDF Global will review your information and work with our partners to issue you an account and credentials. 

For any questions revolving the Digital Training Hub or registration process, please email DTH@crdfglobal.org 


Workshop Sponsors

Cybersec Cluster
hackrocks-1 (1)
910758ab-15fe-49a8-91df-7014af790dc1