Our Networks, Our Security: Cybersecurity with a gender perspective
OEA I CICTE
Registration Closed

This online course was developed by the Cybersecurity Section of CICTE/OAS as part of the CYNDER project, “Closing the Gender Gap in the Cybersecurity Agenda of the Americas.” It provides accessible, easy-to-understand guidance on digital security, with a particular emphasis on prevention, safe online practices, and effective responses to technology facilitated gender based violence.
Method: Virtual
Duration: 16 weeks
Weekly dedication: 4 hours
Registration Closed
About the course
The content is designed to empower participants with practical knowledge they can apply in everyday digital contexts.
Throughout the course, participants build a clear understanding of how the internet works while exploring emerging technologies such as the Internet of Things and Artificial Intelligence. Foundational cybersecurity concepts are introduced in a practical and approachable way, helping learners recognize common online risks and understand how these technologies shape both opportunities and vulnerabilities in the digital space.
Beyond technical learning, the course encourages reflection on the social and cultural biases that often discourage women from fully engaging with technology and cybersecurity. Participants are invited to challenge these assumptions and consider strategies for greater inclusion and participation.
The program is self‑paced and structured into five modules, allowing learners to progress according to their own needs, and is complemented by live sessions that support questions, dialogue, and the creation of a collaborative learning community.
Participants
The course is intended for women and young people with limited knowledge of digital security, as well as public officials, educators, and members of civil society who provide guidance or support to women who are victims of online abuse, and for anyone from the general public interested in learning more about cybersecurity.
Learning objectives
1. Recognize Cyber Threats. Participants will gain a deeper understanding of how the internet works and the gender-specific risks and threats present in online spaces. This awareness will help them clearly identify their digital security needs, recognize warning signs and patterns of digital violence, and take proactive steps to protect themselves.
2. Identify Technology-Facilitated Gender-Based Violence. The course will provide clear, accessible information on the characteristics of online gender-based violence against women and girls, as well as the different ways it manifests in digital environments.
3. Adopting Cybersecurity Practices. Participants will learn practical digital security strategies they can easily incorporate into their daily routines. Additionally, for those currently experiencing or who have experienced online violence or threats, the course will offer guidance on digital security protocols, response strategies, documentation techniques, and available courses of action for support.
Course Program
The virtual course consists of five modules:
The first modules—Module 1, Our Internet, Our Rights: Basic Concepts, and Module 2, Demystifying Digital Security—introduce foundational ideas about how the internet works, define cybersecurity, and explore its relevance to women’s everyday lives.
Module 3, Technology-Facilitated Gender-Based Violence Against (TFGBV) Women and Girls, examines the concept and characteristics of online gender-based violence and the various forms it can take. This module also provides additional information and recommendations for identifying and preventing grooming.
Following this theoretical grounding, Modules 4, Everyday Practices for Digital Protection, and Module 5, Taking Action: What to Do if You Face TFGBV, focus on practical guidance. They outline essential digital security practices to help prevent cyberattacks and technology‑facilitated abuse, and offer recommendations for responding to online gender-based abuse, including documentation and reporting strategies.
Learning Methodology
- The asynchronous virtual course is designed for flexible navigation, allowing participants to move freely according to their interests, preferences, and assessment of their own cyber risks.
- All modules are available from the start, and participants are not required to complete or pass earlier evaluations to access later content.
- Across all modules, participants will find supplementary materials such as videos, exercises, and additional resources to deepen their understanding of the topics covered.
- The virtual classroom includes a permanent discussion forum where participants can share comments and reflections on the course content.
- Contact email addresses for the Cybersecurity Section are also provided for those who wish to submit private questions or feedback.
Certification
Certification: 40 hours
- You can earn a course certificate regardless of the order in which you navigate the modules. However, to qualify for certification, you must complete and pass the reinforcement exercises included in all five modules.
Registration
Schedule
- Registration opens: April 13, 2026
- Training begins: April 16, 2026
- Duration: 16 weeks
- Available spots: 300
*The virtual classroom will close when maximum number of participants is reached.
Registration Process
- Click “Register.”
- Complete the required information.
Unenrollment
- If the learning path is not started within 15 days, the educational license may be revoked.