Blog
Computer Science research results
In 2025 more than 20 computer science students completed their thesis project with support from ICT institute. In this article you can find the titles and topics of the completed research projects as well as some main results. The projects ranged from data science e-health AI applications to software prototypes for cybersecurity analytics. Research approach…
Pavlo Burda
Using Notion for your ISMS
Building and maintaining an ISO 27001-compliant Information Security Management System (ISMS) can be resource-intensive, especially for smaller organizations. At the ICT Institute, we are committed to help organizations with the ISO 27001. To help organizations get started, we’ve built a free Notion template that includes a ready-to-use Risk Register. This template allows you to set…
Pavlo Burda
EXIN cloud foundation exam at Motopp
To become a successful software engineer, you also need to know how companies use software and what you need to consider when making software architecture decisions. Since a lot of software is used in ‘the cloud’, understanding what cloud infrastructure is is useful for any IT professional. We have therefore added the cloud computing foundation…
Sieuwert van Otterloo
Security+ certification with practice questions
The CompTIA Security+ is a well-known entry-level information security certification designed for cyber security professionals and those seeking entering the field. We wrote about it in a previous article. I recently got this certificate and I would like to share my experience with those willing to give it a try. An important note, the knowledge…
Pavlo Burda
ISO 27001 controls for security and business continuity
Disruptions in IT and business operations are not a question of “if” but “when”, as shown last year during the CrowdStrike massive outage. Disruptions include infrastructure failure, cyberattacks such as ransomware, even natural disasters but, more often, human error. For these reasons, the ISO 27001 2022 standard includes two important controls related to information security…
Pavlo Burda
