Volg ICTI

Blog

Photo by Jeswin Thomas on Unsplash

Computer Science research results

In 2025 more than 20 computer science students completed their thesis project with support from ICT institute. In this article you can find the titles and topics of the completed research projects as well as some main results. The projects ranged from data science e-health AI applications to software prototypes for cybersecurity analytics. Research approach…

Pavlo Burda
ISMS cover

Using Notion for your ISMS

Building and maintaining an ISO 27001-compliant Information Security Management System (ISMS) can be resource-intensive, especially for smaller organizations. At the ICT Institute, we are committed to help organizations with the ISO 27001. To help organizations get started, we’ve built a free Notion template that includes a ready-to-use Risk Register. This template allows you to set…

Pavlo Burda

EXIN cloud foundation exam at Motopp

To become a successful software engineer, you also need to know how companies use software and what you need to consider when making software architecture decisions. Since a lot of software is used in ‘the cloud’, understanding what cloud infrastructure is is useful for any IT professional. We have therefore added the cloud computing foundation…

Sieuwert van Otterloo
Studying for the CompTIA Security+ certification

Security+ certification with practice questions

The CompTIA Security+ is a well-known entry-level information security certification designed for cyber security professionals and those seeking entering the field. We wrote about it in a previous article. I recently got this certificate and I would like to share my experience with those willing to give it a try. An important note, the knowledge…

Pavlo Burda
Generator - Photo by Fahim Junaid on Unsplash

ISO 27001 controls for security and business continuity

Disruptions in IT and business operations are not a question of “if” but “when”, as shown last year during the CrowdStrike massive outage. Disruptions include infrastructure failure, cyberattacks such as ransomware, even natural disasters but, more often, human error. For these reasons, the ISO 27001 2022 standard includes two important controls related to information security…

Pavlo Burda