Shortcut Menu
Main Menu Shortcut
Content Shortcut

Main Activities

Global Project (GCCD)

Training Course

The GCCD will provide an invitation-based trainings to support member countries to respond to cyber incidents and establish cyber protection policies. Internally developed curriculum and training materials will be used to show differences from the existing training programs. It is expected that the participants will be able to enhance background knowledge through various kinds of lectures as well as improve practical skills through field experiences.

Joint Seminar

Cybersecurity Joint Seminar will cover various themes requested by a country which needs assistance. The GCCD will design a tailored program based on the requests from the country and its level of expertise and knowledge. The qualified personnel, including instructors, will lead the programs. Co-host countries will provide a venue for the seminar in local which will last about 1~2 days.

How to proceed?

Interactive lecture; discussion, exercise, simulation and etc.


Any topic related to cybersecurity can be the subject of a discussion. If you want to know more about the previously organized GCCD seminars, please refer to the GCCD brochure, uploaded at the introduction section of “Home” tab. The subjects of GCCD seminars can be categorized as follows: - Creating a national cybersecurity framework or strategy - Establishing and operating a national CERT/CC - Detecting, analyzing, and responding to major cyber incidents - Sharing current cybersecurity situations including key issues

Potential Benefits?

The participants will take high quality seminars as well as share experiences and knowhow of the cybersecurity power house. They will also grasp practical help to enhance capacity building efforts and address cybersecurity problems.

Cost Allocation?

A co-host country and GCCD will share the burdens of hosting a local seminar individually based on a mutual discussion. The GCCD usually bears travel expenses for the Korean delegations including instructors.

How to Apply?

Any country with needs to improve cybersecurity may be able to apply for this joint seminar. After the evaluation of an application, the GCCD will work with the respective country to organize the seminar. If you need further details or any clarification of the seminar, don’t hesitate to send an email to

Details of a seminar such as a type or subject can be flexibly changed based on a negotiation.


Consultations which are intended to increase the level of cybersecurity of the countries in need are divided into two categories of managerial and technical. The GCCD organizer and field experts will visit a recipient country and provide customized cybersecurity consultations to the country with carrying out an assessment (managerial) and test (technical).

Type of Consultation?

1) Managerial Side
- "Cybersecurity Readiness Assessment" applies to assess the ICT assets of the public sector. This assessment consists of “Mandatory Items” and “Optional Items”. The elements of the previous item are “Base Index” that focuses on creating an environment for cybersecurity and “Activity Index” that evaluates actual cybersecurity activities. The latter is to evaluate the compliance to the core criteria of personal information protection. Customized consultations will be given accordingly.

2) Technical Side
- Korean qualified white hackers will conduct a “Penetration Test” – a break into target computer systems and networks by exploiting security holes. The test helps to identify vulnerabilities of the systems and networks, effective defense strategies, and the defeated ones (if any) – on a public system to analyze its vulnerabilities. After that, the experts will provide technical consultations of necessary procedures according to the analyzed results.

Potential Benefits?

The country will be able to understand the current status of their cybersecurity competency and guide themselves where to make the right investment and the area where needs further development. They will also acquire the capabilities to detect and respond to cyberattacks.


If you need further details or any clarification on the consultation, feel free to send an email:

Contents above are subject to change without notice.