eCourse on EIC Pathfinder

eCourse based on live recordings and with a follow-up live Q&A session

Master just in half-day in total  how to develop a winning Pathfinder grant Application

Structure:

  • What is the difference between Pathfinder, Transition and Accelerator in EIC and which is best for you
  • How to exploit specific information for your Pathfinder application
  • How to set-up the best consortium for your Pathfinder application
  • How to deal successfully with each of the three different sections in your Pathfinder grant application (Excellence, Impact and Implementation) and dealing with the related criteria

It is full of tips and best practices and suitable also for potential applicants who either develop a proposal from scratch or they re-submit their own.

It is an eye-opening workshop that we personally guarantee its high quality, else we will return to you any fee.

REGISTER BELOW.

In case your organisation is a member of OpenCosmos Platform, you can register and participate for free. See current members of OpenCosmos below


University of Girona - WikipediaPolitecnico di Milano – RECIPE H2020 ProjectUniversita-degli-studi-di-torino-logo - GO FAIR

UNIVERSITAT POLITECNICA DE CATALUNYA | CipsecKaunas University of Technology – EngageStudentsInstitut de Recerca Biomèdica de Lleida Fundació Dr. Pifarré - IRBLLEIDA  Employees, Location, Careers | LinkedInHome - IISPV IMMIB




Contact information

We'll send your receipt and other important info to this email.
Order summary
pathfinder_challenge_calls_

eCourse on EIC Pathfinder

Module 1: Intelligence on pathfinder calls
How to identify and exploit critical information related to the Pathfinder call of proposals
Module 2: Intelligence call topics
Intelligent analysis of the Pathfinder call of proposals and use it as the key building block of winning grant application
Module 3 : Building a Pathfinder proposal
The three foundations for a winning proposal in Pathfinder
Module 4 : Follow-up with hands on practice

EUR 397
Total due EUR 397

Payment information

All transactions are secured using 256-bit encryption.