By Course Level
Pagination
Data is crucial in policymaking, public service delivery, and development, informing decisions regarding program design, resource allocation, and the evaluation of interventions. Despite its potential, governments and policymakers risk not capturing the full value of data when there are no clearly defined processes and rules for how data is managed within and across institutions. Establishing and implementing a data governance framework can ensure transparency, accountability, and public trust.
This course will help the participants to know about the overall development status and experience of China's broadband network and universal service development status and experience; the introduction of different optical fiber broadband access technologies and technical solutions for fiber-to-the-room; the planning of FTTH network; management and operation of Massive Home Gateways; troubleshooting of FTTH networks.
El módulo aborda tres elementos cruciales en la gestión del espectro radioeléctrico (RE): la UIT (Unión Internacional de Telecomunicaciones), la CITEL (Comisión Interamericana de Telecomunicaciones) y las CRM (Conferencias Regionales de Radiocomunicaciones). Se analiza un marco de referencia que ofrece una visión global de las radiocomunicaciones y las tendencias en el uso de las bandas del espectro RE, especialmente en relación con las nuevas tecnologías de banda ancha.
The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.
This course is designed to develop IT professional's knowledge and skills to scope, initiate, deliver and close a fiber optic project, in time, on budget, and to the highest quality specifications. Some of the topics to be discussed include tools and techniques for planning, design and implementing. FTTH, Campus, Backbone and Submarine Systems and other systems. The skill set garnered in this training will no doubt provide an impetus for a robust and resilient fiber network performance and higher skills.
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security. This training course focuses on protecting and strengthening the cyber resilience of critical information infrastructures. The course will also introduce participants to the key terms, policy, guidance, and preparedness efforts required to safeguard critical information infrastructures.
This course provides a comprehensive overview of 5G technology, its global regulation and applications. Participants will learn about the evolution and key components of 5G, its applications in sectors such as healthcare and transportation, and the regulatory landscape in different regions. The course also covers security and privacy issues, as well as the economic and social impacts of 5G. Case studies will be presented and best practices for effective 5G deployment will be discussed, preparing participants to influence the development of this technology.
This course focuses on technical, business and regulatory aspects of Internet of Things (IoT), Big Data and Artificial Intelligence (AI). It covers Internet technologies for IoT, then IoT standards, architectures and interoperability, as well as IoT policies and regulations, including IoT security and privacy issues. The course includes IoT services in 4G and 5G mobile systems, including massive IoT and critical IoT use cases. The IoT generates large amounts of data that cannot be processed by traditional techniques, and such data is referred to as Big Data.
National cyber crisis management course is the introductory two-day, scenario-based, purpose-built training designed to take attendees to the intermediate level. The course will include both theoretical and practical components that cover a wide range of topics related to national cyber crisis management. Students will explore the main concepts of cyber crisis management, understand the key roles and responsibilities of key stakeholders involved in national cybersecurity crisis management, including the role CSIRTs.