The subject matter of this stationary workshop is the discussion of legal framework applicable to Artificial Intelligence with international focus. By discussing the application of Artificial Intelligence, various types of Artificial Agents in many spheres of life will be considered, including: business activity, household, and the public sector. During the workshop different definitions of Artificial Intelligence will be considered and discussed from a legal point of view.
The course will not take place in May 2022 and is postponed to a later date. For more information, please contact firstname.lastname@example.org
This training is focused on mastering the fiber optic tests that are required to verify that your infrastructure can support high data rate applications (10 Gb/s, 40 Gb/s, 100 Gb/s) and Raman amplification as well as extended wavelength ranges for CWDM and DWDM systems. It is typically required to characterize fibers before upgrading data bitrate.
The Internet of things (IoT) is a term for the growing number of electronics that aren't traditional computing devices, but are connected to the internet to send data, receive instructions or both. There's an incredibly broad range of things that fall under that umbrella: Internet-connected smart versions of traditional appliances like refrigerators and light bulbs, gadgets that could only exist in an internet-enabled world like Alexa-style digital assistants; internet-enabled sensors that are transforming factories, healthcare, transportation, distribution centers and farms.
This course will focus on 5G-Advanced Mobile Broadband Internet and New Services, including technologies, regulation and business aspects. Module 1 will cover the Set of Radio Interface Technologies (SRITs) for use with 5G RAN in NSA (Non Stand-Alone) deployments.
The SMTP is designed for individuals within ICT and telecommunications sectors who wish to enhance their knowledge and competence in the area of spectrum management. This includes engineers and managers working in telecommunications regulatory authorities, ICT service providers and other ICT stakeholders. Policy makers in ministries and government departments responsible for ICTs will also benefit from this programme.
L'Internet des Objets est décrit comme un nouveau paradigme qui permet de proposer de nouveaux services dans de nombreux secteurs d'activité comme l'e-santé, la surveillance, la traçabilité, l'automatisation des chaines de production et dans de nombreux domaines ou l'innovation technologique est très prometteuse.
The main objective of this training course is to allow participants to acquire sufficient knowledge on how to empower an incident reponse team for effective incident resolution and mitigate the impact of security threats within their organizations. Other objectives include:
This course is designed for network engineers, network designers, and network planning personnel needing to learn the fundamental principles and practices for designing a basic optical network. It covers advanced single mode networks, focusing on CWDM and DWDM network design for high-speed networks (10 Gb/s, 40 Gb/s, 100 Gb/s, 400Gb/s).
By the end of this training, the participants should be able to:
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
Ransomware is major techniques that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware.
By the end of this training, participants should be able to have: