By Date
This course explains the linkages of ICT with the development of the Digital Economy and the need for appropriate policy and regulatory framework for developing the ICT Sector in any country.
This course will provide participants with an introductory exposure to the world of policymaking and electronics producer responsibility in the area of e-waste management, bringing together key learning materials based around the underpinning legal, financial and administrative components of well-functioning e-waste management systems.
The course explains the foundational concepts and components for e-governance interaction in information society. It starts with an introduction to what information society is and how it has established the environment for e-governance development and digital transformation in the public sector. Then, the main building blocks of e-governance, their aims, initiatives, and enablers are introduced, and how they are related to external subjects and domains.
This course is an advanced-level course in smart city design. It focuses on both theoretical and practical aspects of specific technologies that are required when developing smart city solutions.
Digital technology is becoming important in addressing sustainable development challenges. This course introduces participants to the challenges of digital inclusion, the consequences of digital divides, and the opportunities towards inclusive and equitable digital transformation. The modules focus on digital inclusion, evaluation, and approaches to understanding ICTs and their relationship with development and governance in a changing technology landscape.
This course focuses on future fixed and mobile broadband Internet, cloud computing and IoT/AI, including technical, business and regulatory aspects. It covers Internet technologies (IPv6, QUIC, DNS, QoS, cybersecurity), future fixed-terrestrial and satellite broadband including gigabit metallic, cable, and optical broadband (FTTH/FTTR, 50G-PON), submarine cable, satellite broadband, as well as transport networks (ITU’s OTN, SD-WAN, Carrier Ethernet).
Cybersecurity exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task. This course provides a number of steps and guidelines that should be followed when designing a cyber exercise. The steps include defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and capturing lessons learned. This 3-day training course examines the key elements required to develop cyber disaster response simulation exercises.
This course will help the participants to know about the overall development status and experience of China's broadband network and universal service development status and experience; the introduction of different optical fiber broadband access technologies and technical solutions for fiber-to-the-room; the planning of FTTH network; management and operation of Massive Home Gateways; troubleshooting of FTTH networks.
El módulo aborda tres elementos cruciales en la gestión del espectro radioeléctrico (RE): la UIT (Unión Internacional de Telecomunicaciones), la CITEL (Comisión Interamericana de Telecomunicaciones) y las CRM (Conferencias Regionales de Radiocomunicaciones). Se analiza un marco de referencia que ofrece una visión global de las radiocomunicaciones y las tendencias en el uso de las bandas del espectro RE, especialmente en relación con las nuevas tecnologías de banda ancha.
The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.