The course dives deep into CSIRT/SOC establishment practice, where combination of theory, unique experience with lessons learned, and hands-on practice give attendees a clear and actionable picture on how to build an effective cybersecurity team.
This training helps to successively prepare for cybersecurity team establishment and answers the main questions raised before starting:
Understand the drivers and mechanisms of climate change and the sources of greenhouse gases.
Have a broad overview of the current status and developments relating to carbon footprinting, covering the key concepts and the main international standards.
Be familiarized with the methodology for the quantification and reporting of the carbon footprint of a product (CFP) in accordance with ISO 14067.
Calculate a product carbon footprint.
This course enables participants to develop the necessary expertise to implement a management system for sustainable development in communities (MSSDC) based on ISO 37101, an international standard that aims at helping communities of all types and sizes become more sustainable and resilient.
The subject matter of this training course is the discussion of legal framework applicable to Artificial Intelligence with international focus. By discussing the application of Artificial Intelligence, various types of Artificial Agents in many spheres of life will be considered, including: business activity, household, and the public sector. During the training course different definitions of Artificial Intelligence will be considered and discussed from a legal point of view.
Traitement distribué dans le Big Data(TBC)
At the completion of this training course, participants will be able to: - Understand both the importance and the processes necessary to handle data so as to insure its admissibility in a court of law. - Develop an investigative process for the digital forensic investigation. - Understand methods of focusing investigations through analysis of multiple evidence sources. - Effectively prepare for incident response of both victim and suspect systems, including understanding the importance of network reconnaissance and network traffic analysis.
As cyber threats grow in number and sophistication, building a security team dedicated to incident response is a necessity. In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. This particular course focused on how to build an effective cyber incident response team and its capability including the setup and the governance framework.
This course will cover Future mobile and wireless broadband: LTE-A-Pro, WiFi, Satellites, 5G NR and AI, including technologies, regulation and business aspects. The course will include mobile broadband LTE/LTE-Advanced architecture, 4G Evolved Packet Core (EPC), 4.9G LTE-A-Pro, 4.9G QoS and mobile Internet access, cellular Internet of Things (IoT), LTE in unlicensed bands, LTE-A-Pro V2X and mission critical services, as well as business and regulatory aspects of mobile broadband.