By Date
This course will provide participants with an introductory exposure to the world of policymaking and electronics producer responsibility in the area of e-waste management, bringing together key learning materials based around the underpinning legal, financial and administrative components of well-functioning e-waste management systems.
The course explains the foundational concepts and components for e-governance interaction in information society. It starts with an introduction to what information society is and how it has established the environment for e-governance development and digital transformation in the public sector. Then, the main building blocks of e-governance, their aims, initiatives, and enablers are introduced, and how they are related to external subjects and domains.
Digital technology is becoming important in addressing sustainable development challenges. This course introduces participants to the challenges of digital inclusion, the consequences of digital divides, and the opportunities towards inclusive and equitable digital transformation. The modules focus on digital inclusion, evaluation, and approaches to understanding ICTs and their relationship with development and governance in a changing technology landscape.
Cybersecurity exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task. This course provides a number of steps and guidelines that should be followed when designing a cyber exercise. The steps include defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and capturing lessons learned. This 3-day training course examines the key elements required to develop cyber disaster response simulation exercises.
This course will help the participants to know about the overall development status and experience of China's broadband network and universal service development status and experience; the introduction of different optical fiber broadband access technologies and technical solutions for fiber-to-the-room; the planning of FTTH network; management and operation of Massive Home Gateways; troubleshooting of FTTH networks.
El módulo aborda tres elementos cruciales en la gestión del espectro radioeléctrico (RE): la UIT (Unión Internacional de Telecomunicaciones), la CITEL (Comisión Interamericana de Telecomunicaciones) y las CRM (Conferencias Regionales de Radiocomunicaciones). Se analiza un marco de referencia que ofrece una visión global de las radiocomunicaciones y las tendencias en el uso de las bandas del espectro RE, especialmente en relación con las nuevas tecnologías de banda ancha.
While many individuals with disabilities are technologically savvy, persons with disabilities in general are faced with a digital gap. This is further compounded by digital gaps along lines of gender and socio-economic status, amongst others. These digital gaps need to be addressed, if we want to ensure that persons with disabilities do not miss out on the opportunities provided by the digital economy.
This course is designed to develop IT professional's knowledge and skills to scope, initiate, deliver and close a fiber optic project, in time, on budget, and to the highest quality specifications. Some of the topics to be discussed include tools and techniques for planning, design and implementing. FTTH, Campus, Backbone and Submarine Systems and other systems. The skill set garnered in this training will no doubt provide an impetus for a robust and resilient fiber network performance and higher skills.
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security. This training course focuses on protecting and strengthening the cyber resilience of critical information infrastructures. The course will also introduce participants to the key terms, policy, guidance, and preparedness efforts required to safeguard critical information infrastructures.
This course focuses on technical, business and regulatory aspects of Internet of Things (IoT), Big Data and Artificial Intelligence (AI). It covers Internet technologies for IoT, then IoT standards, architectures and interoperability, as well as IoT policies and regulations, including IoT security and privacy issues. The course includes IoT services in 4G and 5G mobile systems, including massive IoT and critical IoT use cases. The IoT generates large amounts of data that cannot be processed by traditional techniques, and such data is referred to as Big Data.