By Registration Method
This course will focus on Wireless and Mobile Ultra Broadband Internet â LTE-A Pro, WLAN and 5G NR, from technology, regulation and business aspects. It will cover mobile broadband technologies, including mobile and Internet convergence, ITUâs role in mobile broadband Internet, 4G LTE, LTE-A (4.5G), LTE-A Pro (4.9G), mobile Internet of Things (IoT) architectures, QoS in 4G/4.5G/4.9G mobile networks, ITU spectrum management, as well as business and regulation aspects of mobile broadband.
This course introduces selected topics from Research Data Science and hands-on exercises are provided to develop/build a range of data related skills and competence including data analysis techniques
Course will cover cybersecurity of web-sites and web applications
The training is intended for computer training both for users with a âbeginningâ level of ICT knowledge, and for those who already have some basic PC skills.
This training aims to introduce participants to MS Office application packages (Word Text Editor, Excel spreadsheet editor: advanced features, as well as basics of cloud technology, Web programming, information security and computer graphics.
This training aims to introduce participants to modern methods of telecommunication network designing and the principles of itâs automation. It is focused on the aspects of broadband networks designing. The training will allow participants to contribute personally to the implementation and development of telecommunication networks in future.
The rise of Internet of Things (IoT) has many names, including The Next Industrial Revolution and Industry 4.0. As with any emerging technology, entrepreneurs worldwide are impatient to build IoT businesses. While every company's IoT product offerings will differ, there are some basic items that must be addressed in order to build a successful IoT business. This capacity building course will introduce the general entrepreneurship concepts and will then focus on IoT business models and user cases.
Explosive growth in demand for the RF spectrum due to liberalized and competitive communications markets requires review of assignment of radio frequencies from a Traditional Spectrum Management method of a âFirst Come and First Servedâ to a Modern Spectrum Management method of a âMarket based Approachâ through spectrum valuation and subsequent auctioning. Unless National Regulatory Authorities (NRAs) reviews the assignment of the radio frequencies then the Digital Dividends and other competitive RF spectrum cannot be licensed at market value.
Capacity building to Member States in Africa region in testing and approving conformity and interoperability of networks, devices and equipment
El objetivo principal de este curso es analizar y emplear diversas herramientas y técnicas que se utilizan para afectar la ciberseguridad y conocer cuáles son las contramedidas para estos ciberataques.
The escalation in the use of connected devices is giving rise to cybercrime and the frequency of traditional street crimes perpetrated through Internet-connected devices are on the increase. These connected technologies are generating big data and digital evidence which is growing in both volume and importance in criminal and civil courts, as such Judicial officers, Legal practitioners, Legislative aids, Investigators and Prosecutors need to fairly and justly evaluate the merits of the offered evidence.