By Registration Method
Pagination
The Internet of Things (IoT) technology can be regarded as the building block for next-generation Smart Cities (SC) due to its potential in exploiting sustainable information and communication technologies. Initially, the concept of SCs (urban settlements) has originated from the Internet of Things (IoT) technology.
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
Ransomware is major techniques that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware. By the end of this training, participants should be able to have: ⢠Knowledge of Ransomware definition and objective.
Digital data is exposed to various types of threats while traversing data networks across a wide range of platforms. Understanding the types of threats to which data is exposed is as important as understanding how to protect data from vulnerable systems. This course introduces important concepts in maintaining cyber hygiene and preserving data integrity in the cyberspace. This course teaches how to identify the many digital threats to which various classes of data are exposed.
This course will focus on technical, business and regulatory aspects of Internet of Things (IoT), Big Data and Artificial Intelligence (AI). It will cover Internet technologies for IoT, then IoT standards, architectures and interoperability, as well as IoT policies and regulations, including IoT security and privacy issues. The course will include IoT services in 4G and 5G mobile systems, including massive IoT and critical IoT use cases. The IoT generates large amounts of data that cannot be processed by traditional techniques, and such data is referred to as Big Data.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
This course will help the participants to know about the development of Internet of Vehicles industry from the aspects of technology and standardization, the technology and testing of platform, application scenarios of Internet of Vehicles, and the practices of activities in associates and China. Let the participants build the general knowledge of V2X in C<(>&<)>I area.
This course exposes participants to methods used for social media analytics that can be used to convert information derived from social media into insightful tools and how to interact with consumers in real-time. It teaches participants how to manage social media platforms in other to project their online reputation. Objectives of the training course include the following: ⢠Understand the importance of Social media. ⢠Understand how to use difference social media platform. ⢠Understand how to create good and objective social media content. ⢠Understand Social media Analytics.
La transformation digitale des systèmes d'information et des usages est un enjeu de développement crucial pour les organisations et les entreprises. Le Cloud est un des outils technologiques indispensables pour atteindre cet objectif à l'échelle mondial et encore plus en Afrique. Comme l'ont reconnu 17 pays Africains à l'ONU au début 2019 - dont la Côte d'Ivoire, le Cloud est un enjeu technologique majeur pour atteindre les «Sustainable Development Goals ». Encore faut-il maîtriser cette nouvelle technologie.
5th Generation (5G) network is currently in implementation phase. The implementation of key 5G radio technologies such as millimetre wave, beamforming and small cell requires specific guidelines, standards and measurement and methodology if compared to legacy technology. Meanwhile, misunderstanding of the public regarding human exposure to 5G EMF results in public resistance to 5G roll-outs.