By Training Modality
This course focuses on future fixed and mobile broadband Internet, cloud computing and IoT/AI, including technical, business and regulatory aspects. It covers Internet technologies (IPv6, QUIC, DNS, QoS, cybersecurity), future fixed-terrestrial and satellite broadband including gigabit metallic, cable, and optical broadband (FTTH/FTTR, 50G-PON), submarine cable, satellite broadband, as well as transport networks (ITU’s OTN, SD-WAN, Carrier Ethernet).
The scope of this course will cover an overview of the current traditional approaches to spectrum management and their limitations; new approaches to spectrum management focusing on spectrum authorisation regime to improve efficient and optimum use of the spectrum resources through adoption of advanced spectrum allocation, assignment and management techniques, and modern spectrum licensing management processes based on operational requirements and technical and economic viability.
This course aims to equip professionals with in-depth knowledge and practical skills to manage emerging threats and vulnerabilities in digital infrastructures. The curriculum explores governance and covers policy development, ethical standards and regulatory frameworks in cybersecurity to ensure organizations’ compliance with the latest threats, risk assessment methodologies, and security best practices.
This course will cover an in-depth understanding of theories, tools and practices involved in spectrum management strategic planning and policy developments that are aligned with forward-looking analytical spectrum management approaches enabling wireless innovation.
This course focuses on technical, business and regulatory aspects of Artificial Intelligence (AI) and Metaverse for future Internet and telecoms. It covers fixed and mobile broadband Internet, QoS, and cybersecurity, AI fundamentals for telecom sector including ITU’s Machine Learning (ML), Generative AI, federated learning, Explainable AI (XAI) and responsible AI use. The course includes future AI-based clouds and IoT, including AI as a Service (AIaaS), edge AI and edge clouds, and Industrial IoT.
The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.
This course is designed to develop IT professional's knowledge and skills to scope, initiate, deliver and close a fiber optic project, in time, on budget, and to the highest quality specifications. Some of the topics to be discussed include tools and techniques for planning, design and implementing. FTTH, Campus, Backbone and Submarine Systems and other systems. The skill set garnered in this training will no doubt provide an impetus for a robust and resilient fiber network performance and higher skills.
This training course will equip participants with the knowledge and tools to design and implement scalable, interoperable, and citizen-focused digital public infrastructure. Through an in-depth exploration of GovStack’s modular building blocks, frameworks like PAERA, and real-world case studies, this course offers practical insights into creating efficient e-governance systems.
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security.
This course is an advanced-level course in smart city design. It focuses on both theoretical and practical aspects of specific technologies that are required when developing smart city solutions.