By Training Type
Pagination
L'Internet des Objets est décrit comme un nouveau paradigme qui permet de proposer de nouveaux services dans de nombreux secteurs d'activité comme l'e-santé, la surveillance, la traçabilité, l'automatisation des chaines de production et dans de nombreux domaines ou l'innovation technologique est très prometteuse. Au cours de cette formation sont abordées les technologies actuelles de l'internet des objets, les différentes approches architecturales réseaux sont présentées ainsi que les aspects de standardisation et d'interopérabilité.
Artificial Intelligence (AI) technology are developing at a rapid pace, driven by innovation and with recent advances in AI, machines are gaining the ability to learn, improve and make calculated decisions in ways that will enable them to perform tasks previously thought to rely on human experience, creativity, and ingenuity. As the technology continue to evolve, it is important to understand how AI has the potential to help improve cybersecurity efforts.
The Internet of Things (IoT) technology can be regarded as the building block for next-generation Smart Cities (SC) due to its potential in exploiting sustainable information and communication technologies. Initially, the concept of SCs (urban settlements) has originated from the Internet of Things (IoT) technology.
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
Ransomware is major techniques that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware. By the end of this training, participants should be able to have: ⢠Knowledge of Ransomware definition and objective.
Digital data is exposed to various types of threats while traversing data networks across a wide range of platforms. Understanding the types of threats to which data is exposed is as important as understanding how to protect data from vulnerable systems. This course introduces important concepts in maintaining cyber hygiene and preserving data integrity in the cyberspace. This course teaches how to identify the many digital threats to which various classes of data are exposed.
This course will focus on technical, business and regulatory aspects of Internet of Things (IoT), Big Data and Artificial Intelligence (AI). It will cover Internet technologies for IoT, then IoT standards, architectures and interoperability, as well as IoT policies and regulations, including IoT security and privacy issues. The course will include IoT services in 4G and 5G mobile systems, including massive IoT and critical IoT use cases. The IoT generates large amounts of data that cannot be processed by traditional techniques, and such data is referred to as Big Data.
Global digital growth is continuing to fundamentally transform the lives of people, businesses and institutions, bringing people out of poverty, increasing wider prosperity, welfare and enabling new ways for governments and citizens to engage with each other. It is also creating a more connected world and supporting globalisation with greater access to free markets, democratic systems, prosperity and innovation.
This course will help the participants to know about the development of Internet of Vehicles industry from the aspects of technology and standardization, the technology and testing of platform, application scenarios of Internet of Vehicles, and the practices of activities in associates and China. Let the participants build the general knowledge of V2X in C<(>&<)>I area.
This course exposes participants to methods used for social media analytics that can be used to convert information derived from social media into insightful tools and how to interact with consumers in real-time. It teaches participants how to manage social media platforms in other to project their online reputation. Objectives of the training course include the following: ⢠Understand the importance of Social media. ⢠Understand how to use difference social media platform. ⢠Understand how to create good and objective social media content. ⢠Understand Social media Analytics.