Full catalogue of courses
Pagination
One of the many barriers that persons with disabilities face in accessing employment opportunities is that many career sites and job portals do not contain accessible digital content and have not been designed and developed with ICT accessibility requirements in mind. Employers committed to inclusive employment need to be aware of this. Guaranteeing that job portals meet the necessary accessibility requirements is critical for persons with disabilities to enter and thrive in the labour market.
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security. This training course focuses on protecting and strengthening the cyber resilience of critical information infrastructures. The course will also introduce participants to the key terms, policy, guidance, and preparedness efforts required to safeguard critical information infrastructures.
Cyber threat intelligence is an area of cybersecurity that focuses on the collection and analysis of information about current and potential attacks that can threaten the safety of an organization or its assets. It aims to give organisations an in-depth understanding of the threats that pose the greatest risk to their infrastructure and devise a plan to protect their business.
Her CyberTracks offers a five-months training, blending online live with self-paced courses, personalized mentorship, and inspirational webinars showcasing successful women in the cybersecurity field. This training includes in the Her CyberTracks Regional Forum, an on-site event featuring soft skills masterclasses, simulations and hands-on exercises, mentorship circles, study visits to cybersecurity organisations, and engaging networking events.
The online IoT course applied in rural areas is a comprehensive program focused on understanding and implementing Internet of Things solutions in the agricultural context. Participants will be introduced to the fundamental principles of IoT and explore its potential via data collection, device connectivity, and sensor application for optimizing agricultural processes.
Cybersecurity exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task. This course provides a number of steps and guidelines that should be followed when designing a cyber exercise. The steps include defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and capturing lessons learned. This 3-day training course examines the key elements required to develop cyber disaster response simulation exercises.
The disruptive technology of artificial intelligence (AI) shapes human lives and transforms societies. Artificial Intelligence systems increasingly assist and even replace human decisions in military, judicial, policing, healthcare, transport, financial, education, or social protection fields. As artificial intelligence (AI) technologies spread worldwide, international, national, and transnational discussions have increasingly focused on their consequences.
With consideration of the curriculum followed in respective learning institutions, the courses delivered under the African Girls Can Code Initiative are categorized under two Modules that include Technical Skills and Soft Skills. This approach aims to build and strengthen the digital skills of the young girls and enable them to pursue Science, Technology, Engineering and Mathematics (STEM) while preparing them for future career opportunities in the digital sector.
This online course aims to equip national and local government authorities with the necessary knowledge and skills to foster a techn ical understanding of the telecommunications sector, specifically focusing on wireless infrastructure deployment. Through an exploration of regulatory and fiscal aspects related to permitting approvals and processes, this course provides a holistic overview of the key principles essential for promoting investment in connectivity and bridging the digital divide.
This course covers strategic aspects of Internet governance and innovations, including technical, business and regulatory aspects. It covers the convergence of telecommunications to all-IP, including open Internet used for OTT services and NGN used by telecoms. Such convergence is driven by the development of fixed and mobile broadband (cable, optical, 5G), based on standards. In that way the course further covers broadband strategies and innovations as well as telecom standardization and policy.