Full catalogue of courses
This course will provide participants with an introductory exposure to the world of policymaking and electronics producer responsibility in the area of e-waste management, bringing together key learning materials based around the underpinning legal, financial and administrative components of well-functioning e-waste management systems.
The course explains the foundational concepts and components for e-governance interaction in information society. It starts with an introduction to what information society is and how it has established the environment for e-governance development and digital transformation in the public sector. Then, the main building blocks of e-governance, their aims, initiatives, and enablers are introduced, and how they are related to external subjects and domains.
Digital technology is becoming important in addressing sustainable development challenges. This course introduces participants to the challenges of digital inclusion, the consequences of digital divides, and the opportunities towards inclusive and equitable digital transformation. The modules focus on digital inclusion, evaluation, and approaches to understanding ICTs and their relationship with development and governance in a changing technology landscape.
El módulo aborda tres elementos cruciales en la gestión del espectro radioeléctrico (RE): la UIT (Unión Internacional de Telecomunicaciones), la CITEL (Comisión Interamericana de Telecomunicaciones) y las CRM (Conferencias Regionales de Radiocomunicaciones). Se analiza un marco de referencia que ofrece una visión global de las radiocomunicaciones y las tendencias en el uso de las bandas del espectro RE, especialmente en relación con las nuevas tecnologías de banda ancha.
The Zero Trust Architecture (ZTA) approach is rapidly emerging as a pivotal trend in cybersecurity, particularly for the protection of Critical Information Infrastructure (CII). Unlike traditional security models relying on perimeter defense, ZTA operates on the principle of "never trust, always verify," ensuring that every access request is continuously authenticated and authorized.
While many individuals with disabilities are technologically savvy, persons with disabilities in general are faced with a digital gap. This is further compounded by digital gaps along lines of gender and socio-economic status, amongst others. These digital gaps need to be addressed, if we want to ensure that persons with disabilities do not miss out on the opportunities provided by the digital economy.
This course provides a comprehensive overview of 5G technology, its global regulation and applications. Participants will learn about the evolution and key components of 5G, its applications in sectors such as healthcare and transportation, and the regulatory landscape in different regions. The course also covers security and privacy issues, as well as the economic and social impacts of 5G. Case studies will be presented and best practices for effective 5G deployment will be discussed, preparing participants to influence the development of this technology.
National cyber crisis management course is the introductory two-day, scenario-based, purpose-built training designed to take attendees to the intermediate level. The course will include both theoretical and practical components that cover a wide range of topics related to national cyber crisis management. Students will explore the main concepts of cyber crisis management, understand the key roles and responsibilities of key stakeholders involved in national cybersecurity crisis management, including the role CSIRTs.
The course covers the role, functions and basic techniques of spectrum monitoring, and purpose and capabilities of different types of spectrum monitoring equipment.
The course aim is to: - Clarify organizations responsible to set the standards and mechanisms established by national authorities to enforce mandatory standards. - Help self-monitoring of players in order to conform to set standards and those of the regulator. - Analyze the available penalties for contravening the set standards. - Ensure the participants differentiate the different roles undertaken by various players in the field. - Assess cases for licensing based on pre-established set of standards.