Full catalogue of courses
This course explains the linkages of ICT with the development of the Digital Economy and the need for appropriate policy and regulatory framework for developing the ICT Sector in any country.
This course will focus on 5G-Advanced Mobile Broadband and Future Services, including technologies, regulation and business aspects. It will cover mobile broadband evolution, from IMT-Advanced (4G) to IMT-2020 (5G) and IMT-2030 (6G).
This course aims to equip professionals with in-depth knowledge and practical skills to manage emerging threats and vulnerabilities in digital infrastructures. The curriculum explores governance and covers policy development, ethical standards and regulatory frameworks in cybersecurity to ensure organizations’ compliance with the latest threats, risk assessment methodologies, and security best practices.
Delivered from the perspective of a small state and targeted at Director-level and above candidates from Forum of Small States (FOSS) countries involved in digital policymaking, this training course will share policy, regulatory and economic development approaches to digital transformation for a digital ready future.
This instructor-led training course, Strategic Foresight 201, is all about helping acceleration centres understand how to plan for the future in a digital world. It focuses on trends in research readiness and is based on the Playbook for Strategic Foresight by the ITU/BDT Innovation and Entrepreneurship Alliance for Digital Development. Equipped with hypothetical case studies, this course is designed to speed up the change to digital technology, encourage new ideas, and support national growth goals.
This course focuses on future fixed and mobile broadband Internet, cloud computing and IoT/AI, including technical, business and regulatory aspects. It covers Internet technologies (IPv6, QUIC, DNS, QoS, cybersecurity), future fixed-terrestrial and satellite broadband including gigabit metallic, cable, and optical broadband (FTTH/FTTR, 50G-PON), submarine cable, satellite broadband, as well as transport networks (ITU’s OTN, SD-WAN, Carrier Ethernet).
Cybersecurity exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task. This course provides a number of steps and guidelines that should be followed when designing a cyber exercise. The steps include defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and capturing lessons learned. This 3-day training course examines the key elements required to develop cyber disaster response simulation exercises.
Data is crucial in policymaking, public service delivery, and development, informing decisions regarding program design, resource allocation, and the evaluation of interventions. Despite its potential, governments and policymakers risk not capturing the full value of data when there are no clearly defined processes and rules for how data is managed within and across institutions. Establishing and implementing a data governance framework can ensure transparency, accountability, and public trust.
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security. This training course focuses on protecting and strengthening the cyber resilience of critical information infrastructures. The course will also introduce participants to the key terms, policy, guidance, and preparedness efforts required to safeguard critical information infrastructures.
This course focuses on technical, business and regulatory aspects of Internet of Things (IoT), Big Data and Artificial Intelligence (AI). It covers Internet technologies for IoT, then IoT standards, architectures and interoperability, as well as IoT policies and regulations, including IoT security and privacy issues. The course includes IoT services in 4G and 5G mobile systems, including massive IoT and critical IoT use cases. The IoT generates large amounts of data that cannot be processed by traditional techniques, and such data is referred to as Big Data.