Full catalogue of courses
Cybersecurity exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task. This course provides a number of steps and guidelines that should be followed when designing a cyber exercise. The steps include defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and capturing lessons learned. This 3-day training course examines the key elements required to develop cyber disaster response simulation exercises.
Critical Information Infrastructure is defined as those assets systems and functions that are vital to the nations that their incapacity or destruction would have a devastating impact on the economy, government capability to function, public health and safety as well as on national defense and security. This training course focuses on protecting and strengthening the cyber resilience of critical information infrastructures. The course will also introduce participants to the key terms, policy, guidance, and preparedness efforts required to safeguard critical information infrastructures.
This course focuses on technical, business and regulatory aspects of Internet of Things (IoT), Big Data and Artificial Intelligence (AI). It covers Internet technologies for IoT, then IoT standards, architectures and interoperability, as well as IoT policies and regulations, including IoT security and privacy issues. The course includes IoT services in 4G and 5G mobile systems, including massive IoT and critical IoT use cases. The IoT generates large amounts of data that cannot be processed by traditional techniques, and such data is referred to as Big Data.
The CSIRT/SOC Establishment and Modernisation course is training program specifically designed to help organisations to establish an effective CSIRT/SOC team. The course provides a detailed guidance on the CSIRT/SOC team mandate and covers all the key elements required for its successful establishment. Our experienced instructors bring a wealth of knowledge and expertise to the course, drawing upon real-world cases to share the critical lessons learned.
The digital transformation in the public sector course is designed to provide a comprehensive understanding of how digital technologies can revolutionize public service and governance. Through a mix of theoretical insights, practical examples from global initiatives and hands-on exercises, learners will explore strategies for implementing digital changes within their organization. This course aims to equip learners with the skills and knowledge to lead and participate in digital transformation effectively.
This course focuses on Security and Quality of Service (QoS) in Internet network from technology, regulation and business aspects. It covers Internet fundamentals, including Internet protocols and architectures, Internet security standards and approaches as defined by IETF (Internet Engineering Task Force), as well as ITU's security architectures for end-to-end communications. Further, the course incorporates cybersecurity approaches from the ITU viewpoint, and security aspects of emerging cloud computing and Internet of Things (IoT).
The implementation of the UN cyber norms requires adjusting or establishing policies, procedures, regulations or capabilities or ado pting other measures which support state and national adherence to the projected conditions of the recommendations for norms. By improving national cybersecurity, countries will be better able and willing to work with other countries to improve cybersecurity regional and globally.
This training aims to develop a critical understanding of the challenges and critical success factors that need to be considered in considering the investment to spearhead the development of digital government. At a high level, the programme comprises three main areas of knowledge sharing and skills development organised into three major themes. Theme one establishes the contours of digital transformation by navigating and dissecting the social and economic value induced by the adoption and proliferation of digital technologies.
This module will provide learners with an understanding of the management of radio spectrum related to satellite communications syst ems.
The course, "Role of ICT in Disaster Management," is structured to illuminate the pivotal role of Information and Communication Technology (ICT) in the spectrum of disaster management phasesâmitigation, preparedness, response, and recovery. Encompassing a well-rounded curriculum, this course delves into Disaster Management (DM) Framework, including regulatory, legal, and policy frameworks that enable the use of technologies for DM, and the roles and responsibilities of each of administration involved in Disaster Risk Reduction (DRR) at the country level.