Full catalogue of courses
Pagination
The subject matter of this training course is the discussion of legal framework applicable to Artificial Intelligence with international focus. By discussing the application of Artificial Intelligence, various types of Artificial Agents in many spheres of life will be considered, including: business activity, household, and the public sector. During the training course different definitions of Artificial Intelligence will be considered and discussed from a legal point of view.
Cette formation donne un aperçu des éléments qui, ensemble, constituent un environnement propice aux services financiers numériques et à l'inclusion financière : politique, réglementation et capacité pédagogique. Le cours présente également de nouveaux problèmes tels que la confidentialité des données et les crypto-monnaies qui n'étaient pas généralement dans l'agenda des régulateurs financiers et TIC il y a une décennie.
The objective of this course is to understand best practices in digital evidence preservation, acquisition, analysis and reporting the through use of various tools and techniques. By the end of this training, participants should be able to: - Understand the best practices in dealing with electronic evidences. - Comprehend hashing and forensic imaging. - Understand the importance of Windows registry in forensic investigation. - Ability to perform forensic imaging. - Ability to perform data recovery/carving.
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
This course will cover Future mobile and wireless broadband: LTE-A-Pro, WiFi, Satellites, 5G NR and AI, including technologies, regulation and business aspects. The course will include mobile broadband LTE/LTE-Advanced architecture, 4G Evolved Packet Core (EPC), 4.9G LTE-A-Pro, 4.9G QoS and mobile Internet access, cellular Internet of Things (IoT), LTE in unlicensed bands, LTE-A-Pro V2X and mission critical services, as well as business and regulatory aspects of mobile broadband.
Satellite technologies have played a significant role in communications for many decades, since they are the only ones that can provide truly global coverage. Their applications in IoT have so far been limited, but recent advances in electronics and antenna technologies have ushered a new era of smaller satellites with improved characteristics, which coupled with improvements in launching vehicles open the door for unforeseen applications, sustainable even in budget constrained sectors.
El objetivo del curso es adquirir los conocimientos necesarios para entender el funcionamiento de un Sistema de Gestión de Seguridad de la Información (SGSI) y proponer un diseño de un proyecto de implementación.
SMTP-EM2.4 - Opportunistic Spectrum Access and Cognitive Radio
El objetivo principal de este curso es introducir al participante en el desarrollo de habilidades y conocimientos necesarios para comprender y gestionar los procesos de innovación en las organizaciones.
The course is designed to empower incident handlers to be effective at their work. The training course presents a comprehensive overview of cybersecurity teams' issues on a technical level, vulnerability handling, t rend/technology watch, security tools, and also issues of artefact handling and forensics. The course is technical in nature, relying heavily on hands-on and practical experience. The most recent threats and vulnerabilities are treated.