Full catalogue of courses
Pagination
This course is primarily based on the ITU/World Bank digital regulation platform with a focus on the following aspects: digital transformation strategies, regulatory governance, evidence-based decision making, regulatory sandboxes, competition and economics (market analysis), infrastructure sharing, universal access and service financing efficiency, data and consumer protection, cyber-security and resilience regulatory measures and strategies, and emerging technologies regulatory aspects.
This module will provide students with an understanding of the management of radio spectrum related to satellite communications syst ems.
El curso taller está orientado a revisar la teoría detrás de la matriz de evaluación y en base al análisis poder desarrollar un Programa de Ciberseguridad con proyectos de ciberseguridad priorizado en base al riesgo inherente como resultado de la evaluación.
Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threats, it's now more important than ever to have the skills required to investigate network attacks and vulnerabilities. Network Forensics starts with the core concepts like coding, networking, forensics tools, and methodologies for forensic investigations. We will also explore the tools used for network forensics, followed by understanding how to apply those tools to a PCAP file and write the accompanying report.
This course will focus on technical, business and regulatory aspects of QoS for Fixed and Mobile Networks. It includes QoS (Quality of Service) and QoE (Quality of Experience) fundamentals by ITU, as well as traffic and QoS management in Internet and IP networks. Further, it includes QoS for fixed ultra-broadband access, including QoS solutions in metallic and optical networks, carrier grade Ethernet QoS, as well as end-to-end QoS. The course also covers QoS for mobile ultra-broadband access, including 4G and 5G mobile technologies and their QoS capabilities and approaches.
Como parte de nuestras tareas de pentesting muchas veces necesitamos hacer pruebas de penetracion a nuestras aplicaciones, por lo que necesitamos muchas herramientas automatizadas y customizadas a nuestras necesidades, por lo que es altamente necesario que un especialista en ciberseguridad tenga conocimientos solidos en Python aplicado.
The course is a bite-sized version of the Circular and Sustainable Public Procurement for ICTs. It sets out the systems and process requirements for ICT procurement in a way that supports the transition to circular and sustainable system solutions.
The Spectrum Management Training Programme (SMTP) is designed for individuals within ICT and telecommunications sectors who wish to enhance their knowledge and competence in the area of spectrum management. This includes engineers and managers working in telecomm unications regulatory authorities, ICT service providers and other ICT stakeholders. Policy makers in ministries and government departments responsible for ICTs will also benefit from this programme.
eMCM-3 Legal, Regulatory, Policy <(>&<)> Environment of a Converged Society
En este curso se pretende dar una visión en general de las distintas formas de modelar el canal de propagación en entornos interiores complejos. Para ello a lo largo del curso se pretende emular aquellos fenómenos físicos que determinan la propagación de la una señal radio en la banda de milimétrica (30GHz). La emulación de estos fenómenos físicos se hará por medio de técnicas deterministas como lo es el trazado de rayos.