Full catalogue of courses
The CSIRT/SOC Establishment and Modernisation course is training program specifically designed to help organisations to establish an effective CSIRT/SOC team. The course provides a detailed guidance on the CSIRT/SOC team mandate and covers all the key elements required for its successful establishment. Our experienced instructors bring a wealth of knowledge and expertise to the course, drawing upon real-world cases to share the critical lessons learned.
National cyber crisis management course is the introductory two-day, scenario-based, purpose-built training designed to take attendees to the intermediate level. The course will include both theoretical and practical components that cover a wide range of topics related to national cyber crisis management. Students will explore the main concepts of cyber crisis management, understand the key roles and responsibilities of key stakeholders involved in national cybersecurity crisis management, including the role CSIRTs.
En este curso se pretende dar una visión en general de las distintas formas de modelar el canal de propagación en entornos interiores complejos. Para ello a lo largo del curso se pretende emular aquellos fenómenos físicos que determinan la propagación de la una señal radio en la banda de milimétrica (30GHz). La emulación de estos fenómenos físicos se hará por medio de técnicas deterministas como lo es el trazado de rayos.
This course covers spectrum engineering foundations for students to be able to perform link budget calculations, interference analysis, and provide an understanding of 3D propagation modeling for radio communications services frequency planning. This is intended to support modern spectrum management. The aim of this course is to provide students with spectrum engineering foundations in order to be able to perform link budget calculations, interference analysis, and provide understanding of 3D propagation modelling for radio communications services frequency planning.
This course will help the participants to know about the general development of 5G industry globally and in China from the aspects of market, technology evolution, application scenarios etc.; the key technologies and standards progress of 5G; the application status of 5G in different vertical sectors of economy; testing technologies and its standardization and practices in the area of 5G, such as base station, massive MIMO and RF-OTA, network performance, etc.
This course is designed to encompass the theory, the technology and field engineering aspects of fiber optic planning design and deployment by adopting new developments in the industry. This course offers participants a thorough understanding of the basic physics associated with fiber systems alongside their respective applications â encompassing optical transmitters/receivers, multiplexing and transmission characteristics.
The course explains the e-governance legal framework and its various components. The course introduces the e-governance general legal concept and the legal disciplines that form the basis of the e-governance legal framework. The course covers the e-governance juridical aspects and challenges (including ethical concerns) from national and international (including European Union (EU)) perspectives. A walkthrough of the most relevant e-governance legal acts, cases, and principles will be provided during the course.
The SMTP is designed for individuals within ICT and telecommunications sectors who wish to enhance their knowledge and competence in the area of spectrum management. This includes engineers and managers working in telecommunications regulatory authorities, ICT service providers and other ICT stakeholders. Policy makers in ministries and government departments responsible for ICTs will also benefit from this programme.
The disruptive technology of artificial intelligence (AI) shapes human lives and transforms societies. Artificial Intelligence systems increasingly assist and even replace human decisions in military, judicial, policing, healthcare, transport, financial, education, or social protection fields. As artificial intelligence (AI) technologies spread worldwide, international, national, and transnational discussions have increasingly focused on their consequences.
Network forensics is a subset of digital forensics that deals with network attacks and their investigation. In the era of network attacks and malware threats, it's now more important than ever to have the skills required to investigate network attacks and vulnerabilities. Network Forensics starts with the core concepts like coding, networking, forensics tools, and methodologies for forensic investigations. We will also explore the tools used for network forensics, followed by understanding how to apply those tools to a PCAP file and write the accompanying report.