Full catalogue of courses
The Master of Communications Management (MCM) programme comprises three distinc elements of PG, Cert, PG Dip and Masters. The dissertation component provides an opportunity for the students to undertake rigorous research in a field relevant to their specialist course of study. the main deliverable will be a written document (dissertation), although in some instances supporting antefacts and other evidence may also be generated.
The past two years have shown that digital transformation is no longer optional. It is a central tool for public service delivery, citizen engagement, and catalysing new industries and opportunities. Digital is a key enabler for development in Small Island Developing States, with a crucial role in building their resilience and economic recovery.
This course covers the strategic aspects of Internet governance and innovations, regarding the technology, regulatory and business aspects. The transition of telecom networks and services to all-IP networks has been completed almost everywhere in the first two decades of the 21st century. Such convergence in telecommunications towards IP networks and services and use of the Internet technologies is driven by the development of broadband across the globe.
CIR course will provide students with all necessary knowledge of cyber incident response activities, what are main goals and challenges, and explaining main roles and responsibilities in such important process. They will get most up to date trends in this area with an emphasis on most important details of each cyber incident response stage. Upon the successful completion of this course, students will be able take a part in development and implementation of cyber incident plan.
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000. The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies. Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
This web-based training gives a comprehensive overview on how to implement an information security management system (ISMS). With the completion of this training, learners will have a deep understanding of the benefits of an ISMS, and the knowledge on how to plan and implement an ISMS all by themselves. They will be able to integrate the ISMS in the management structure of a company or organization in connection with other management systems.
This online course will provide theoretical and practical knowledge of it and cyber security and security methods for computer, network and electronic communication. The course consists of various chapters and will cover fundamentals, such as IT versus ICS, threats and their sources, authentication, computer access control, cryptography, network security, network firewall concepts, intrusion detection. The student will get a comprehensive view on security in the cyber space.
In the telecommunications industry, price is no longer the sole factor in purchasing decisions. Service quality plays a key role to all stakeholders and, particularly, in achieving consumer satisfaction. The measurement of Quality of Service (QoS) and Quality of Experience (QoE) is, however, becoming increasingly complex to obtain as quality can be compromised by various factors along the value chain such as with the network infrastructure, the devices and/or applications a consumer is using and other factors influencing a consumer's experience.
La ciberseguridad es un reto complejo que engloba múltiples y diferentes aspectos de gobernanza, políticos, operativos, técnicos y jurídicos. La presente formación proporciona conocimientos generales para abordar, organizar y jerarquizar muchos de estos ámbitos basándose en modelos, marcos y otras referencias existentes y ampliamente reconocidas.
Cybersecurity is a complex challenge that encompasses multiple different governance, policy, operational, technical and legal aspects. This training provides general knowledge to address, organise and prioritise many of these areas based on existing and well-recognised models, frameworks and other references. The training focuses on elements for protecting civilian aspects of cyberspace and as such, it covers the overarching principles and good practice that need to be considered in the process of drafting, developing and managing a National Cybersecurity Strategy.