Full catalogue of courses
Pagination
The implementation of the UN cyber norms requires adjusting or establishing policies, procedures, regulations or capabilities or ado pting other measures which support state and national adherence to the projected conditions of the recommendations for norms. By improving national cybersecurity, countries will be better able and willing to work with other countries to improve cybersecurity regional and globally.
This module will provide learners with an understanding of the management of radio spectrum related to satellite communications systems.
This training is designed to help participants understand the key challenges and success factors involved in driving digital government initiatives. The programme focuses on three main areas to build knowledge and skills in a practical, engaging way.
This course focuses on technical, business and regulatory aspects of Internet of Things (IoT), Big Data and Artificial Intelligence (AI). It covers Internet technologies for IoT, then IoT standards, architectures and interoperability, as well as IoT policies and regulations, including IoT security and privacy issues. The course includes IoT services in 4G and 5G mobile systems, including massive IoT and critical IoT use cases. The IoT generates large amounts of data that cannot be processed by traditional techniques, and such data is referred to as Big Data.
This 4-week online, instructor-led course delves into the dynamic world of Digital Innovation Ecosystems. Participants will gain a comprehensive understanding of the key components, players, and trends shaping these environments. Drawing on insights from the accompanying book, Digital Innovation Ecosystems, the course equips participants with the knowledge and skills to foster innovation within their organizations and contribute to thriving digital ecosystems.
This training course provides participants with an intermediary exposure to the world of policymaking and electronics producer responsibility in the area of e-waste management. It brings together key learning materials and resources based on the underpinning circular economy principles and the legal, financial and administrative components of well-functioning e-waste management systems.
El curso está diseñado para profesionales de las telecomunicaciones que quieren profundizar en las tecnologÃas inalámbricas y su gestión en redes modernas, explora los principios de las comunicaciones inalámbricas, las arquitecturas de redes, los mecanismos de acceso al espectro y los requisitos de ancho de banda.
This course is designed to introduce the in-depth concept of cyber threat intelligence to participants and provide them with the practical experience to gain cyber threat intelligence skills required to make security teams better, threat hunting more accurate, incident response more effective, and organizations more aware of the evolving cyber threat landscape. Cyber threat intelligence is an area of cybersecurity that focuses on the collection and analysis of information about current and potential attacks that can threaten the safety of an organization or its assets.
This course covers a comprehensive view of some of the most dynamically developing business areas of radiocommunications. The course aims at describing the technologies and their lines of development which are present in the World in the given field.
The independent course provides high-level technical knowledge.
This course focuses on Security and Quality of Service (QoS) in Internet network from technology, regulation and business aspects. It covers Internet fundamentals, including Internet protocols and architectures, Internet security standards and approaches as defined by IETF (Internet Engineering Task Force), as well as ITU's security architectures for end-to-end communications. Further, the course incorporates cybersecurity approaches from the ITU viewpoint, and security aspects of emerging cloud computing and Internet of Things (IoT).