The Internet Governance Capacity Building Programme (IGCBP) consists of four phases, three of which take place online: a Foundation Phase, an Advanced Phase, a Policy Research Phase, and a Policy Immersion Phase.

The following is a list of our upcoming courses. Each course belongs to one of the four phases; the topics for each course are described in more detail below.

 Course Title  Phase  Next Course
 Policy Research Course  Policy Research Phase  October 2011 (ongoing) 
 Introduction to Internet Governance  Foundation Phase  March 2012
 Infrastructure and Critical Internet Resources  Advanced Phase  May 2012
 Intellectual Property Rights (IPR)  Advanced Phase  May 2012 
 Cybersecurity  Advanced Phase  May 2012
 Privacy and Personal Data Protection  Advanced Phase  May 2012
 ICT Policy and Strategic Planning  Advanced Phase  May 2012

Introduction to Internet Governance – Issues, Process and Actors [top]

  • Introduction to Internet Governance: Evolution, International Context, Basic Terminology, Guiding Principles
  • Infrastructure and Standardisation Basket: Infrastructure, TCP/IP, DNS, Root Servers, Internet Service Providers, Economic Models, Security, Network Neutrality
  • Legal Basket: Legal Mechanisms, Jurisdiction, Arbitration, Intellectual Property Rights, Cybercrime
  • Economic Basket: E-Commerce, E-Banking and E-Money)
  • Socio-Cultural Basket: Content Policy, Privacy and Data Protection, Multilingualism and Cultural Diversity
  • Development Basket: The Digital Divide, Access to Knowledge, Capacity Development
  • Process: WSIS, IGF, ICANN
  • Actors: ICANN, RIR, ISOC, UN, ITU, Regional Organisations, Governments, Private Sector, Civil Society

Infrastructure and Critical Internet Resources [top]

  • Telecommunication Infrastructure Development: Current Situation, Wired Infrastructure, Wireless Infrastructure, Factors in Telecommunication Development: Opportunities Offered to Developing Countries, Low-Density Environments, Spectrum Regulation
  • Introduction to Infrastructure: Telecommunication Infrastructure Development, Connection Costs, Regulatory Framework, IPv6, Network Neutrality
  • Connection Costs: Current Situation, Reasons for Differences in Costs, Issues: Regulatory Frameworks, Discrepancies in Bandwidth Costs, Costs of Deployment; Wireless as a New Opportunity
  • Protocol Upgrades: Current Situation, Distribution, Need for a Larger Pool, Coexistence of IPv4 and IPv6, IPv6 in Use; Internet Protocol Version 6: New Protocol, New Address Pool, Structure and Features; Opportunities and Challenges: Mobility, Security with IPv6, Global Policy for Allocation of IPv6 Addresses, Deployment of IPv6, Transition from IPv4 to IPv6, Applications
  • Regulatory Framework: Current Situation, Liberalisation and Privatisation, Competitive Telecommunication Markets, Issues: Telecommunication Law and Regulations, Price Regulation, Regulatory Bodies, Regulatory Process, National Information and Communication Policies and Strategies
  • Network Neutrality: Current Situation, Technical Side of Net Neutrality: Quality of Service, Deep Packet Inspection; Opportunities and Challenges: Convergence, Wireless NN, NN and Developing Countries

Intellectual Property Rights (IPR) [top]

  • Introduction to IPR: History, Justifications, International IP Regime, Overview
  • Copyright: Concepts and Subject Matter of Copyright Law, Originality and Creativity, Works Protected under the International IPR System, Difference between an Idea and its Expression, Duration of Copyright Protection and Importance of the Public Domain, Who is an Author, Rights of the Author, International Activity, Common Law Approach: Fair Use Doctrine, Internet and New Challenges
  • Access to Knowledge: Tragedy of the Commons and Tragedy of the Anti-commons, A2K Movements and Projects
  • Software and patents: Software, Patents, Software Patents, Business Methods, Internet and Patents
  • Trademarks, Domain Names, Database, Trade Secrets, Traditional Knowledge: Trademarks, Domain Names, Database Protection, Trade Secrets and Undisclosed Information, Traditional Knowledge and the Internet: A Delicate Balance

Cybersecurity [top]

  • Introduction to Security
  • Cybersecurity: Online Threats to Individuals, Privacy and Security as Challenges of Cybersecurity, Cybersecurity and Public Key Infrastructure, Building Trust in E-commerce
  • Security of the Core Infrastructure: Domain Name System Security: Unilateral Control, Security Threats; Cyberterrorism and Cyberwarfare: Denial of Service, Threat of Cyberwar
  • Internet Safety: Cybercrime, History of Cybercrime, Classification, Impact, Critical Infrastructure Security, Critical Infrastructure Protection, Framework for Combating Cybercrime, Law Enforcement
  • Policies and Strategies: Developed Countries, International Framework: Council of Europe, European Union Directives Related to Data Protection, ITU Draft Initiative on Cybersecurity, Organisation for Security and Cooperation in Europe, Business Initiatives, SAFECode, Intel and Embedded Security, Importance of Public-Private Co-operation
  • Social Aspects of Cybersecurity: Defining Internet Safety, Challenges, Freedom of Expression, Issues: Information and Computer Security, Objectionable Content, Harmful Content, Reliability of Information, Ethics, Health; Child Safety

Privacy and Personal Data Protection [top]

  • Introduction to Privacy and Personal Data Protection
  • Privacy Overview: Defining Privacy, Right to Privacy, Privacy Protection
  • The Evolution of Personal Data Protection: Council of Europe Convention on Data Protection, OECD Guidelines on the Protection of Privacy, European Union Directive on Data Protection, Safe Harbor Agreement, The Asia-Pacific Economic Co-operation Privacy Framework, the Ibero-American Network of Data Protection
  • Emerging Privacy Issues: Identification of an Individual, Authentication, Social Network Sites and Virtual Communities, Digital Rights Management
  • International Initiatives on Information Privacy and Personal Data Protection: Organisation for Economic Co-operation and Development, Internet Corporation for Assigned Names and Numbers, International Chamber of Commerce, International Organization for Standardization, Internet Governance Forum, International Telecommunication Union, European Union
  • Cybercrime, the Secrecy of Communications & Communication Surveillance: Online Threats to Individuals, Secrecy of Communications, Cybercrime, Secrecy of Communication and Communication Surveillance, International Cooperation on Secure Communication

  • Introduction to ICT strategy
  • National ICT policies and strategies, context, and background
  • ICT policy development
  • E-readiness assessment and ICT benchmarking
  • Development of ICT action plans (including actions, Pathfinder projects, funding, partners)
  • Implementation of an action plan (implementation, monitoring, and evaluation of national ICT strategies, scope, project plans, deliverables, roles and responsibilities, dependencies, risks and mitigation strategies, change management)
  • ICT governance and management of the implementation process (governance structures and the implementation process, including monitoring and follow-up of the strategy)
  • Additional reading - case studies