AI & MACHINE LEARNING FOR ICT PROFESSIONALS COURSE
Course title
AI & Machine Learning for ICT Professionals
Target audience:
ICT professionals (networking, systems, cloud, security, operations), technical managers, and developers working in telecom, enterprise IT, cloud, or service providers.
Prerequisites
Basic programming (Python recommended),
Foundations in statistics and linear algebra (basic familiarity)
Familiarity with Linux, cloud basics (AWS/GCP/Azure), networking concepts
Recommended pre-course reading: Python basics, Numpy/Pandas tutorials.
Course objectives
By course end, participants will be able to:
- Explain core ML/AI concepts and how they apply to ICT problems.
- Build, evaluate, and deploy ML models for ICT use cases (anomaly detection, traffic classification, capacity forecasting, predictive maintenance).
- Integrate ML models into cloud, container, and networked environments.
- Implement MLOps best practices for monitoring, retraining, and governance.
- Understand ethical, privacy, and security implications of AI in ICT.
Course duration and modes of delivery
Intensive 4 weeks physical training OR 2 weeks of physical and 3 weeks of online training
Course Content
Introduction to AI/ML for ICT
- What is AI/ML? Supervised/unsupervised/reinforcement learning
- ICT-specific applications and success stories
- End-to-end ML workflow
- Python for Data Science (refresher)
- NumPy, Pandas, visualization (Matplotlib/Seaborn)
- Data wrangling with logs, NetFlow, SNMP, and telemetry.
Data collection & feature engineering in ICT
- Network/telemetry data sources, time series, categorical encodings
- Aggregation, windowing, labeling, imbalance handling
Supervised learning for ICT
- Linear/logistic regression, decision trees, ensemble methods (RandomForest, XGBoost)
- Use cases: traffic classification, QoS prediction, security event classification
Unsupervised learning & anomaly detection
- Clustering (k-means, DBSCAN), PCA, isolation forest, autoencoders
- Use cases: intrusion detection, fault detection, rogue device identification
Time series forecasting
- ARIMA basics, exponential smoothing, state-space models, LSTM/RNN, Prophet
- Use cases: capacity planning, demand forecasting, SLA predictions
Deep learning basics & specific ICT use cases
- Neural network fundamentals, CNNs and RNNs when relevant
- Packet/flow analysis, traffic fingerprinting, voice/VoIP analytics
MLOps & model deployment in ICT environments
- Model versioning, CI/CD for ML, containerization (Docker), model serving (REST, gRPC)
- Deployment on cloud, edge devices, network function virtualization (NFV)
Monitoring, maintenance & model lifecycle
Drift detection, re-training strategies, model performance monitoring
- Logging, alerting, A/B testing and rollback
Security, privacy & ethics
- Adversarial ML basics, privacy-preserving ML (differential privacy, federated learning)
- Regulatory concerns and responsible AI for networked systems
Edge & cloud-native ML for ICT
- Accelerators (GPUs/TPUs), Kubernetes, serverless, edge deployment patterns
- Resource-constrained model optimization (quantization, pruning)
Project & case studies
- Real-world case studies (telecom churn/forecasting, IDS, anomaly detection for routers, predictive maintenance)
- Capstone project presentations
Hands-on labs & practical exercises
- Parsing and feature extraction from NetFlow/IPFIX/PCAP and syslog
- Traffic classification using ML on flow-level features
- Anomaly detection on time-series telemetry (router CPU, interface counters)
- Forecasting bandwidth demand and SLA breach probability
- Building a model serving pipeline with Docker, FastAPI/Flask and Kubernetes
- Demonstrating drift detection and automated retraining
- Simple adversarial example demonstration and mitigation
Capstone project ideas
- Real-time anomaly detection pipeline for network telemetry (NetFlow/Prometheus)
- Predictive maintenance for telecom equipment using SNMP and alarm history
- Traffic classification and QoS-aware routing suggestion system
- Capacity forecasting and automated scaling rules for virtualized network functions.
- Security event classification and prioritization for SIEM integration
- Federated learning across edge routers for distributed intrusion detection
Tools, frameworks & Datasets
- Languages/IDEs: Python, JupyterLab
- Libraries: scikit-learn, pandas, NumPy, matplotlib, seaborn, TensorFlow or PyTorch, XGBoost, Prophet
- MLOps/Deployment: Docker, Kubernetes, Airflow, MLflow, Seldon/TF Serving, FastAPI
- Monitoring: Prometheus, Grafana, ELK stack (Elasticsearch/Logstash/Kibana)
- Cloud: AWS/GCP/Azure services (Sagemaker, Cloud ML, Vertex AI), serverless
- Datasets: CAIDA, MAWI, CIC-IDS, UNSW-NB15, NetFlow/PCAP sample datasets, internal telemetry
Assessment & evaluation
- Labs and quizzes: 30–40%
- Midterm assignment/case study: 20–30%
- Capstone project (design, implementation, presentation, report): 30–40%
Learning outcomes & competencies
- Data pipeline skills: ingest, clean, label, and transform ICT telemetry
- Modeling skills: select and tune models appropriate to ICT tasks
- Deployment skills: containerize, serve, and monitor models in production
- Governance: implement logging, explainability, privacy-preserving methods
- Soft skills: translate ICT problems into ML tasks, present findings to managers.
Suggested readings & online resources
- Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow — Aurélien Géron
- Practical MLOps — Noah Gift, Alfredo Deza
- Relevant vendor documentation (AWS/GCP/Azure ML guides)
- Research papers and industry blogs (CAIDA, Cisco, Google SRE/ML posts)