International Advanced Diploma in Computer Studies

The purpose of this unit is to equip you with knowledge and skills in the professional issues that impact on the deployment, maintenance and use of computer systems. The aims of the unit are to provide with:

  • a working knowledge of the social, ethical and legal issues applicable to the IT field;
  • the ability to construct, follow and adapt project plans for software development and maintenance
  • a working knowledge of software quality

This unit will provide you with the underlysing theory and practical skills required to secure networks and to send data safely and securely over network communications (including securing the most common internet services). This module provides a look at the technologies employed to secure a network. It is designed to provide you with knowledge of the fundamental principles and techniques employed in securing information and networks. The module will allow you to assess the security risks inherent in computer networks and the technologies that can be employed to counter such risks. It covers cryptographic algorithms from a mathematical point of view, including practical exaples of breaking codes

Once you have knowledge of the different types of algorithm, cryptographic protoclos are introduced for accomplishing a varied set of tasks, including authentication, secure message exchange, digital signature, etc. Other aspects of network security are then delt with, such as access control devices and firewalls, VPN, NAT, malware, vulnerability assessment, Intrusion Detection Systems (IDS)

This unit aims to equip you with a range of tools to analyse the function and requirements of information Systems, as well as giving you the skills to compare systems analysis models, and to examine them in their wider context of the internet and the social, economic and political climate of an organisation. Finally the skills needed to deliver outcomes are addressed

This module aims to build on existing knowledge of both databases and web design in order to build dynamic websites connected to databases using technologies susch as PHP and MySQL. The unit also covers XML-based web services (e.g RSS) in order to equip you with a range of skills to present content dynamically on the World Wide Web

This module builds on a basic understanding of database concepts to develop your skills in the design and development of database management systems, as well as investigating enterprise application of databases

The aim of this unit is to provide a student with the opportunity to employ the skills necessary to develope a comomputing artefact in the context of a loosely specified problem, which involves research, analysis, design, coding, testing and project management knowleghe and skills.

The aim of this unit is to develope knowledge, skills and experience in the use of object-oriented techniques for development
of software. The module aims to develope expertise in:

  • Object-oriented analysis
  • Object-oriented design
  • Object-oriented coding
  • Object-oriented systems

 

This module provides an introduction to the people, processes, practices and principles of agile development. It will prepare you for the future trends in software development and reinforce their understanding of the information systems development process

MODULE OVERVIEW AND OBJECTIVES

This unit will provide the learner with underlying theory and practical skills required to secure networks and to send data safely and securely over network communications (including securing the most common Internet services).

This module provides a look at the technologies employed to secure a network. It is designes to provide students with knowledge of the fundamental principles and techniques employed in securing information and networks. The module will allow students to assess the security risks inherent in computer networks and the technologies that can be employed to counter such risks. It covers cryptographic algorithms from a mathematical point of view, including practical examples of breaking codes.

Once the student have the knowledge of the different types of algorithm, cryptographic protocols are introduced for accomplishing a varied set of tasks, including authentication, secure message exchange, digital signatures, etc. Other aspects of network security are then dealt with, such as access control devices and firewalls, VPN, NAT, malware, vulnerability assessment, Intrusion Detection Systens (IDS), etc.

LEARNING OUTCOMES

  1. Understand the most common type of cryptographic algorithm
  2. Understand the Public-Key Infrastructure
  3. Understand security protocols for protecting data on networks
  4. Be able to digitally sign emails and files
  5. Understand vulnerability assessments and the weakness of using passwords for authentication
  6. Be able to perform simple vulnerablility assessments and password audits
  7. Be able to configure simple firewall architectures
  8. Understand Virtual Private Networks
  9. Be able to deploy wireless security

COURSE CONTENT

Topics:

  1. Cryptography Fundamentals
  2. Public-Key Infrastructure
  3. Web Security
  4. Email Security
  5. Data Protection
  6. Vulnerability Assessment
  7. Authentication
  8. Access Control
  9. Firewalls
  10. VPN
  11. Remote Access
  12. Wireless Security

 

MODULE OVERVIEW AND OBJECTIVES

The purpose of this unit is to equip the user with knowledge and skills in the professional issues that impact on the development, deployment, maintenance and use of computer systems. The aims of the unit are to give the learner:

  • a working knowledge of the social, ethical and legal issues applicable to the IT field;
  • the ability to construct, follow and adapt project plans for software development and maintenance;
  • a working knowledge of software quality.