Information Technology Courses

Help with Search courses
Course Image Advanced Database Systems

Upcoming - 

The topics covered during this course are advanced and include subjects as: requirements, design, complex transaction processing, advanced query processing and optimization strategies, parallel and distributed database systems, multidimensional data, data mapping and integration of big data, big data implications to database design, data security and privacy in the cloud and large databases.

The Advanced Database Systems course cultivates the knowledge and skills required to design and implement modern database systems and offers students an in-depth and critical understanding of commercial database development and management best practices. It also provides participants with the necessary knowledge to allow them to be able to compare and contrast the established relational database paradigm with emerging alternative approaches so they can make informed choices when considering database provision. Finally, it offers a deep and comprehensive understanding of advanced database technologies, including (but not limited to) advanced transaction management, emerging data models, advanced resiliency techniques and security protocols for securing data especially in the cloud.

Participants will be able to design, build and maintain databases using state-of-the-art database technologies, including NoSQL and NewSQL.

Course Image Social Computing

Upcoming - 

Social computing and its underlying technologies enhance the Web, empowering the end user with the capability to have his or her voice heard. Nevertheless, the benefits are not strictly limited to that of the Internet participant. Many of the social computing technologies that exist today are imperative features to the livelihood of Web-based businesses, generating user traffic and discovery of Web sites, improving sales and garnering partnerships. Additionally, the technology supports enterprise social computing. As you make your journey through this Course, you will explore all of these aspects of social computing plus many of its capabilities and rapidly evolving technologies. You begin by exploring the history of social computing. In fact, you will explore such Web 2.0 applications quite early in this Course, analysing their usage in modern Web sites. Furthermore, by viewing these applications in tandem with the original Web 1.0 version of the Internet, you will clearly see the extreme impact of social computing on today's Internet. The first of these ought to be the most familiar to you as well: blogs and wikis. A frequent topic in this Course is the importance of generating Web traffic on your Web site (attracting and keeping site visitors). You will explore the more popular way of doing so by syndicating feeds and/or podcasts. In the latter half of this Course, you will analyse the usage and value of sharing and tagging in social computing.

Having examined the tools, you will connect the tools with communities of common interest. These Internet communities (e.g. forums, social networks, etc.) are ideal Web locations for finding and discussing matters with like-minded individuals and perfect places for organisations to engage their target audience with posts regarding their Web site's content. In fact, you will evaluate the value of some of these communities yourself. These communities exist socially as s-commerce and within your own organisations as enterprise social computing.

As you reach the end of this Course, you will study some of the more advanced elements of social computing, such as cloud technology. Already, you might utilise clouds through services such as iTunes (to store music and apps remotely), but this Course will challenge you to analyse other cloud usages such as the provision of software, business infrastructures and even entire development platforms. You will also analyse some of the usages of analytics data and how that is applicable to any Web sites you create.


Course Image Security Risk Management

Upcoming -

 In this course, you will gain an advanced knowledge of multi-disciplinary risk management with focus in the context of information and cybersecurity principles, learn how to map an organization's business requirements to implemented information security controls, gain competences to translate risks and security challenges into new security and risk management practices, learn the elements of risk assessment and the data necessary for performing an effective risk assessment, learn how to develop strategies and processes for managing risks and to lead these processes, gain the ability to research, assess, and manage both security and risk in a corporate environment and to present the findings of such research in a clear, organized, and professional manner, experience a practical perspective of creating a security risk management plan in a cybersecurity context by undertaking a group project. 


Course Image Professional Issues in Computing

Upcoming - 

In this course, we will discover what it means to be an IT professional, what the responsibilities of IT professionals are, and what specific issues IT professionals face in their work, and finally how you can apply these concepts in your workplace.

We will explore a range of topics on legal, social, ethical and professional issues in computing. Throughout this course, we will use the term "computing profession and professionals" and "IT profession and professionals" interchangeably. The course will present many scenarios that help us understand the practical application of the concepts we discuss. 

Course Image Managing the Software Enterprise

Upcoming - 

Technological advancement generates multiple opportunities for businesses, such as globalization and utilizing workers in any locale. However, this same advancement, especially at the rapid pace with which it grows, means that Managing Technology Enterprise presents its own set of complex challenges, ranging from governance and compliance to outsourcing and business alignment. Over the course of this Course, you will be equipped with the tools to overcome such challenges, though, and leverage IT for the greater good of your organization. You will move on to explore the value of IT and many of its challenges related to supporting the strategic direction of the organization. Such understanding will also give you greater insight into the dynamic interrelationship between business and IT strategy. Moreover, with this foundation in place, you will be better able to evaluate several of the already noted challenges, as well as those that stem from implementing IT infrastructure.

Assessing challenges is only the first step; you will need to continue to use your skills to evaluate and develop strategies for implementing and delivering IT functionality in an organization. In order to support the organization IT efforts must be aligned with the business objectives. You will study the technology roadmap as a tool for aligning IT and business strategies by exploring various types of roadmaps and the process for creating a roadmap.

You will not only be challenged to decide where and when to implement IT strategies, but also align those strategies—along with everyday decisions—with organizational needs and goals.  In fact, the ability to meet those goals efficiently through IT is a linchpin in IT management and is known as IT governance. IT governance is so critical that you will spend a Week covering this topic.

In order to align IT with business strategies and efficiently govern IT efforts, IT acquisitions must be carefully planned. This includes the ability to accurately analyze and define the software requirements of an organization as well as evaluate options for acquisition. There are several options that go beyond a simple purchase of software. Many organizations use third-party offerings such as software as a service (SaaS), where they gain access to software via an ‘on-demand’ methodology. Other organizations opt to build their own software. Whatever the case, this ‘build versus buy’ dilemma is commonplace in IT management.

What has been noted thus far are only some of the common challenges you will see (both in this Course and in your own organization). Other examples include, but are not limited to, IT security and compliance, managing change and risks and understanding and managing perceptions of IT. The object of such challenges is to prepare you for times when similar scenarios inevitably arise and to equip you to handle new IT management challenges.

Many of these challenges stem from the development and adoption of new technology, and as stated earlier, technology is continually evolving. In your final day, you will explore emerging technologies and review both the risks and ethical issues that arise from this rapid advancement. Risks though there may be, it is through risk that you can also find new opportunities. By the end of this Course, you will have the skills to manage and leverage both risk and opportunity.


Course Image Designing and Managing Databases

Upcoming- 

With database technology developing rapidly, it is important to learn the basics of the ways in which data is stored, manipulated, queried (with an emphasis on relational databases) and backed up. While studying this module, you will also become acquainted with various paradigms and technologies (parallel as well as distributed) related to database design, implementation and maintenance.

You will establish your foundation in designing and managing databases by analyzing the basic features or functions of databases, as well as redundancies in data structures with a goal of redesigning data structures to reduce redundancies. With this underpinning in place, you will be equipped to move on to more specific database topics, beginning with database integrity and the relationships between tables using primary and foreign keys.

Perhaps one of the most important aspects of your study in this course, however, is  one of the most widely used database languages, SQL (a term you may recognize as ‘MYSQL’). You will design and implement SQL code to perform relational database functions. The execution of this code will continue in subsequent weeks too as you further improve your SQL code in order to design and implement database joins, operations, queries, subqueries and views. As you progress, the expectations of your SQL work will become more complex and challenging. You will study more advanced database concepts. This includes, but is not limited to, transactions, implementing grant and revoke statements in SQL, client/server architectures for databases and embedded SQL. You will finalise your studies with the covering of data warehouses designs and properties–a technology that supports decision-making, business modelling and operations research.

You will complete a series of exercises.


Course Image Programming the Internet

Upcoming-

This course covers some of the Web programming languages, standards and concepts only touched upon in other modules. These include, but are not limited to, HTML5, CSS (Cascading Style Sheets), JavaScript and PHP.  Using tools such as these, you will be frequently challenged to develop functional Web applications. Some applications will only consist of a few lines of code that display a sentence on screen; others will be full Web pages with database support. The largest programming challenge you will have, however, is a complete Web site that contains HTML, JavaScript and PHP. There will be a group project .