This course focuses on the principles and techniques used in the design of networks and development of networked and distributed software. Topics include programming with sockets, remote procedure calls (RPC), interprocess communication (IPC), and commonly used network protocols including TCP/IP, UDP, FTP, and HTTP. In addition, data encoding, encryption, and compression algorithms are presented. This is a project-oriented course in which students are required to develop software in the Unix programming environment, for example a web server. Design and diagnosis of networks will also be covered. Systems Administration will also be discussed, especially with respect to Network Management, however, homework and programming assignments will be more focused on Network programming.
- Computing Fundamentals: Hardware and Software
- Operating Systems: Windows, Linux, and Cisco OS’s
- Storage Technologies
- Database Administration
- Networking (with implementations in Windows, Linux, and Cisco OS's)
- Application Services including: Authentication, File, Messaging, Name, VOIP, and Web
- Business and Communication Skills for IT professionals
- Virtualization and Multitenant Computing (with implementations in VMware, Windows, and Linux)
- Automation, Provisioning, and Configuration Management
- Security Fundamentals (in multiple vendor / open source environments)
Information Technology Ethics
- Introduction to ICT ethics.
- Introduction to critical thinking techniques.
- Professionalism and professional ethics.
- Ethical theories and analysis.
- Security and crime in cyberspace.
- Intellectual property.
- Freedom of speech and Internet content regulation.
- Emerging technologies and ethics.
- ICT and Society.
Network and Security Administration
- Introduction to server administration
- Automating system tasks
- Data organisation
- Data Integrity
- Network administration
- Network services
- UNIX security
- Performance analysis
- Security management, policy and politics
- Web technologies.
- Network models.
- Data communication models.
- Internet of Everything (IoE).
- Pillars of IoE.
- Web page design using XHTML and CSS.
- Internet infrastructure.
- Next Generation IP.
- Application Layer Paradigms (client-server paradigm).
- Peer-to-Peer Paradigm.
- Fundamentals of Cloud Computing.
- Cloud Architectures.
- Cloud Delivery Models.
- Cloud Risk Management.
- Cloud Security.
- Planning a migration to the Cloud.
- Cloud Governance and Management.
- Managing the Cloud Infrastructure.
- Identify the various digital threats to which networked computing devices are prone, as well as propose and evaluate solutions to these threats;
- Analyse cryptographic algorithms, both symmetrical and asymmetrical, and explain how these are used to improve network security;
- Compare and contrast the features of Kerberos and design an authentication protocol using Kerberos;
- Explain the operation of a Key Distribution Centre (KDC) and effectively communicate and justify why a Public Key Infrastructure (PKI) is an important component in a network security architecture;
- Investigate and critique the current and emerging trends in cryptography and network security.
IT Risk Management
- Information security basics.
- Fundamental security rules.
- Security decision making.
- Practising security.
- Foundations of risk management.
- Quantitative risk assessment.
- Qualitative risk assessment.
- Risk mitigation.
- Risk transference.
- Business continuity planning.
- 2721 Views
- 8 Weeks Online
- 1-2 Weeks Classes