Associate Diploma In Information Technology Management


Course CodeVIT006
Fee CodeAS
Duration (approx)1500 hours
QualificationAssociate Diploma
  
HOME STUDY - IT DIPLOMA
 
IT Management Diploma, home study, online.
Gain IT and Management skills in one course.
 
Develops a balance of skills in both Information Technology and management to produce a graduate with the foundation training to manage an IT business or department. This course does not require any previous IT experience though experience in using a personal computer will be useful.
  • This course combines an education in broad I.T. skills, with business and management 
  • Self paced, 1500 hour professional training, supported by a team of tutors from around the world
  • A very practical course, where every student is treated aqs an individual; and helped to develop skills that will set them apart and improve their employability anywhere in the world.

 

Accreditation: This course is internationally accredited through I.A.R.C

 

n: center; font: bold 11px/20px 'Helvetica Neue',Helvetica,sans-serif; background: #bd081c url('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') no-repeat scroll 3px 50% / 14px 14px; position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer; border: medium none; color: #ffffff;">Save n: center; font: bold 11px/20px 'Helvetica Neue',Helvetica,sans-serif; color: #ffffff; background: #bd081c url('lkdGg9IjMwcHgiIHZpZXdCb3g9Ii0xIC0xIDMxIDMxIj48Zz48cGF0aCBkPSJNMjkuNDQ5LDE0LjY2MiBDMjkuNDQ5LDIyLjcyMiAyMi44NjgsMjkuMjU2IDE0Ljc1LDI5LjI1NiBDNi42MzIsMjkuMjU2IDAuMDUxLDIyLjcyMiAwLjA1MSwxNC42NjIgQzAuMDUxLDYuNjAxIDYuNjMyLDAuMDY3IDE0Ljc1LDAuMDY3IEMyMi44NjgsMC4wNjcgMjkuNDQ5LDYuNjAxIDI5LjQ0OSwxNC42NjIiIGZpbGw9IiNmZmYiIHN0cm9rZT0iI2ZmZiIgc3Ryb2tlLXdpZHRoPSIxIj48L3BhdGg+PHBhdGggZD0iTTE0LjczMywxLjY4NiBDNy41MTYsMS42ODYgMS42NjUsNy40OTUgMS42NjUsMTQuNjYyIEMxLjY2NSwyMC4xNTkgNS4xMDksMjQuODU0IDkuOTcsMjYuNzQ0IEM5Ljg1NiwyNS43MTggOS43NTMsMjQuMTQzIDEwLjAxNiwyMy4wMjIgQzEwLjI1MywyMi4wMSAxMS41NDgsMTYuNTcyIDExLjU0OCwxNi41NzIgQzExLjU0OCwxNi41NzIgMTEuMTU3LDE1Ljc5NSAxMS4xNTcsMTQuNjQ2IEMxMS4xNTcsMTIuODQyIDEyLjIxMSwxMS40OTUgMTMuNTIyLDExLjQ5NSBDMTQuNjM3LDExLjQ5NSAxNS4xNzUsMTIuMzI2IDE1LjE3NSwxMy4zMjMgQzE1LjE3NSwxNC40MzYgMTQuNDYyLDE2LjEgMTQuMDkzLDE3LjY0MyBDMTMuNzg1LDE4LjkzNSAxNC43NDUsMTkuOTg4IDE2LjAyOCwxOS45ODggQzE4LjM1MSwxOS45ODggMjAuMTM2LDE3LjU1NiAyMC4xMzYsMTQuMDQ2IEMyMC4xMzYsMTAuOTM5IDE3Ljg4OCw4Ljc2NyAxNC42NzgsOC43NjcgQzEwLjk1OSw4Ljc2NyA4Ljc3NywxMS41MzYgOC43NzcsMTQuMzk4IEM4Ljc3NywxNS41MTMgOS4yMSwxNi43MDkgOS43NDksMTcuMzU5IEM5Ljg1NiwxNy40ODggOS44NzIsMTcuNiA5Ljg0LDE3LjczMSBDOS43NDEsMTguMTQxIDkuNTIsMTkuMDIzIDkuNDc3LDE5LjIwMyBDOS40MiwxOS40NCA5LjI4OCwxOS40OTEgOS4wNCwxOS4zNzYgQzcuNDA4LDE4LjYyMiA2LjM4NywxNi4yNTIgNi4zODcsMTQuMzQ5IEM2LjM4NywxMC4yNTYgOS4zODMsNi40OTcgMTUuMDIyLDYuNDk3IEMxOS41NTUsNi40OTcgMjMuMDc4LDkuNzA1IDIzLjA3OCwxMy45OTEgQzIzLjA3OCwxOC40NjMgMjAuMjM5LDIyLjA2MiAxNi4yOTcsMjIuMDYyIEMxNC45NzMsMjIuMDYyIDEzLjcyOCwyMS4zNzkgMTMuMzAyLDIwLjU3MiBDMTMuMzAyLDIwLjU3MiAxMi42NDcsMjMuMDUgMTIuNDg4LDIzLjY1NyBDMTIuMTkzLDI0Ljc4NCAxMS4zOTYsMjYuMTk2IDEwLjg2MywyNy4wNTggQzEyLjA4NiwyNy40MzQgMTMuMzg2LDI3LjYzNyAxNC43MzMsMjcuNjM3IEMyMS45NSwyNy42MzcgMjcuODAxLDIxLjgyOCAyNy44MDEsMTQuNjYyIEMyNy44MDEsNy40OTUgMjEuOTUsMS42ODYgMTQuNzMzLDEuNjg2IiBmaWxsPSIjYmQwODFjIj48L3BhdGg+PC9nPjwvc3ZnPg==') no-repeat scroll 3px 50% / 14px 14px; position: absolute; opacity: 1; z-index: 8675309; display: none; cursor: pointer; border: medium none;">Save

Modules

Core ModulesThese modules provide foundation knowledge for the Associate Diploma In Information Technology Management.
 Industry Project BIP000
 Business Studies BBS101
 E Commerce BIT100
 Html (Writing a Website) VIT102
 Networking Foundations BIT103
 Research Project I BGN102
 Visual Basic.Net BIT101
 ASP.NET BIT200
 Computer Servicing I VIT203
 Information Security BIT203
 Javascript BIT202
 SQL For The Web BIT201
 
Elective ModulesIn addition to the core modules, students study any 3 of the following 12 modules.
 Flash CS BIT102
 Marketing Foundations VBS109
 Publishing I BWR107
 Advertising and Promotions BBS202
 Computer Servicing II VIT204
 Entrepreneurship BBS204
 Ethics BPS217
 Graphic Design BIT205
 Internet Marketing BIT204
 Photoshop CS - Beginner To Medium Level VIT202
 Project Management BBS201
 Business Planning BBS302
 

Note that each module in the Associate Diploma In Information Technology Management is a short course in its own right, and may be studied separately.


COURSE CONTENT

The lessons in some of the modules are as outlined briefly below:

Writing a Web Site (HTML)

  1. Introduction to the Internet and HTML
  2. The most important HTML Tags
  3. Simplification through HTML Construction Software
  4. Creating Links
  5. Loading a Site onto the Internet
  6. Adding Graphics
  7. Designing a Web Site that Works
  8. Advanced Features
  • Visual Basic .Net Programming

    1. Introduction To Visual Basic
    2. Code Theory (Part 1)
    3. Code Theory (Part 2)
    4. Objects (Part 1)
    5. Objects (Part 2)
    6. Application Design

     

    ASP.Net

    1. Introduction
    2. VB.NET Essentials
    3. Web Forms
    4. Web Server Controls
    5. Form Validation
    6. Classes and Namespaces
    7. ASP.NET Applications
    8. Interacting with Databases
    9. Error Handling
    10. Email from Your Applications
    11. Project: Creating an Online Store

    E Commerce

    1. Introduction – what is e-commerce (more than the internet)
    2. Success and failure – what makes the difference
    3. Promotional strategies – are different on the internet
    4. Optimizing web site potential
    5. Increasing web site exposure
    6. Automating supply of goods, services and cash flow
    7. Managing constant change
    8. Dealing with e-commerce problems

     

    SQL

    1. Introduction to Databases
    2. Fundamentals of SQL
    3. Building a database with SQL
    4. Storing & Retrieving Data
    5. Advanced SQL database access methods
    6. Database Security
    7. Using SQL in applications
    8. Cursors
    9. Stored procedures
    10. Error Handling
    11. Dynamic SQL
    12. Advice & Tips

    Javascript

    1. Introduction
    2. JavascriptEssentials I
    3. Javascript Essentials 2
    4. Functions
    5. Events and Event handling
    6. Advanced Javascript
    7. Dynamic HTML
    8. Writing Simple Web Applications
    9. Pop Ups and Navigation Menus.
    10. Javascript Applications

     Photoshop

    1. Learning the menus
    2. Working with digital image files
    3. Understanding the Tool Palette
    4. Using Layers, Actions and History
    5. Digital painting, shapes and colours
    6. Selecting, Resizing, Transforming and Masking
    7. Adjustments and modifications
    8. Adding Filters and Styles 
    9. Preparing files for print and web

    Publishing I

    1. Nature and Scope of the Publishing world
    2. Desktop Publishing A
    3. Desktop Publishing B
    4. Illustration: Graphics
    5. Illustration: Photography
    6. Research Skills : Market Research, researching an article, etc
    7. Marketing of Publications
    8. Ethics & the law in publishing
    9. Developing a publishing project

     

    Computer Servicing I

    1. The Computer Workshop.
    2. Computer and Workshop safety.
    3. Hardware Components.
    4. Different Systems & Basic Disassembly.
    5. System Assembly.
    6. Peripherals.
    7. Installation of software.
    8. Computer Maintenance.
    9. Troubleshooting.

    Computer Servicing II

    1. Introduction to hardware components
    2. Basic Diagnostic Equipment
    3. Electric Circuits and Components
    4. Problem Solving and Fault Analysis
    5. Diagnostic Testing [A] (Self Tests and Diagnostic Cards)
    6. Diagnostic Testing [B] (System Board and Memory Tests)
    7. Software maintenance and troubleshooting
    8. Disk drives and CD-ROM
    9. Video and Audio Systems
    10. Developing a Maintenance Program

    Business Studies

    1. Procedures for establishing a business
    2. Management procedures, including Quality Assurance
    3. Communication with suppliers and customers
    4. Problem solving techniques
    5. Staff management
    6. Financial management
    7. Developing production strategies
    8. Evaluating marketing performance

     

    Business Planning

    1. Introduction to business plans
    2. Focus and Direction – Developing a clear direction and developing mission and vision statements
    3. Developing strategies and objectives
    4. Planning for growth
    5. Risk management and contingencies
    6. Systems – quality management, innovation management, information technology and control processes.
    7. Marketing plans
    8. Operations plans
    9. Human resources plans
    10. Financial plans

     

    Project Management

    1. Introduction to Project Management
    2. Project Identification
    3. Project Planning
    4. Project Implementation
    5. Project Completion & Evaluation
    6. Improving Key Technical Skills
    7. Improving Key Leadership Skills
    8. Improving Key Interpersonal Skills

     

    Networking Foundations

    1. Networking Terms, Concepts and Standards
    2. Network Topology, Architecture and Transmission Media
    3. Network Components and Hardware
    4. Network Design and Planning
    5. Network Upgrading and Project Management
    6. Network Protection and Maintenance
    7. Understanding Network Connecting Options
    8. Installation and Configuration of Network
    9. Basic TCP/IP Services and Applications
    10. Troubleshooting Tools for TCP/IP Networks

    Marketing (Foundations)

    1. Marketing and the Business
    2. Scope of Marketing
    3. Target Marketing
    4. The Marketing Mix and Managing the Marketing Effort
    5. Product Presentation and Packaging
    6. Promotion
    7. Product Pricing and Distribution
    8. Customer Service
    9. Market Research
    10. Organisations - Structures and Roles

    Research Project I

    The Research Project involves some theoretical studies followed by designing, conducting and writing up research on a relevant topic. Selection of the topic, and progress in this project is monitored and guided by a tutor.

    Industry Meetings (100 hours)

    Industry Meetings involves attendance at committee meetings, seminars, conferences, exhibitions, trade shows, or any other events that are relevant. The student needs to submit documentary proof of attendance (eg. references, testimonials, receipts etc)

     

    Still Not Sure?

    Use our Careers and Course Counselling Service -Contact one of our experts who can tell you more about the industry and help you determine the best course click here

     
     
    Protecting Your Data
     
    Data integrity is a term used extensively nowadays in the field of information security, so it is important to understand what the term integrity really means in this context.
    Data integrity refers to data being unchanged when it is being created or stored on a disk or while being transmitted. To preserve data integrity, changes to data created, stored or transmitted should only occur when these changes are authorised. Data integrity is violated when stored data undergoes unauthorised changes whether these changes are caused by accident (such as bad disk sectors, hard disk crashes, transmission errors, noise in the transmission, etc.), by human error (from users, administrators, customers, etc.), or malicious intent.
    There are many computational techniques used for verifying data integrity, the most common ones used are check sums, comparisons, message authentication, message digests and other mathematical algorithms. Cyclic Redundancy Check (also known as CRC) is one of the most important check sum technique and is used to check for errors on computers’ hard drives.
    In order to preserve data integrity in information systems, it is important for any individual or business to understand and apply the protection, detection and correction models explained below.
    Protection
    Any business should be able to establish a set of standards and procedures in order to protect their information systems, and minimise the threats to data integrity. These threats include but are not limited to: human errors, hardware and equipment failure, computer viruses and worms, cybercrime and natural disasters (such as cyclones, earthquakes, tornadoes, floods, etc.)

    Detection
    It is also important to be able to detect any risks to data integrity before they start causing havoc and adversely affect the business.
    Correction
    Most businesses understand that data loss is never fully preventable, and regardless of how much they try to avoid it, data loss might still happen at some stage. This is why every business should have business continuity plans in place, and they should be able to implement them as soon as data loss occurs, in order to minimise business downtime. As its name implies, a business continuity plan aims at recovering crucial data and allowing a business to resume its normal operations as quickly as possible, by minimising business downtime and recovering crucial data.
    To apply the protection, detection and correction models, individuals and organisations can follow a few primary ways to fully realise data integrity such as redundancy, frequent backups, offsite storage, disaster recovery planning, installing antivirus software, installing hardware and/or software based firewalls, using UPS (Uninterrupted Power Supply) devices, etc.
     
    Full backup
    A full backup is done when a copy of all the data is stored on the required media device (i.e. tape or disk). There are advantages and disadvantages for this type of backup. The main advantage is that a full backup allows you to store a complete copy of all the data on the system, although this would prove to be time consuming, resource consuming, and requires a lot of disk space for storing the backup copy.
    When a person or a business performs full backup copies on their data every couple of days, weeks or months, some part of this data might be unchanged whereas other parts of the data might have changed. Therefore, performing regular backups on data that has not changed is considered as senseless work because the same data will be present on multiple backups. For this reason, a full backup should be used only when a complete disk image backup is required. In other cases, systems administrators should consider other types of backups such as incremental, differential or mirror, or a combination of a few backup options. These will be explained in the sections below.
    Incremental backup
    An incremental backup is a backup type that saves a copy of the files that have been created or modified since the last backup was run. An incremental backup is generally scheduled to run at regular intervals of time, after a full backup is taken of the data. As soon as some files get created or modified, the incremental backup will process those files and take a copy of them. Incremental backups rely on an index file in order to find out which files have been created or modified on the drive or drives being backed up.
    Differential backup
    A differential backup is somehow similar to an incremental backup but the main difference is that it does not update the index file when each task is executed which means that every task execution will process any modifications to the data since the last full backup.
    The main advantage of a differential backup is its speed of data restoration, but on the downside this backup requires more disk space because every differential backup will be of the same size or larger than the previous one.
    Mirror backup
    A mirror backup is very similar to a full back up, but the main difference is that the backup files in a mirror backup cannot get compressed and cannot be password protected. The main purpose of a mirror backup is to create an exact copy of the source data so if the source data is lost, the mirrored backup data can be accessed using tools such as Windows Explorer.
    Onsite backup
    When data is backed up and saved locally using devices such as magnetic tapes, DVD drives, CD drives or other disk drives, the backup method is referred to as “onsite backup”. In order for a backup to be considered an onsite backup, the storage devices will need to be located in the same location as the place where the backup is being taken. With larger organisations, data is backed up using network attached storage (or NAS) drives. NAS drives are hardware devices that have special networking capabilities. Only medium to large businesses were able to afford NAS storage drives in the past, but these devices have since started to drastically drop in price and have since been used by home computer users and businesses alike.

    Offsite backup
    Unlike onsite backup, “offsite backup” refers to a data backup method whereby the data is backed up and stored in a remote location in order to provide an added layer of security for the data, in the event of a disaster.
  •  

    WHAT WILL THIS COURSE DO FOR YOU?

    THIS COURSE IS NOT A MAINSTREAM PROGRAM - But with many University IT graduates struggling in their careers; being different can be a big advantage!

    Change is rapid and unavoidable in the computer industry. 

    Often courses simply don't keep up to date; but if you learn the fundamentals across a wide enough swathe of the industry, from people who are not only teachers, but also practising programmers and technicians; you have the capacity to be part of the changes that are moving the IT industry forward.

    This course is designed and delivered to prepare our graduates for change. It is a substantial and broad based diploma. Graduates from our diplomas have been very successful in the past; and often that is because our courses are outside the mainstream of education.
    They are not the same as what you find elsewhere; but they are focused on what you need to develop an outstanding future in the industry.

     
    WHAT NEXT?
     
     
    ENROL (go to top) or
     
    Use our FREE Counselling Service to Connect with a Tutor
     

     



    Credentials

    This course is accredited by the International Accreditation and Recognition Council.
    This course is accredited by the International Accreditation and Recognition Council.

    ACS is an Organisational Member of the British Institute for Learning and Development
    ACS is an Organisational Member of the British Institute for Learning and Development

    Member of Study Gold Coast, Education Network
    Member of Study Gold Coast, Education Network

    ACS Global Partner - Affiliated with colleges in seven countries around the world.
    ACS Global Partner - Affiliated with colleges in seven countries around the world.



    Need assistance?



    Start Now!


          


    Dr. Sherif Sakr

    Research Scientist and University Lecturer in Computer Science and Engineering. Sherif has a PhD in Computer Science, MSc, BSc.
    Josiane Joubran

    CSC consultant with IBM, Software QA Engineer, Course Writer and Tutor. Josiane is an I.T professional with extensive experience with computer hardware and engineering in Lebanon and Australia. Josiane has a B.Eng., Grad.Dip.I.T., Master Info.Tech., MCP,
    Sarah Jury

    Over 15 years working in small business, I.T., education and science. Sarah has a PGCE(Post Compulsory Education), BSc(Hons) (Genetics), DipComp(Open), CertWebApps(Open). She has designed and created several Web sites for different organisations.
    Management
    Management is the process of planning, organising, leading, and controlling an organisation’s human and other resources to achieve business goals. More importantly though, effective management needs to be a process of human interaction and compassion. Mos
    Photographic Techniques
    Explore how to take better photos. This is a book packed full of practical tips, from the authors own experience, coupled with a solid introduction to well established and widely practiced photographic techniques. This is a well illustrated, excellent ref
    Professional Practice for Consultants
    Explore becoming a consultant. This ebook contains chapters on how to be a consultant, packaging your services, delivering the services, building your resources, finding the work and getting the job, planning and ethics.
    Project Management
    This ebook is designed to help improve your capacity to manage any type of project in any type of industry. It may be read as a stand- alone book; used as something to refer to during the process of managing projects, or used as a complementary reference