Certificate In Information Technology

Advance your career in the information technology industry. Start an IT business or improve job opportunities.

Course CodeVIT003
Fee CodeCT
Duration (approx)600 hours

It's Easy to Enrol

Select a Learning Method

I am studying from...

Enable Javascript to automatically update prices.

All prices in Australian Dollars.

Click on Enrol Now to See Our Payment Plans Available. No Obligation.

Courses can be started at any time from anywhere in the world!
A sound introduction to using computers
A broad foundation course for anyone seeking entry into a career with computers. It is also a good course for people looking to complement their existing careers with IT knowledge.
No previous IT experience is required to undertake this course.


Core ModulesThese modules provide foundation knowledge for the Certificate In Information Technology.
 Computer Operations VIT101
 E Commerce BIT100
 Html (Writing a Website) VIT102
 Computer Servicing I VIT203
Elective ModulesIn addition to the core modules, students study any 2 of the following 10 modules.
 Flash CS BIT102
 Visual Basic.Net BIT101
 C# Programming BIT211
 Computer Servicing II VIT204
 Computer Servicing III VIT205
 Information Security BIT203
 Internet Marketing BIT204
 Photoshop CS - Beginner To Medium Level VIT202
 SQL For The Web BIT201

Note that each module in the Certificate In Information Technology is a short course in its own right, and may be studied separately.



When we think about ethics, we think about having an understanding of what is right and wrong – that is a ‘society’ accepted proper course of action in a given situation. Ethics and ethical standards can be applied to any situation. 

Ethics in business are specifically about developing business or company values. The ethics of any business are a guide to what is appropriate and what is not within the scope of that particular business. Ethics of IT professionals are extremely important for a number of factors, mostly because of the nature of data and information which can be accessed. The next part of this lesson is an outline of ethics which are relevant to IT professionals.

Ethical issues facing IT professionals
There are many ethical issues facing IT professionals nowadays, most of them involve data privacy and data security, but others are ownership, control and accuracy.

Some examples include:

  • Given that network and system administrators in most organisations would generally have access to the e-mails of all the employees, is it okay for them to read some of those emails, just because they can? Would it be okay to read those emails as a security measure, to make sure that employees are not disclosing confidential and private company information to unauthorised people?
  • If the system administrators read emails from the employees working in their company, should they disclose this policy to them or not? If they should, is it better to do it before or after they’ve read their private emails?
  • Are system administrators allowed to monitor and keep a log of the websites visited by the employees?
  • Some network and system administrators might decide to install key logger and screen capture software on all or selected computers on the network to capture and save all what the employees type and view. Is it ethical to do so? Should they notify the users that they are being watched?
  • Is it okay for system administrators to access documents, files and personal photos of other employees when they are stored on their work computers or on the file servers?

Legal issues facing IT professionals

There are multiple threats to information systems. The most important ones are listed below:

  • Collecting and using information in an illegal way,
  • Developing and distributing software which can break information systems,
  • Having information leaks in visual channels, electric channels, radio channels, and other technical channels,
  • Damaging or stealing computer systems or other IT equipment,
  • Intercepting data in computer networks and lines of communication,
  • Accessing database information by unauthorised personnel,
  • Distributing data in such a way as to cause an infringement of the legal restrictions set for information distribution.

The necessity to have adequate information legislation in place is crucial to the successful application of information technology in organisations and businesses. Although current laws are not able to cover all the problems related to information technology, successful information legislation should be developed in order to address and regulate the legal relationship of information collection, processing, saving and usage, therefore it is vital for governments and legal agencies to realise efficient measures which ensure information security maintenance.

There are many components involved in developing complete information security for information systems. The most important component in information security is the protection of information captured, stored and flowing in computer systems and computer networks. As a result, criminal laws and legislative laws should be able to endorse the protection of information on computer systems and networks, and these laws must be subject to constant reviews and improvements. Such reviews and improvements are required because of the ever-changing nature of information systems and information security and the emergence of more sophisticated types of attacks.

Information security is not only limited to taking measures to protect information; it also includes a wide range of actions (technical actions, organisational actions, etc.) such as:

  • establishing and improving the information system,
  • developing, using and improving the means for a better information security,
  • efficiently monitoring information security and reporting any infringements,
  • developing protected and secure telecommunication systems,
  • standardising the means for information security and data protection.
With sufficient financing and adequate legislative actions and laws, it is possible to achieve higher information security. High level security can also be achieved by fulfilling complex actions deemed necessary by stakeholders.


Need assistance?

Start Now!


Dr. Sherif Sakr

Research Scientist and University Lecturer in Computer Science and Engineering. Sherif has a PhD in Computer Science, MSc, BSc.
Josiane Joubran

CSC consultant with IBM, Software QA Engineer, Course Writer and Tutor. Josiane is an I.T professional with extensive experience with computer hardware and engineering in Lebanon and Australia. Josiane has a B.Eng., Grad.Dip.I.T., Master Info.Tech., MCP,
Sarah Jury

Over 15 years working in small business, I.T., education and science. Sarah has a PGCE(Post Compulsory Education), BSc(Hons) (Genetics), DipComp(Open), CertWebApps(Open). She has designed and created several Web sites for different organisations.
Getting Work in a Modern World
A realistic guide to getting a job or starting out in business. This is a must read; for students, parents, the unemployed, careers advisors or anyone interested in changing or forging a sustainable career.
Photographic Techniques
Explore how to take better photos. This is a book packed full of practical tips, from the authors own experience, coupled with a solid introduction to well established and widely practiced photographic techniques. This is a well illustrated, excellent ref
Professional Practice for Consultants
Explore becoming a consultant. This ebook contains chapters on how to be a consultant, packaging your services, delivering the services, building your resources, finding the work and getting the job, planning and ethics.
Project Management
This ebook is designed to help improve your capacity to manage any type of project in any type of industry. It may be read as a stand- alone book; used as something to refer to during the process of managing projects, or used as a complementary reference