NCC Level 5 Diploma in Computing (Cyber Security)
Course Overview
ယနေ့ခေတ်တွင် ကိုယ်ပိုင်သုံး Electronic ပစ္စည်းများမှစ၍ စီးပွားရေးလုပ်ငန်းသုံးပစ္စည်းများ၊ နိုင်ငံတော်အဆင့် အုပ်ချုပ်ရေးယန္တယားသုံးပစ္စည်းများအထိ Online ချိတ်ဆက်ပြီး လုပ်ကိုင်ဆောင်ရွက်နေကြရပါသည်။ Online ချိတ်ဆက်မှု များပြားလာသည်နှင့်အမျှ Cyber လုံခြုံရေး ဆောင်ရွက်မှုသည်လည်း အလွန်အရေးကြီးသော အခန်းကဏ္ဍမှ ပါဝင်လာပါသည်။ Cyber လုံခြုံရေး အရေးပါလာသည်အမျှ တကမ္ဘာလုံးတွင် Cyber Security Engineer ပညာရှင်လိုအပ်ချက် အလွန်မြင့်မားလာခဲ့သည်။
NCC Level5 Diploma in Computing (Cyber Security) ဒီပလိုမာသည် iNet College တွင် သင်ကြားပို့ချ၍ ကမ္ဘာ့အသိအမှတ်ပြု UK နိုင်ငံ ၏ ထင်ရှားသော ပုဂ္ဂလိကပညာရေးအဖွဲ့အစည်းကြီး တခု ဖြစ်သော NCC Education မှ စစ်ဆေးအကဲဖြတ်ပြီး ပေးအပ်သော ချီးမြှင့်သော Cyber Security အထူးပြု Level 5 Diploma သင်တန်းဖြစ်ပါသည်။
နိုင်ငံတကာအဆင့် ကွန်ပျုတာ Cyber Security Specialist တဦးအဖြစ်ရန် လိုအပ်သော Technical skill များ၊ Communication & Employability Soft Skill ဘာသာရပ်များ ပါဝင်သည်။
သင်တန်းကာလ (၂၀ လ) ခန့် ကြာမြင့်မည်ဖြစ်ပြီး သင်တန်းအောင်မြင်ပြီးပါက NCC Education, UK မှချီးမြှင့်သော Level 5 Diploma in Computing(Cyber Security) ကိုရရှိပါမည်။
ထို့နောက် BSc (Hons) Top-up Degree သင်တန်းကို (၁)နှစ် ဆက်လက်တက်ရောက်ပြီး University of Central Lancashire မှ ပေးအပ်သော BSc (Hons) Cyber Security and Networking Top-up Degree ရယူနိုင်ပါသည်။
At a Glance
အင်္ဂလန်ရှိ NCC Education, UK မှ ပေးအပ်သည့် Level 5 Diploma in Computing(Cyber Security) ကို (၂၀ လ) အတွင်းရရှိပါမည်။
နိုင်ငံတကာအဆင့် ကွန်ပျုတာ Cyber Security Specialist တဦးဖြစ်ရန် လိုအပ်သော Technical skill များ၊ Communication & Employability Soft Skill ဘာသာရပ်များ ပါဝင်သည်။
B.Sc. (Hons) Top-up Degree သင်တန်းကို (၁)နှစ် ဆက်လက်တက်ရောက်ပြီး University of Central Lancashire မှ ပေးအပ်သော B.Sc.(Hons) Cyber Security and Networking Top-up Degree ရယူနိုင်ပါသည်။
ဘာသာရပ် တခုချင်းအလိုက် စာတမ်းများပြုစုရပြီး ၊ သတ်မှတ်ချိန်အတွင်း အချိန်မီ တင်သွင်းနိုင်ရပါမည်။
ဤ ဒီပလိုမာသင်တန်း၏ အဓိကရည်ရွယ်ချက်မှာ အိုင်တီစနစ်များဖန်တီး၊ ထိန်းသိမ်း၊ စီမံခန့်ခွဲနိုင်သော ကျွမ်းကျင် ကွန်ပျူတာပညာရှင်များ လေ့ကျင့်သင်ကြားပေးရန် ဖြစ်ပါသည်။
Cyber Security Specialist တဦးအဖြစ် ပြည်တွင်း/ ပြည်ပမှာ အသက်မွေးမှုပြုနိုင်စေရန် ရည်ရွယ်ပါသည်။
Soft-skill များအပြင် လုပ်ငန်းခွင်များ၌ အသုံးတွင်ကျယ်သည့် AI, Web Design, Arduino Robotic, Application Development using Microsoft C# .NET, English စသည့် ဘာသာရပ်များကို extracurricular အဖြစ် သောကြာနေ့တိုင်း၌ (အခမဲ့) သင်ယူရပါမည်။
Program Details
About NCC Education
NCC Education Ltd. is a private provider and awarding body of English education. The company provides students with the opportunity to earn internationally recognized British qualifications by studying at one of its Accredited Partner Centres, either through the classroom or online.
Originally part of the National Computing Centre, NCC Education was initially established as an IT initiative by the British Government in 1966. NCC Education started offering IT qualifications in 1976 and from 1997 developed its Higher Education portfolio to include Business programs and a range of foundation programs. Since early 2002, NCC Education has offered Information Communication Technology (ICT) programs for schools.
Program Introduction
Teaching Method
ကွန်ပျူတာပညာရှင် တဦး အဓိကသိရှိရမည့် အခြေခံသီအိုရီများကို သေချာစွာ နားလည် သဘောပေါက် စေပြီး လက်တွေ့နယ်ပယ်တွင် အသုံးချလျက်ရှိသော နည်းပညာများနှင့် ချိတ်ဆက်သင်ကြားသည်။ အမှန်တကယ် Software များကို ရေးသားတတ်စေရန် နှင့် လက်တွေ့ Industry တွင် အမှန်တကယ် အသုံးချနိုင်စေရန် အတွက် သီအိုရီ နှင့် လက်တွေ့ကို ပေါင်းစပ်သင်ကြားသည့် စနစ်ကို အသုံးပြုသည်။
ကျောင်းသားများ အမှန်တကယ်နားလည်တတ်ကျွမ်းစေရန် အတန်းတွင်း Hands-On ပုံစံဖြင့် သင်ကြားသည်။ Coursework များ အားလုံးကို အတန်းတွင် Realtime Program များ ရေးသားစေခြင်း၊ တဦးချင်း (သို့) အဖွဲ့လိုက် Software Project များပြုလုပ်ခြင်း၊ Presentation များ ပြုလုပ်ခြင်း၊ အပြန်အလှန် ဆွေးနွေးခြင်း စသည့် ပုံစံ များဖြင့် သင်ကြားသည်။
ပညာရှင်တဦး အဖြစ်ရပ်တည်နိုင်စေရန် Soft Skill ဟု ခေါ်ဆိုကြသော ကွန်ပျူတာပညာရှင် တဦးလိုက်နာရမည့် ကျင့်ဝတ်များဖြစ်သည့် အများအတွက် စဥ်းစားတွေးခေါ်နိုင်မှု၊ သူတပါး နှင့် သူတပါးအကျိုးကို မထိခိုက်စေမှု၊ အများနှင့် ပေါင်းသင်း ဆက်ဆံ တတ်မှု၊ ညှိနှိုင်း လုပ်ဆောင်တတ်မှု ၊ အချိန်ကို မှန်ကန်စွာ စီမံခန့်ခွဲတတ်မှု၊ လူအများရှေ့တွင် ရဲရင့်စွာ ပြောဆိုတတ်မှု စသည်များကိုလည်း ဦးစားပေး ထည့်သွင်းသင်ကြားသည်။
Assessments
ဘာသာရပ် တခုချင်းအလိုက် စာတမ်းများပြုစုရပြီး သီအိုရီအချက်အလက်များကို မှန်ကန်စွာ အသုံးချပြနိုင်မှု၊ သီအိုရီပေါ်တွင် အခြေခံ၍ လက်တွေ့နယ်တွင် အသုံးချပုံကို ပြည့်စုံစွာ တင်ပြနိုင်မှု၊ အချက်အလက် လုံလောက်စွာ ကောက်ယူ တင်သွင်းနိုင်မှု၊ မိမိ၏ ကြိုးပမ်းမှုများကို သရုပ်ပြရှင်းလင်းနိုင်မှု၊ သတ်မှတ်ချိန်အတွင်း အချိန်မီ တင်သွင်းနိုင်မှု စသည်များ အပေါ်တွင် မူတည်၍ အမှတ်ပေး အကဲဖြတ်သည်။
အမှတ်ပေးအဆင့်သတ်မှတ်ချက်များ
- P – Pass
- M – Merit
- D – Distinction
Curriculum
ပထမနှစ်တွင် အောက်ပါ ဘာသာရပ်များ သင်ကြားရပါမည်။
Computer Systems
Code : L/601/0446Teaching Hours : 60Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Understand the function of computer systems
LO2: Be able to design computer systems
LO3: Be able to build and configure computer systems
LO4: Be able to undertake routine maintenance on computer systems
Subject Coverage
Introduction to the Module and Networks
* Introduction to Computer Systems
* Types of compute
- Personal, mini, mainframe, mobile
- Network, supercomputer, multiprocessor
* History of modern computers
- Show & tell of old and modern computer equipment
- Student research on generations of computer
Environments, Functions of components and Health & Safety
* Computing Environments
- Home, business, computer gaming, networking, real-time, communication
* Von Neumann architecture
- Example processors
- Fetch execute cycle
* Internet research – Different types of processor
- RISC vs CISC
- Single vs multi core
- Multiprocessor
- Distributed
* Health and safety practices; mains electricity, hot components, lifting and carrying, electrostatic precautions.
Computer Hardware
* Standard architecture
- CPU, main memory (RAM, ROM), Backing storage, I/O
* Current implementation of standard architecture
- CPU, motherboard, Power supply, cooling, backing store (hard disk, optical disks), memory types, interfaces (PCI,
AGP, PCI Express), NIC, graphics card, sound.
* Inside a PC
- Identify components and their functions
* Identify alternative components and packgaging
Peripherals and System Building
* Printers, & plotters, cameras & scanners; keyboard, mouse, touch screen/pad; monitors, display adapters; multimedia devices; storage media; networking; portable drives; plug and play components; performance factors
* Disassemble and assemble a computer system
- Install motherboard, processor, heat-sink and fan, memory, power supply unit
- Install hard disc drive, optical drive;
- Install specialised cards
- Install peripheral devices
Software, Installation and Configuration
* Systems software
- Operating Systems,
- Utility programmes,
- Library programmes,
- Translator programmes
* Applications software
- Standard packages
- Customised packages
- Special purpose software
- Bespoke software
* Install key software
- Windows Operating Systems
- Office package
- Free utility software
- Anti-virus and security software
Alternative Operating Systems
* Alternative operating systems
- UNIX/Linux, OS X, Android
- Linux installation
System Testing
* Test plan
* Test documentation
* Fault detection, diagnostics, troubleshooting
* Technical support
* Test hardware and software
* Repair
* Fault diagnosis exercises
Software Maintenance
* Software problems
* Automatic updates
* Upgrades
* Utility software
* Security software
* Scheduling maintenance
* Windows update exercise
* Package update exercise
* Driver update
Hardware Maintenance
* Preventative maintenance
* Upgrade v replace
* Hardware upgrade
- Priorities
- Internal components
- Peripherals
* Hardware upgrade exercises e.g.
- Memory update
- Graphics upgrade
- Hard disk upgrade
- Add second NIC
File Management
* File systems operation and organisation
- FAT, NTFS, ext
- Directories/folders
- Security, sharing and access rights
* Data Protection
- Backup
- File/folder organisation
* Windows file management exercises
Needs Analysis
* Client and system requirements
- Investigation/analytical techniques
- Problems/limitations with current/new system
- Functionality, costs, timescales, resources
* Case study
- Introduction
- Needs analysis exercise
Selection and Systems Specification
* Selection criteria
* System integration
* Accessibility
* Alternative solutions
- Identification, selection & justification
* Matching client requirements and system requirements with system components
* Systems options
- Off the shelf, self build, customise
- Alternatives
* System documentation
* Case study – Selection & specification
Computer Networks
Code : M/502/8332Teaching Hours : 60Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Understand network and communication protocols
LO2: Understand the principles of common network topologies and architectures
LO3: Understand the application of network security measures
LO4: Be able to select and configure the hardware components of a computer network to meet the requirements of a precise specification.
LO5: Be able to design and install network and server operating systems to meet the requirements of a precise specification.
LO6: Be able to install and configure internet telephony and communication systems
Subject Coverage
Introduction to the Module and Networks
* Introduction to module
* What is a network? Purpose, benefits, resource implications, communications (e.g. transmission mediums), working practice, commercial opportunity, information sharing, collaboration.
* Real world networks – Impact of networks on daily lives, the basic requirements of a reliable network and network trends.
* The OSI seven-layer model – overarching principles of the OSI seven-layer model
Network Protocols and Standards
* Communications and network protocols – Purpose of protocols; adherence, routed protocols IPv4 & IPv6, ICMP, FTP, HTTP, SMTP.
* Protocols and the OSI model
* Protocols in real world networks
* The Internet
Wireless Networking Standards
* Wireless devices – Establishing network connections including wired/wireless client configuration.
* Wireless networking standards – IEEE 802.11 Wireless Standards
* Issues for wireless networks
* Wireless networking protocols – Wireless Equivalent Protection (WEP) or WPA (Wi-Fi Protected Access)
Network Topology and Architecture
* Network topology concepts – Network representation: logical & physical
* Common network topologies and their application: Ethernet, Token Ring, Star, Ring, Bus.
* Topologies and protocols
Network Media and Connectors
* Network media – coaxial cable, twisted pair, wireless and fibre optic cable.
* Network connectors
* Selecting media and connectors
Network Hardware
* Network hardware – Servers; hub, routers; switches; firewall
* Hardware selection – network card, cabling; permissions; system bus; local-system architecture e.g. memory, processor, I/O devices
* Creating a network – supporting infrastructure needs and supporting connectivity requirements
Wireless Network Hardware
* Wireless network hardware – wireless devices; access point (wireless/wired), content filter, Load balancer, Modem, Packet shaper, VPN concentrator.
* Wireless hardware selection
* Creating a wireless network
Security Software
* Network security threats – unauthorised use of a system; unauthorised removal or copying of data or code from a system; damage to or destruction of physical systems, data or code
* Security countermeasures – logs, traces, honeypots, data mining algorithms, vulnerability testing.
* Security software – Firewalls, Routers, Switches, Gateways
* Installing and configuring security software – Configure Network Security measures such as Firewalls, Routers, Switches, Gateways, SSL, IPSec, HTTPs, FTPs, passwords and backup
devices.
Firewalls
* Functions of a firewall – Packet level filtering, Circuit level filtering, Application level filtering,
* Types of firewall – Hardware and Software
* Installing and configuring a firewall
Network and Server Software
* Network software requirements – Client software, server software, client operating system, server operating system.
* Wireless network software requirements
* Configuring network software
Voice over IP and Video Conferencing
* Voice over IP (VoIP)
* Video conferencing
* Installing and configuring voice networks
* Installing and configuring video networks
Virtual Private Networks
* Virtual private networks (VPN) – Explaining Virtual Private Network (VPN) features and benefits and compare VPN types.
* Advantages and disadvantages of VPN
* Installing and configuring VPN
Skills for Computing
Code : F/502/8335Teaching Hours : 60Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Be able to use various skills to support the study of Computing
LO2: Be able to communicate in a technical environment
LO3: Be able to deploy thinking skills and problem-solving paradigms in both a business and learning context.
LO4: Be able to handle and present data
LO5: Understand the need for lifelong learning
Subject Coverage
Learning to Learn
* Learning Strategy (CREAM: Creative, Reflective, Effective, Active, Motivated).
* Personal Learning Plans – Own responsibilities, Setting and monitoring performance objectives.
* Learning Situations: What are Lectures, Seminars, Tutorials and Labs and how to work well in them.
* Continuing Professional Development (CPD) and Lifelong learning: applying your learning skills in other contexts
Reading, Listening and Note-taking
* Extracting information from written sources
* Taking notes from a speaker – Approaches to note taking
* Taking minutes in a meeting – Key listening tips
Writing
* Analysing the question – Key words that define the task and scope
* Planning and structuring – Essay planning, research, introduction, main body and conclusion. Drafting
* Referencing – Sources, citation, reference lists, bibliographies
Presentation Skills
* Soft skills e.g. personal effectiveness, working with others and social skills
* Presentation Skills: researching, preparing, presenting and delivering
Problem Solving
• Problem Solving tools and techniques
• Problem definition and analysis – Analyse a problem and propose solutions
• Success criteria and selecting a solution – Define the success criteria for solving a problem and evaluating solutions against success criteria
Creative Thinking
• Creative Thinking Techniques: Lateral Thinking, brain storming, mind maps, etc.
• Creative Thinking Models: Parallel Thinking (De Bono ‘Six Hats’), TASC (Thinking Actively in a Social Context)
Assignment Preparation
• Technical documentation; knowing your audience
• Proof-reading
• Exercises in writing and problem-solving based on topics 3-6, practising for assignment tasks
Data Acquisition
• Methods of obtaining data – Surveys, questionnaires, filtering data
• Types of data – Data sources; primary and secondary data, quantitative data, qualitative data, discrete data, continuous data
• Storing data – Data integrity, data representation, protecting data
Charts and Estimates
• Be able to use charts – Types of charts; pie, bar, scatter etc
• Understand what distributions represent – Binning, normal distribution, random variations, uniform distribution
• Be able to estimate values – Estimating the mean and median
Accuracy and Correlation; Presenting Results
• Use standard errors – statistical errors, random variations, user error and systematic errors
• Represent and analyse paired data
• Recognise and interpret correlation
• Analyse and present results correctly – Organising information, charts and plots
• Understand ways in which statistics are misused – Lack of references, absence of control sets and correlation misuse
• Learn to recognise mistakes in the way others present results
Regression Analysis
• Pearson correlation – Calculate and interpret Pearson’s correlation coefficient
• Basics of simple linear regression
• Spearman correlation – Calculate and interpret Spearman’s correlation coefficient
• Understand a straight line fit to bivariate data
Data Handling Revision and Exam Preparation
• Revision planning exercise
• Exercises based on sample exam questions
Designing and Developing a Website
Code : L/601/3315Teaching Hours : 90Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Design a website to address loosely-defined requirements
LO2: Use web development tools to build HTML and CSS – based websites to address welldefined specifications
LO3: Understand the technology and tools needed to use multimedia in the context of a website
LO4: Develop test strategies and apply these to a website
LO5: Understand the need for Web standards
LO6: Understand the concepts associated with using the Internet and the World Wide Web for business
Subject Coverage
Introduction to the Module
• The Internet, IoT, and the World Wide Web
• How the WWW works
• The W3C and the importance of web standards – Common web development technologies and frameworks.
• The challenges of web design – Browsers, screen resolution, accessibility, usability
Introduction to HTML-5
• Basic principles of mark-up: elements, tags and attributes
• Document structure: Document type declarations, the root element, the head and body sections
• Structuring text – Heading, paragraphs and lists
• Block level and inline elements
• Validating documents
Hyperlinks
• Using the anchor element
• Relative and absolute URLs
• In-page hyperlinks
• The HTML nav element
• Accessible hyperlinks
Introduction to Cascading Style Sheets (CSS)
• What is CSS, why do we need CSS?
• Applying CSS – Inline, embedded and external style sheets
• Overview of CSS selectors, properties and values
• Efficient CSS
• Validating CSS
• Developer tools – Useful HTML and CSS tools for Web Developers
Integrating Media
• Inserting images, Image file types, Image maps
• Audio and video file types
• The object tag
• HTML 5 video and audio tags
• Accessibility and media types
HTML Tables
• Basic structure of HTML tables – Captions groups of rows/columns
• Column and Row Spanning
• Tables as a page layout device
• CSS and tables
• Accessibility and tables
HTML Forms
• Basic structure of HTML Forms – Collecting user inputs and processing data
• HTML Form elements – Different types of Form Elements and their uses.
• Accessibility and HTML forms
• Controlling the layout of forms
• HTML 5 form elements
Page Layout with CSS
• The class and ID selectors – selecting HTML elements with a specific class attribute/element
• Floating and positioning – CSS properties for floating and positioning objects on webpages
• Fixed width and fluid page design
• HTML 5 section elements – nav, aside, article and section
• Page layout and mobile devices
Introduction to Web Design
• Understanding why an organisation needs a website – eBusiness models and eCommerce models
• The process of designing a website – Tools, techniques and software used to develop websites
• Involving users in the design process – How intuitive interfaces and actions, user-friendly designs, appropriate graphics, effective navigation and good quality content can help establish user trust and deliver an improved User Experience (UX).
• Defining content and functionality
Navigation and Interface Design
• Site structure
• Interface Design and Navigation – Using front-end technologies, presentation layers and client-side programming to build a User Interface (UI) and effect User Experience (UX).
Evaluation and Testing
• Validating documents
• Testing with a range of browsers – Establish a test plan and use it to assess the performance of a website
• Testing with users
• An iterative approach to development
Summary
• Summary and recap of previous units
• Hosting a website – Look at relationships between domain names, DNS services and communication protocols used to access a website.
• HTML 5, CSS 3 and the mobile web
Designing and Developing Object-Oriented Computer Programs
Code : T/601/3308Teaching Hours : 90Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Design object-oriented programmes to address loosely-defined problems
LO2: Implement object-oriented programmes from well-defined specifications
LO3: Develop object-oriented programs that reflect established programming and software engineering practice
LO4: Develop test strategies and apply these to object-oriented programmes
LO5: Develop design documentation for use in program maintenance and end-user documentation
Subject Coverage
An Introduction to the .NET framework
• Visual Studio IDE
• The Design of .NET programs
• Sequential Program Flow
Event Driven Programming
• Understand different types of event driven programmes
• Event Handling – Understand how events in C# work and make use of event handling to design responsive programs
• Prototypes – Explore formats, characteristics and appropriateness of prototyping
Programming Structures (1)
• Selections within .NET
• Branching Program Flow
Programming Structures (2)
• Repetition within .NET
• Iterative Program Flow
Object Orientation (1)
• Outline the object-orientated paradigm characteristics:
• Encapsulation
• Classes
• Objects
• Abstraction
Consolidation (1)
• Produce worked example of material to date
Data Structures
• Examine data structures and algorithms
• Arrays
• ArrayLists
• Dictionary
• Generics
Object Orientation (2)
• Object-orientated class relationships:
• Inheritance
• Further object-orientated paradigm characteristics:
• Polymorphism
• Introduction to UML – UML class design and suitable UML tools to develop class diagrams
• Coupling – Explaining the interdependency between methods and object classes
• Cohesion – Binding of the elements within one method and within one object class
Consolidation (2)
• Produce worked example of material to date
Testing and Error
Handling
• Test the system against user and system requirements
• Testing strategies to be used: test plans, test models e.g. white box, black box; testing documentation.
• Functional and system testing and testing the robustness of the system
• Regression testing
• Detection and correction of errors
• Exception handling
File IO
• File IO – The use of file input and output streams.
• Serialization – The process of converting an object into a stream of bytes to store the object.
Databases with .NET
• Connection to databases
• Data manipulation using appropriate query tools.
• Representing Data – Documentation can include diagrams showing movement of data through the system, and flowcharts describing how the system works. Documentation could also extend to user guides and any initial design and implementation plans.
Office Solutions Development
Code : R/601/1971Teaching Hours : 60Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Understand how application software can support business processes
LO2: Be able to design and implement office solutions
LO3: Be able to demonstrate that business processes have been enhanced/improved
Subject Coverage
Application Software and Business Processes
• An Introduction to the module
• Types of business processes and functions
• Application software defined
• Types and range of application software
• How application software supports business processes
• Research into examples of commercial software
• Evaluation of the role of applications software in specific business contexts
• Case studies
• Glossary
An Introduction to End User Software Development
• End-User defined
• Examine the need to address both user and business requirements
• Interface defined
• Identify Interface Design principles and good practice
• Microsoft Office interface development
• Case studies
• Glossary
An Introduction to the Advanced Features and Functions of the Microsoft Office Suite
• An introduction to the Microsoft Office suite
• An overview of advanced features and functions
• How the above improve business performance
• Consideration of both user and business requirements
• Application of interface design principles
• Glossary
Advanced Features and Functions of Microsoft Access, Excel and Word
• An overview of advanced features and functions in Access
• An overview of advanced features and functions in Excel
• An overview of advanced features and functions in Word
• Glossary
An Introduction to VBA and Macros
• Define what is meant by a macro
• Define what is meant by VBA
• Explain that there is a range of macros used for different purposes
• Describe the methods that can be used to develop macros
• Explain the issues of macros and security
• Use the Visual Basic Editor to create macros
• Use the Record Macro feature
• Save macros
• Edit macros
Using Macros in Microsoft Word
• Develop macros
• Edit macros
• Use the Macro Recorder
• Assign a macro to the keyboard
• Assign a macro to a button
• Format text or pictures using macros
• Customise headers and footers using macros
• Secure documents against malicious macros
Using Macros in Microsoft Access
• Create a macro in Microsoft Access
• Understand key macro terms
• Explain the sequence of macro production
• Create Autoexec macros
• Input data using a macro
• Validate data using a macro
• Filter and find records using a macro
• Print records using a macro
• Assign a macro to a command button
• Navigate between forms and records using a macro
• Run a query using a macro
• Secure documents against malicious macros
Using Macros in Microsoft Excel – 1
• Create a macro in Microsoft Excel
• Format titles, formulas and tables
• Input dates and times
• Input and select data using a macro
• Provide data validation using a macro
• Design message boxes and feedback
• Design interactive user forms
Using Macros in Microsoft Excel – 2
• Create a macro that uses absolute cell references
• Create a macro that uses relative cell references
• Create an icon to run a macro
• Print data using a macro
• Secure documents against malicious macros
Testing Software Development
• The need for testing
• Types of testing
• The Test Plan
• Determine expected test results
• Record actual test results to enable comparison with expected results
• Analyse actual test results against expected results to identify discrepancies
• Investigate test discrepancies to identify and rectify their causes
• Testing Checklist
• Glossary
Evaluating Software Development
• Types of evaluation
• Functionality evaluated
• Efficiency evaluated
• Reliability evaluated
• Usability evaluated
• Identify successful user interaction
• Identify enhancements
• Identify potential improvements
• Evaluation Checklist
• Glossary
Combining End User Software Development, Testing and Evaluation
• Topic Scenario
• Identify business processes
• Identify application software
• Identify good practice in software interface design
• Use advanced features and functions in Microsoft Excel and Word
• Use macros in Microsoft Excel and Word
• Produce a test plan
• Produce an evaluation checklist
Databases
Code : R/601/1971Teaching Hours : 60Global Examination (50%)
Delivery : Year #1Semester #1 Global Assignment (50%)
Learning Outcomes
LO1: Understand the concepts associated with database systems
LO2: Understand the concepts associated with the relational model
LO3: Understand how to design and develop a database system
LO4: Be able to develop a logical database design
LO5: Be able to develop a database system using SQL
Subject Coverage
Introduction to the Module and Database Fundamentals
• Introduction to the module
• What are databases? – The role of database systems e.g. as back-end systems, in e-commerce, for data mining applications etc.
• Examples of databases in use – Comparison of global companies and types of databases used.
• Data and information
Databases and Database Management Systems (DBMS)
• Components of a database system – Tables, data elements, data types, indexes, primary/foreign keys, entity relationship modelling, referential integrity, data normalisation to third normal form.
• Types of applications
• Database Management Systems – Types of database management systems (DBMS) and their operating system support, e.g. MySQL, Oracle.
• Available commercial implementations
• History of information management
• Pre-database information systems
• Advantages of database approach and DBMS
• Disadvantages of DBMS
• Relational model and alternatives
Entity Relationship (ER) Modelling (1)
• The goal of ER modelling
• Types of notation – Symbols and relationships within an ER Model
• Basic concepts – Entities, attributes and relationships
• Identifying entities
Entity Relationship (ER) Modelling (2)
• Constructing ER models – Logical design for relational databases
• Strong and weak entities
• Identifying problems in ER models – Connection traps, Fan traps and Chasm traps
• Problem solving in ER models
The Relational Model (1)
• Aims of the relational model
• Basic concept of the relational model – Relational data structures, including: relations, attributes, domain, tuple, cardinality.
• Terminology
The Relational Model (2)
• The purpose of relational integrity – Constraints: key, domain
• Basic purpose and concepts of normalisation – Normalisation in developing efficient data structures
SQL (1)
• The purpose and role of SQL – To extract, manipulate and modify data
• Basic concepts of SQL – Inserts, updates, amendments, deletions, data backup and recovery.
• Standards and flavours of SQL – Modelling languages: query language, data definition language (DDL), data, manipulative language (DML), relational languages.
SQL (2)
• Key constructs in SQL – Data manipulation using appropriate query tools, including complex queries to query across multiple tables, and using functions and formulae.
• Creating and Selecting statements
• Fixing mistakes – Making use of testing outcomes to improve and/or refine the solution.
Database Design
• Understanding requirements – Design for relational databases, tables, data elements, data types, keys and indexes, entity relationship modelling, data flow diagrams, flowcharts.
• Identifying a set of tables from an ER model
• The data dictionary
• Use of CASE tools
• Entities to tables
Supporting Transactions
• Identifying business rules – Consideration of interface links with other systems
• Checking a database will support the required transactions – System reports, transaction and concurrency in DBMS.
• Identifying possible performance issues
• Indexing and de-normalisation
Database
Implementation
• The implementation environment – Use of an appropriate database management system and Structured Query Language (SQL)
• Creating tables based on database dictionary – Creating, setting up and maintaining data tables
• Enforcing integrity and business rules via constraints – Domain constraint, tuple uniqueness constraint, key constraint, entity Integrity constraint, referential Integrity constraint.
• Creating indexes
• Insert, Update and Delete – Populating the Database
Summary
• Summary of module
• Identifying links with other modules/subject areas
• Clarification of module material and related issues as identified by students
Software Development Techniques
Code : A/502/8334Teaching Hours : 60Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Identify and explain the key stages of software development lifecycles
LO2: Express, design and evaluate algorithms
LO3: Identify and use programming language constructs
LO4: Identify and use common data structures
LO5: Explain and use common algorithms
LO6: Explain and use test strategies
LO7: Explain how software is modularised
Subject Coverage
Introduction to the Module and the Software Development Process
• Introduction to the unit
• Introduction to the software development process
• How computer programs are designed
• How they are written
• How they are tested
• The history of software development
• Software Development Lifecycle
• Project Life Cycle
• Waterfall
• Prototyping
• Agile
• User Stories
Desk-checking
• Pseudocode format – suitability of software behavioural design techniques
• Desk-checking – Process to find bugs and errors in code
• Commenting – Annotating source code
Data Representation
• Memory management in a computer system – Storage of data, scaling, size of data, memory requirements
• Data types – Whole numbers, string, real numbers, Boolean, character
• Variable declaration and manipulation
Iteration
• Discuss the computational term iteration – Understand that this is used to repeat blocks of an algorithm without having to repeat ourselves.
• Bounded Loops – When it is known how many times code is going to repeat – For Loops
• Unbounded Loops – When it is unknown how many times code is going to repeat – While Loops
• Mathematical algorithms
Selection
• If – Definition of the IF THEN structure
• Nesting – Powerful technique for creating complex algorithms, definition of loops within loops
• Else
• Switch
• Input validation – Truth tables to outline all the possible outcomes of compound conditionals
Functions
• Understand that functions exist independently of your main pseudocode program. They only get executed when they are invoked by your main program.
• Calling functions, desk checking function calls, benefits of functions
• Parameters – allow us to pass information or instructions into functions
• Return Types – Defining return types, Using return values
Testing and Debugging
• Formal testing – Functionality, no unexpected behaviour, required responses, anticipated data and error checking
• Test strategies – Black box testing and White box testing
• Unit testing – Testing functions in isolation
• Integration testing – Methods of testing the links between our main program and each of its functions
Arrays
• What are arrays: Understand that an array is a data structure consisting of a collection of elements (values or variables).
• Application of arrays – declaration of arrays, manipulation of arrays, passing an array to a function, returning an array
• Two dimensional arrays – Understand that these are grids of data, work on creating, setting and getting
Searching and Sorting
• Big O Notation – Measure of how an algorithm will scale.
• Linear search algorithms – Simplest of the searches, to search through every element in an array in order for a search term
• Binary search algorithms – To partition a search for increased efficiency. An array in ascending or descending order can be subjected to binary searches
• Bubble Sort Algorithm – A sort which works by repeatedly swapping adjacent elements until an array is orders.
• Quick Sort – More efficient form of sorting, splits arrays and sorts individually
• Recursion – A loop that is created by having a function call itself with a smaller set of data.
Objects
• Object design – Understand that Objects are a specific instantiation of a class, declaring and manipulating objects, object persistence, passing and returning objects
• Classes – Understand that classes are more powerful than arrays
• Modularity – Functions, objects and classes
• Methods – Understand that methods are functions within classes, calling methods, method overloading
• Constructors – Understand their use and capabilities; used to initialise a newly created object of the same type
• Accessor Functions – A function used to set or get a variable in a class.
Array Data Structures
• Lists – Understand that an array grows as needed
• Stacks – Understand that a stack is a last in, first out (LIFO) data structure
• Queues – Understand that queue is a first in, first out (FIFO) data structure
• Recursion – The recursion process on stacks, factorials
Summary and Conclusion
• Summary of module
• Contextualisation of concepts
• Clarifications
• Further reading
ဒုတိယနှစ်တွင် အောက်ပါ ဘာသာရပ်များ သင်ကြားရပါမည်။
Computer Forensics and Incident Investigation
Code : T/618/1451Teaching Hours : 80Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Understand the fundamental concept of computer forensics, incident response, and different types of cybercrimes
LO2: Recognise the roles and responsibilities of a forensic investigator
LO3: Know the various phases involved in the computer forensic investigation process and the importance of chain of custody
LO4: Analyse the physical and logical structure of a hard disk
LO5: Comprehend various types of file systems such as Windows, Linux, Mac OS and analyse various RAID storage systems.
LO6: Understand the importance of data acquisition and determine the best acquisition method and tools
LO7: Identify the goals, challenges and techniques of antiforensics
LO8: Understand how to collect and examine volatile and nonvolatile data in Windows and Linux machines
Subject Coverage
Computer Forensics in Today’s World – Part One
• Understanding Computer Forensics
• Types of Cybercrimes
• Challenges Cyber Crimes Present to Investigators
• Cyber Crime Investigation
• Rules of Forensics Investigation
• Understanding Digital Evidence
• Sources of Potential Evidence
Computer Forensics in Today’s World – Part Two
• Rules of Evidence
• Forensics Readiness
• Computer Forensics as Part of Incident Response Plan
• Need for Forensic Investigator
• Roles and Responsibilities of Forensics Investigator
• What makes a Good Computer Forensics Investigator?
• Legal and Privacy Issues
• Code of Ethics
• Accessing Computer Forensics Resources
Computer Forensics Investigation Process – Part One
• Importance of Computer Forensics Process
• Phases Involved in the Computer Forensics Investigation Process
• Pre-investigation Phase
• Investigation Phase
• Computer Forensics Investigation Methodology
Computer Forensics Investigation Process – Part Two
• Computer Forensics Investigation Methodology: Documentation and Reporting
• Computer Forensics Investigation Methodology: Testify as an Expert Witness
Understanding Hard Disks and File Systems – Part One
• Disk Drive Overview
• Disk Partitions
• Understanding File Systems
• RAID Storage System
Understanding Hard Disks and File Systems – Part Two
• File System Analysis
Data Acquisition and Duplication – Part One
• Understanding Data Acquisition
• Live Data Acquisition
• Static Data Acquisition
Data Acquisition and Duplication – Part Two
• Determine the Data Acquisition Format
• Validate Data Acquisitions
• Acquisition Best Practices
Defeating Antiforensics Techniques – Part One
• What is Anti-Forensics?
• Anti-Forensics Techniques
Defeating Antiforensics Techniques – Part Two
• Anti-Forensics Techniques
• Anti-Forensics Tools
Operating System Forensics – Part One
• Introduction to OS Forensics
• Windows Forensics
• Collecting Volatile Information
• Collecting Non-Volatile Information
• Analyse the Windows Thumb caches
• Windows Memory Analysis
• Windows Registry Analysis
• Cache, Cookie, and History Analysis
• Windows File Analysis
• Metadata Investigation
Operating System Forensics – Part Two
• Text Based Logs
• Other Audit Events
• Forensic Analysis of Event Logs
• Linux forensics
• Shell Commands
• Linux Log files
• Collecting Volatile Data
• Collecting Non-Volatile Data
• Mac Forensics
• Introduction to MAC Forensics
• MAC Forensics Data
• MAC Log Files
• MAC Forensics Tools
Ethical Hacking and Information Security Assessments
Code : A/618/1452Teaching Hours : 80Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Assess ethical and legal requirements of security assessment.
LO2: Understand different types of footprinting, tools and countermeasures
LO3: Understand different types of network scanning techniques and enumerations countermeasures.
LO4: Analyse different enumerations techniques and different vulnerabilities
LO5: Understand the system hacking methodology
LO6: Compare and contrast different types of malware
LO7: Assess various packet sniffing techniques
LO8: Assess various social engineering and Dos/DDoS attack techniques.
Subject Coverage
Introduction to Ethical Hacking
• Information security
• Hacking, Ethical Hacking concepts and penetration testing concepts
• Information Security Controls
Footprinting and Reconnaissance
• Footprinting Methodology
• Footprinting Tools
• Footprinting Countermeasures
• Footprinting Penetration Testing
Scanning Networks
• Network Scanning Concepts
• Network Scanning Techniques
• Network Scanning Pen Testing
• Network Scanning Beyond IDS and Firewall
Enumeration
• Enumeration Concepts
• Enumeration Countermeasures
• Enumeration Pen Testing
Vulnerability Analysis
• Vulnerability Assessment Concepts
• Assessment Solutions
• Scoring Systems
• Assessment Tools
• Assessment Rep
System Hacking – Part One
• System Hacking Concepts
• Cracking Passwords
• Escalating Privileges
System Hacking – Part Two
• Escalating Privileges
• Executing Applications
• Hiding Files
• Covering Tracks
• Penetration Testing
Malware Threats – Part One
• Malware Concepts
• Trojan
Malware Threats – Part Two
• Virus and Worm
• Malware Analysis
• Countermeasures
• Malware Penetration Testing
Packet Sniffing
• Packet Sniffing Concepts
• Packet Sniffing Techniques
Social Engineering
• Social Engineering Concepts
• Social Engineering Techniques
Denial-of-Service
• DoS/DDoS Concepts
• DoS/DDoS Attack Techniques
Network Security Threats and Defence Mechanisms
Code : F/618/1453Teaching Hours : 80Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Understand fundamental networking concepts, analyse protocols and implement established standards.
LO2: Be able to assess potential vulnerabilities and threats to a network’s infrastructure.
LO3: Understand the working of encryption, protocols and policies.
LO4: Identify and analyse the issues with physical security, operating systems and Network-based applications.
LO5: Understand the fundamental concept of a Firewall
LO6: Understand the role and workings of IDS/IPS in network defence.
LO7: Understand the purpose of Virtual Private Networks
Subject Coverage
Computer Network and Defence Fundamentals
• Comparing OSI and TCP/IP
• Types of Networks and Topologies
• Network Hardware Components
• TCP/IP Protocol Stack
• IP Addressing
• Understanding Computer Network Defence (CND)
• CND Process and Approaches
Network Security Threats, Vulnerabilities, and Attacks
• Network Security Concerns
• Types of Network Security Threats, Vulnerabilities and Attacks
Network Security Controls, Protocols, and Devices – Part One
• Fundamental Elements of Network Security
• Network Security Controls
Network Security Controls, Protocols, and Devices – Part Two
• Network Security Devices
• Network Security Protocols
Network Security Policy Design and Implementation
• What is a Security Policy?
• Workplace Plans and Policies
Physical Security
• Need for Physical Security
• Factors Affecting Physical Security
• Physical Security Controls
• Access Control Authentication Techniques and Other Measures
• Workplace and Personnel Security
• Laptop Security tool: EXO5
• Environmental Controls
• Physical Security: Awareness/Training and Checklists
Host Security – Part One
• Host and OS Security
• User and Password Management
• Patch Management
• Methods to Secure Host System (Windows)
• Install Antivirus Software
• Email Security
• Enabling Pop-Up Blocker
• Windows Log Review and Audit
• Configuring Host-Based IDS/IPS
• File System Security
• Creating and Securing a Windows File Share
• Data and File System Encryption
• Linux Security
• Understanding and Checking Linux File Permissions
• Host-Based Firewall Protection with IPtables
Host Security – Part Two
• Linux Log Review and Audit
• Hardening Servers
• Logs Review and Audit
• Data Security
• What is Data Loss Prevention?
• Virtualisation Terminologies
Secure Firewall Configuration and Management
• What Firewalls Do and How Do They Work
• Firewall rules
• Types of Firewalls
• Firewall Technologies and Topologies
• Build an Appropriate Firewall Ruleset
• Implement Firewall Policy
• Firewall Implementation, Deployment and Administration
• Firewall Logging
• Why Bypass Firewalls?
• Secure Firewall Implementation: Best Practices
• Firewall Implementation: Recommendations
• Firewall Tools
Secure IDS Configuration and Management – Part One
• Intrusion Detection and Prevention System (IDPS)
• Role of an IDS in Network Defence
• How does an IDS work?
• IDS Components
• Intrusion Detection Steps
• Types of IDS Implementation
• Staged IDS Deployment
• Types of IDS Alerts
Secure IDS Configuration and Management – Part Two
• Characteristics of a Good IDS
• IDS Mistakes to avoid
• Intrusion Prevention Systems (IPS) Technologies
• IPS Placement and Functions
• What does an IPS do?
• IDS vs IPS
• Types of an IPS
• IDPS product selection
• Complementing an IDS
• Vulnerability analysis or assessment systems
• File integrity checkers
• Honeypot and Padded-Cell System Tools
• IDS Evaluation: Snort
• IDS/IPS Solutions
Secure VPN Configuration and Management
• How does a VPN work?
• Why Establish a VPN?
• VPN Components
• VPN Concentrators and Functions
• Types of VPNs and Appropriate Selection
• VPN Core Functionalities
• VPN Technologies, Topologies, Concerns and Security
• Improving VPN Speed
• Quality of Service (QoS) in VPNs
• SLAs for a VPN
• VPN Service Providers
• Auditing and Testing the VPN
• Testing VPN File Transfer
• Best Security Practices for VPN Configuration
• Recommendations for VPN Connections
Information Systems Analysis
Y/503/4769Teaching Hours : 63 (incl. 3-hour exam)Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Understand soft and hard approaches to the analysis of information systems
LO2: Understand the techniques associated with requirements capture
LO3: Understand the different viewpoints associated with IS methodologies
LO4: Be able to apply various analytical techniques for understanding a complex organisational environment
LO5: Understand the relationship between the economic, social, political and technical factors influencing a business problem
LO6: Understand and apply the principles of interface design and the requirements and characteristics of users that motivate these
Subject Coverage
Introduction to Information Systems Analysis
• An introduction to the Unit
• Define and explain the term information system
• Identify types and examples of information systems
• Discuss Information systems analysis in the context of the SDLC
• Define and explain the abbreviation SDLC
• Define and explain analysis and requirements capture
• Discuss the role of analysis and requirements capture in specific contexts
• Define the term methodology
• Determine the requirement for different methodologies
• Present an overview of Information System Analysis and Design methodologies
• Research and discuss case studies
Hard Approaches to the Analysis of Information Systems
• Define and explain the term hard approach to systems analysis
• Identify examples of hard approach methodologies
• Identify business situations where a hard approach to systems analysis might be appropriate
• Define and explain the abbreviation SSADM
• Identify and discuss the advantages of SSADM
• Identify and discuss the disadvantages of SSADM
• Define and explain the abbreviation DFD
• Define and explain terminology associated with DFDs
• Illustrate the use of DFDs
• Construct DFDs
• Provide solutions to business problems using DFDs
Soft Approaches to the Analysis of Information Systems
• Define and explain the term soft approach to systems analysis
• Identify examples of soft approach methodologies
• Identify business situations where a soft approach to systems analysis might be appropriate
• Define and explain the abbreviation SSM
• Identify and discuss the advantages of SSM
• Identify and discuss the disadvantages of SSM
• Provide solutions to business problems using SSM
• Research and discuss case studies
Combined Soft/Hard Approaches to the Analysis of Information Systems
• Define and explain the term combined soft/hard approach to systems analysis
• Identify examples of combined soft/hard approach methodologies
• Identify business situations where a combined soft/hard approach to systems analysis might be appropriate
• Define and explain the term Multiview
• Identify and discuss the advantages of Multiview
• Identify and discuss the disadvantages of Multiview
• Provide solutions to business problems using Multiview
• Research and discuss case studies
• Compare and contrast soft, hard and combined approaches to systems analysis
Techniques Associated with Requirements Capture
• Define and explain the term stakeholder
• Identify and discuss types of stakeholder analysis techniques
• Define and illustrate the Stakeholder Analysis Matrix
• Define and explain the abbreviation CATWOE
• Identify and discuss the advantages of CATWOE
• Identify and discuss the disadvantages of CATWOE
• Provide solutions to business problems using CATWOE
• Evaluate CATWOE
OrganisationOriented and PeopleOriented IS Methodologies
• Define and explain the term organisation-oriented IS methodology
• Identify the types of organisation-oriented IS methodologies
• Identify and discuss the advantages of organisation-oriented methodologies
• Identify and discuss the disadvantages of organisationoriented methodologies
• Evaluate and discuss an organisation-oriented methodology in the context of a business scenario
• Define and explain the term people-oriented IS methodology
• Identify the types of people-oriented IS methodologies
• Identify and discuss the advantages of people-oriented methodologies
• Identify and discuss the disadvantages of people-oriented methodologies
• Define and explain the abbreviation ETHICS
• Evaluate and discuss the ETHICS methodology in the context of a business scenario
• Define and explain the term Agile methodology
• Evaluate and discuss the Agile methodology in the context of a business scenario
ProcessOriented IS Methodologies
• Define and explain the term process-oriented IS methodology
• Identify the types of process-oriented IS methodologies
• Identify and discuss the advantages of process-oriented methodologies
• Identify and discuss the disadvantages of process-oriented methodologies
• Define and explain the term Yourdon methodology
• Evaluate and discuss the Yourdon methodology in the context of a business scenario
• Define and explain the abbreviation POEM
• Evaluate and discuss the POEM methodology in the context of a business scenario
Object-Oriented IS Methodologies
• Define and explain the term object-oriented IS methodology
• Identify the types of object-oriented IS methodologies
• Define and explain terminology associated with an object oriented methodology
• Illustrate the construction of an object-oriented methodology
• Identify and discuss the advantages of object-oriented methodologies
• Identify and discuss the disadvantages of object-oriented methodologies
• Evaluate and discuss an object-oriented methodology in the context of a business scenario
Analytical Techniques for Understanding Complex Organisational Environmen
• Define and explain the term knowledge-based view of organisations
• Identify and discuss the advantages of an organisationoriented methodology
• Identify and discuss the advantages of an organisationoriented methodology
• Define and explain the abbreviation SWOT
• Demonstrate how SWOT can be used
• Apply SWOT to a business scenario
• Define and explain the abbreviation PEST
• Demonstrate how PEST can be used
• Apply PEST to a business scenario
Analysis of Factors Influencing a Business Problem
• Analyse the economic aspects of a business systems problem
• Evaluate and discuss the economic aspects of a business systems problem in the context of potential solutions
• Analyse the social aspects of a business systems problem
• Evaluate and discuss the social aspects of a business systems problem in the context of potential solutions
• Analyse the political aspects of a business systems problem
• Evaluate and discuss the political aspects of a business systems problem in the context of potential solutions
• Analyse the technical aspects of a business systems problem
• Evaluate and discuss the technical aspects of a business systems problem in the context of potential solutions
• Research and discuss case studies
Principles of Interface Design and the Requirements and Characteristics of Users that Motivate These
• Identify the principles and good practice of interface design
• Analyse the requirements of the users of an interface
• Analyse the characteristics of the users of an interface
• Demonstrate how good interface design can address the requirements and characteristics of an interface user
Design or Evaluate an Interface with regard to the Requirements and Characteristics of its users
• Design an interface that addresses the requirements and characteristics of an interface user
• Evaluate and discuss whether interface design principles have been applied to an interface
• Evaluate and discuss whether interface design principles have addressed the requirements and characteristics of the interface user
Professional Issues in IT
Code : R/503/4768Teaching Hours : 60Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Understand the social, ethical and professional issues essential to the IT profession
LO2: Understand a project management life cycle and associated techniques
LO3: Understand how to deploy a software application
LO4: Understand risks and the management of them in software projects
LO5: Understand the principles and techniques of IT service management
LO6: Be able to design software quality policies and procedures
Subject Coverage
Understanding IT Standards and Issues
• Introduction to the Unit
• Ethics – What are ethics and why are they relevant?
• Social, legal and professional issues in IT and their potential impact
• Why understanding standards and issues is so important
Applying IT Standards and Issues
• Applying social, ethical, legal and professional standards and issues to the IT profession and projects
• Analysing the effects of such issues and standards on the IT industry
IT Project Management
• What is IT project management and why is it necessary?
• Identifying and understanding project management lifecycles and phases
• Understanding project management strategies
Applied IT Project Management
• Identifying and applying project management lifecycle phases and strategies to IT projects
• Analysing, evaluating, concluding and reporting findings
Software Application Deployment
• What is software application deployment?
• Its place within an IT project’s lifecycle
• How to identify potential issues
• Software application deployment standards
Applying Software Application Deployment to Projects
• Identifying deployment risks and issues
• Creating a software deployment procedure for an IT project
• Explanation of software deployment procedure
IT Risk Management
• What is risk?
• Risk management and the techniques employed
• Risk identification and analysis in IT projects
• The consequences of not planning for risk
• Reactive vs. proactive
Applying, Evaluating and Managing Risk Analysis
• Applying risk analysis and risk management to an IT project
• Evaluating findings
• Reporting results
IT Service Management (ITSM)
• What is IT service management?
• Where is ITSM focused?
• Why is ITSM important?
• ITSM International Standards
Analysing and Applying IT Service Management
• Analysing and applying IT service management
• Evaluation of ITSM – advantages and disadvantages
Software Quality Policies and Procedures
• Understanding quality within IT
• What are quality procedures and policies?
• Why software quality procedures are important
• Measuring quality
• Theory of applying quality procedures to IT projects
• External standards
Applying Software Quality
• Writing a software quality policy
• Applying software quality procedures
• Revision of Unit content
• Assessment Clinic
Computing Project
Code : L/503/4784Teaching Hours : 24Global Examination ( 0%)
Delivery : Year #1Semester #1 Global Assignment (100%)
Learning Outcomes
LO1: Identify a suitable computing artefact and development method
LO2: Project manage the analysis, design, development and deployment of a computing artefact
LO3: Carry out the analysis for a computing artefact
LO4: Design a computing artefact
LO5: Develop a computing artefact
LO6: Test a computing artefact
Subject Coverage
Introduction
• Appropriate Artefacts
• Planning your Project
• Appropriate Development Methods
• Appropriate Risk Management
• Appropriate Configuration Management
Analysis Specifications
• Structure of an Analysis Specification
• Content of an Analysis Specification
Design Specifications
• Structure of a Design Specification
• Content of a Design Specification
Test Scripts
• Types of Testing (Reminder)
• Choosing Appropriate Tests
• Applying Tests
• Documenting Tests
Planning the final report
• Structure of Final Report
• Content of Final Report
• Citations and Referencing (Reminder)
• Appropriate Appendices
Project and Report Completion
• Private study time should include weekly meetings with your
tutor to discuss your progress.
• Project production
Extra Curriculum
Assessment Policy
Resit/Retake လုပ်ခြင်း
- * စာမေးပွဲ မအောင်မြင်ခဲ့ပါက ယင်းဘာသာအတွက် Re-sit Fee များပေးသွင်းပြီး ပြန်လည်ဖြေဆိုရပါမည်။
- * သင်တန်းတခုခြင်း၏ Eligibility Period သည် (၃)နှစ် ဖြစ်သောကြောင့် ယင်း(၃)နှစ်အတွင်း Re-sit များ ရှိခဲ့ပါက ပြီးစီးအောင်မြင်ပြီးဖြစ်ရန် လိုအပ်ပါသည်။
စာမေးပွဲနောက်ဆုတ်ဖြေဆိုခြင်း (Defer)။
- အရည်အချင်းစစ် စာမေးပွဲစစ်ဆေးချိန်၌ အကြောင်းအမျိုးမျိုးကြောင့် စာမေးပွဲ ဝင်ရောက် မဖြေဆိုနိုင်ပါက ခိုင်လုံသည့် အကြောင်းပြချက်ဖြင့် ကြိုတင် Defer form တင်၍ နောက်ဆုတ်နိုင်ပါသည်။
- စာမေးပွဲကာလ မတိုင်မှီ အနည်းဆုံး(၃)လကြိုတင် စီစဉ်ရန် လိုအပ်ပါသည်။
- Defer form တင်ရန် နောက်ကျခဲ့ပါက ပျက်ကွက် အဖြစ် သတ်မှတ်ပြီး စာမေးပွဲကျမည် ဖြစ်ပါသည်။
- စာမေးပွဲပြန်လည်ဖြေဆိုရန် Re-sit fees ပြန်လည်ပေးသွင်းရပါမည်။
အထူးမှတ်ချက်။
- ပထမနှစ်အောင်မြင်ပြီးပါက Level 4 Diploma လက်မှတ် ရရှိပါမည်။
- ဒုတိယနှစ်အောင်မြင်ပြီးပါက Level 5 Diploma လက်မှတ် ရရှိပါမည်။
- လုပ်ငန်းအတွေ့အကြုံ ရှိပြီးသူများအနေဖြင့် Level 5 Diploma လက်မှတ် တခုတည်းကိုသာ ရယူလိုပါက ဒုတိယနှစ်သို့ တိုက်ရိုက် တက်ရောက်နိုင်ပါသည်။
- ဘွဲ့သင်တန်းများသို့ ဆက်လက်တက်ရောက်မည့် သူများ အနေဖြင့် Level 4 Diploma & Level 5 Diploma (၂)မျိုးစလုံး အောင်မြင်ပြီးဖြစ်ရပါမည်။
Duration
Year | Duration |
---|---|
Foundation | 6 Months |
First Year | 1 Year |
Second Year | 1 Year |
Time Table
၁။ အချိန်– နံနက်(၉း၀၀)နာရီ မှ ညနေ (၄း၀၀)နာရီ အထိ။
၂။ သင်တန်းနေ့ရက်– စနေနေ့ နှင့် တနင်္ဂနွေနေ့များသာ။
၃။ Additional Skill သင်ကြားမည့်နေ့– သောကြာနေ့ နံနက်(၉း၀၀)နာရီ မှ ညနေ (၄း၀၀)နာရီ။
Entry Requirements
၁။ စနစ်ဟောင်း အခြေခံပညာ အထက်တန်း (သို့) တက္ကသိုလ်ဝင်တန်း အောင်မြင်ပြီးသူများ
၂။ စနစ်သစ် အခြေခံပညာ Grade-12 အောင်မြင်ပြီးသူများ
၃။ နိုင်ငံတကာသင်ရိုး GCE O Level/GED အောင်မြင်ပြီးသူများ
၄။ Level 3 Diploma တခုခု ရရှိထားသူများ