Develop your knowledge, awareness and capacity to work in e-commerce
Compulsory Modules
These modules provide foundation knowledge for the Advanced Certificate in E-commerce:
Industry Project BIP000
Cyber Security VIT103
E Commerce BIT100
Html (Writing a Website) VIT102
Graphic Design BIT205
Information Security BIT203
Internet Marketing BIT204
Elective Modules
In addition to the above modules, students study any 2 of the following modules:
Bookkeeping Foundations (Bookkeeping I) BBS103
Freelance Writing BWR102
Marketing Foundations VBS109
Marketing Psychology BPS107
Publishing I BWR107
Research Project I BGN102
Sales Management BBS102
Visual Basic.Net BIT101
Advertising and Promotions BBS202
ASP.NET BIT200
Digital Photography BPH202
Entrepreneurship BBS204
Javascript BIT202
Photoshop CS - Beginner To Medium Level VIT202
Marketing Systems BBS303
Course Duration: 900 hours
Learn to Develop Secure, Effective E Commerce
This course lays the foundation for you to understand how e commerce can be applied in any business, how you can protect against cyber attacks and protect your intellectual property.
Learning to Create and Manage a Web Site is Important
....but having a functional web site is only part of what is needed.
When organizations are trying to secure their assets, knowledge equates to power. As businesses constantly increase their dependence on information technology -- including placing/migrating data to the cloud, IoT (internet of things) devices, mobile devices, social platforms, and others – their exposure to cyber risks continues to rise significantly.
However, just like an annual health check, a vulnerability management program can help organizations identify weaknesses in their cyber systems before these turn into problems.
Performing a Vulnerability Assessment
The majority of all cyber attacks are designed to exploit known weaknesses and vulnerabilities. And with thousands and thousands of new vulnerabilities discovered every year, it is important for organizations to exercise constant vigilance to evaluate IT security posture and discover weaknesses, as well as to respond appropriately. A robust vulnerability assessment program is the key to responding to this more dangerous threat environment. This is because a vulnerability assessment is a formal process that identifies and quantifies the security weaknesses including the application software, hardware and networks.
A vulnerability assessment for an organization should produce a clear report containing a list of the components that require attention in the organization’s environment – and where on the list of priorities these components lie. Systems administrators in organizations’ IT departments are constantly updating, patching and applying software patches to their critical systems, however managing software updates and patches is quite a challenging task for IT departments because patches are known to occasionally cause disruption to other software and in some instances, systems requiring patches cannot be taken offline. For this reason, a good vulnerability assessment will provide the organization with a list of prioritized vulnerabilities sorted by system or software (or others) and can be used by the organization’s IT department and used as a to-do list to improve the organization’s security posture.
It is important for any organization, even if it is not a high priority target, to devise a plan of defence against today’s advanced cyberattacks whereby attackers program the attacks to actively search for vulnerabilities in systems and networks and automatically start their attack process as soon as these are found. It is also important to know that scanning for vulnerability assessments is one thing, and analysing/prioritizing vulnerabilities by including them in an overall “risk management program” is another.
A typical vulnerability assessment often involves the 5 steps below:
- Identifying which assets need to be protected;
- Evaluating threats against those assets;
- Undertaking vulnerability appraisal to understand how susceptible the current protection method is;
- Assessing risks (using the likelihood and impact of any potential weakness exploitation);
- Mitigating risks.
Statistical data about published data breaches worldwide shows the majority of attacks were targeting known vulnerabilities in cyber systems. The problems lie in identifying the vulnerabilities and responding effectively to them, which is what ultimately leads to cyber intrusions and damage to cyber systems.