Need Assistance? 01384 442752 (UK)

ASSOCIATE DIPLOMA IN INFORMATION TECHNOLOGY VIT005

Duration (approx) 1500 hours
Qualification
Associate Diploma

Why Study information technology to an advanced level?

IT specialists are in high demand today, that is why training as an IT professional is a great career if you are interested in computers and problem solving.

Every organisation is unique with regards to its size, locations, operations, employees, budget and profit margins. It is not just organisations that use information technology today. Digital nomads, influencers, bloggers, writers, researchers and other professionals may also work alone in their own home or office. It doesn’t matter in what way people use information technology, but there are more and more opportunities for information technology specialists to support people and organisations with their IT requirements.

A solid foundation for a career in I.T., this course focuses on developing awareness of industry, knowledge of valuable skills and a capacity to adapt to change in order to remain abreast of what is a rapidly changing discipline. This course does not require any previous IT experience as it takes you right from the basics to a higher level.

Who Is This Course Suitable For?

This course is suitable for –

  • Anyone wanting to become an IT specialist or professional.
  • You might want to work for an organisation or set up your own business.
  • You might be interested in working as an IT Officer, Technical support officer, IT Help desk Officer or an IT Administrator.
  • Perhaps you already work in IT and want to improve your job and career prospects with advanced training.

If you are not sure if this is the right course for you, then please do talk to us. We have a wide range of IT courses available.

What Will You Learn In This Course?

In this course, you will study 15 x 100 hour modules.  There are ten core modules and five elective models. With the elective models, you choose modules that are of interest to you and suitable for your career development. You can see more information on the modules below, but as a brief summary this course will cover –

  • Computer operations
  • Computer servicing
  • Computer programming
  • Asp.net
  • Graphic design
  • Creating a website (HTML)
  • Information security
  • SQL
  • Visual Basic.NET

And more.

This course is suitable for professional/career development, CPD or personal interest.

Modules

Core ModulesThese modules provide foundation knowledge for the ASSOCIATE DIPLOMA IN INFORMATION TECHNOLOGY VIT005
 ASP.NET - BIT200
 COMPUTER OPERATIONS VIT101
 COMPUTER SERVICING I VIT203
 COMPUTER SERVICING II VIT204
 GRAPHIC DESIGN BIT205
 HTML (WRITING AN INTERNET WEBSITE) VIT102
 INDUSTRY PROJECT BIP000
 INFORMATION SECURITY MANAGEMENT - VIT203
 SQL FOR THE WEB - BIT201
 VISUAL BASIC.NET BIT101
Elective ModulesIn addition to the core modules, students study any 5 of the following 25 modules.
 ADVERTISING & PROMOTING BBS202
 ARTIFICIAL INTELLIGENCE BIT206
 C# PROGRAMMING BIT211
 Computer Aided Design CAD BIT209
 COMPUTER NETWORKING FOUNDATIONS BIT103
 COMPUTER SERVICING III VIT205
 CYBER SECURITY VIT103
 DIGITAL PHOTOGRAPHY BPH202
 E-COMMERCE BIT100
 EDITING FOR SPECIALISTS AND PROFESSIONALS (EDITING III) BWR307
 EDITING I - BWR106
 EDITING II BWR302
 EDITING PRACTICE BWR305
 FLASH CS BIT102
 INVESTIGATIVE TECHNIQUES BWR208
 JAVASCRIPT BIT202
 LOGISTICS BBS212
 MANAGING INNOVATION BBS209
 MARKETING FOUNDATIONS VBS109
 PHOTOSHOP (BEGINNER to MEDIUM LEVEL) - VIT202
 PUBLISHING I - BWR107 (SELF PUBLISHING CHILDREN'S BOOKS)
 PUBLISHING II - BWR202
 PUBLISHING III (BUSINESS PRACTICES) - BWR303
 ROBOTICS BSC116
 TECHNICAL WRITING - BWR301

It's easy to enrol...

1
Select a learning location:
2
Select a payment plan:

3
Select a learning method

4

Identifying Threats

We often hear of cyberattacks and confidential data being leaked, so a knowledge of identifying threats is essential in information technology.  This course will consider identifying threats. For example - When system vulnerability is exploited or has the possibility of being exploited, the system is known to be “at risk of a threat”, therefore, a threat is defined as the potential for a factor or third-party system to successfully exercise vulnerability in a particular system. Recall from previous lessons that system vulnerability is a weakness in the system which can be triggered or exploited either accidentally or for malicious intent. 

When performing risk assessment for a particular information system, it is very important to identify all the potential threats to that system, along with the likelihood of each threat, therefore, things like threat sources, existing vulnerabilities, potential vulnerabilities and existing controls should be carefully considered and examined.
Identifying the source of threats
The first step in identifying threats consists of identifying any potential sources of threats and write down a list of those threat-sources which are of relevance to the information system being evaluated. A threat source refers to any event or circumstance that has the potential of causing some sort of damage and harm to an existing information system. The most common sources of threat are environmental, human, or natural.

Potential sources of threats should be carefully considered, and this can prove to be quite a lengthy exercise and might require a few meetings and sessions because some sources may not be very obvious but can still potentially cause great harm to the information systems in particular, and to the organisation as a whole. Events like “flooding” for example might have a very low likelihood of occurring because an organisation might not be located near the beach or the river, however it is still possible for the facility to flood in the event of a bursting pipe within the company, and this will still classify as a “flood” event. Such an event can cause extensive damage to the IT assets and resources of an organisation. 

Human beings can also cause a great deal of damage to information systems, and are therefore considered as serious threat sources for any business. Humans can hurt information systems either intentionally or unintentionally. Intentional harm results from attacks by malicious people and disgruntled employees, whereas unintentional harm can result from negligence and human errors.

What Are the Advantages of Studying With ACS Distance Education?

  • You can start at any time to suit you.
  • The courses are self-paced.
  • You can study when and where suits you. They are flexible to fit in around you and your lifestyle.
  • Keep up to date on your learning.
  • Update your CV.
  • It is not just a course, it is a package of learning that includes – course notes, tutor feedback, self-assessment tests, research tasks and assignments.
  • Our tutors are all experts in their field, with years of experience in their field.
  • They are also keen and enthusiastic about their subject and enjoy working with students to improve their knowledge and skills.
  • Courses are also updated regularly to meet the demands of the changing needs for knowledge and to keep our courses up to date.

What Next?

This course is an advanced qualification in information technology. It provides you with broad training in information technology from programming to operations to servicing to security. The elective modules also enable you to choose specific training to suit you and YOUR career needs.

Having long term career prospects in information technology careers requires more than the ability to program and service computers. You also need to be able to adapt and change as new technologies and information becomes available. This is why training on courses such as this are essential for long term IT career development.

This course is broad based in order to give you broad skills. It will foster your ability to grow your awareness of opportunities, building contacts with industry professionals. You will learn to think and act in an innovative way, and in doing all these things to optimize your career sustainability.

You can enrol today by clicking the “Enrol Now” button above.

Or

Click here to ask a Question

Or Request a Prospectus Here.

Courses can be started anytime from anywhere in the world!

Meet some of our academics

John MasonMr Mason has worked 45+ years in Writing, Education, Horticulture and Recreation. His experience in both public & private sectors is extensive; particularly across Australia and England.
David CrothersChartered Accountant with 20 years experience in corporate and financial roles. David has a FCA, GAICD, B.Sc.Econ (Hons), Cert IV TAA. Extensive international experience in business and finance.
Josiane JoubranCSC consultant with IBM, Software QA Engineer, Course Writer and Tutor. Josiane is an I.T professional with extensive experience with computer hardware and engineering in Lebanon and Australia. Josiane has a B.Eng., Grad.Dip.I.T., Master Info.Tech., MCP, MCSE.
Jade SciasciaBiologist, Business Coordinator, Government Environmental Dept, Secondary School teacher (Biology); Recruitment Consultant, Senior Supervisor in Youth Welfare, Horse Riding Instructor (part-completed) and Boarding Kennel Manager. Jade has a B.Sc.Biol, Dip.Professional Education, Cert IV TESOL, Cert Food Hygiene.


Check out our eBooks

Working With PeopleAre you a "people person" looking for a job; or a better understanding of careers that might suit you? If so, this book was written for YOU!
How to be a Successful EditorThere are plenty of books that show you the processes involved in editing; but knowing the process is in itself not enough to be a successful editor. This book not only covers aspects of the process; but it also goes beyond the process; showing you things that may help you to become better than the “average” editor.
Professional Practice for ConsultantsExplore becoming a consultant. This ebook contains chapters on how to be a consultant, packaging your services, delivering the services, building your resources, finding the work and getting the job, planning and ethics.
ManagementManagement is the process of planning, organising, leading, and controlling an organisation’s human and other resources to achieve business goals. More importantly though, effective management needs to be a process of human interaction and compassion. Most bad managers don’t know they are bad. They may well admit that they are a bit erratic, or they are sometimes late to appointments, but it is rare that they will recognise that they are ineffective as managers. Never fear...read here. This book has something to offer even the best of managers.