HIGHER CERTIFICATE IN INFORMATION TECHNOLOGY COULD THIS BE YOU? You re working full-time. You ve got your feet on the ground, your fingers on the keyboard- and the need to spread your wing OR Although you have no formal training, you re already working in the IT industry. The point is, you want to improve your knowledge and gain new or enhance existing skills to take you even further in this fast growing field. If you say, Yes to any of these questions, our Higher Certificate in IT is definitely the answer for you. COURSE OBJECTIVES The main objective of the course is to provide you with a wide-ranging, sound, academically based and industry oriented training course during which you ll be. steeped in software design and development; exposed to a wide range of technologies that will shape the future of computer applications over the next few years; fully grounded in both the theoretical and practical aspects of IT. And just for the record, you ll be in good company, (in more ways than one) Our track record is, to say the least, quite impressive, including delegates from companies such as Standard Bank, Spoornet, Siemens Nixdorf, First National Bank, Liberty Life, Eskom, SANDF, SAA and the SABC. ENTRANCE REQUIREMENTS The minimum entrance requirements are: A matric certificate or equivalent qualification. Practical experience in the IT industry. - Each candidate will be individually selected by the Academy. 1
FACULTY OF SCIENCE ACADEMY OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING TO WHOM IT MAY CONCERN Compulsory Fees payable before or during registration Registration levy: TBA ICT levy: TBA Application fees enrolment 2014 R100-00 FEE STRUCTURE FOR HIGHER CERTIFICATE IN INFORMATION TECHNOLOGY 2014 PART TIME 2 nd YEAR STUDENTS MODULE MODULE CODE MODULE NAME CLASS FEE 1 CER0060 Operating Systems R3100.00 2 CER0070 Information Security R3100.00 3 CER0090 Project Management R3100.00 4 CER0100 Project Implementation R3100.00 General guidelines for the payment of fees: Given that a significant proportion of funds are derived from tuition fees, the University is compelled to take precautions to ensure that the maximum amount of funds is recovered. Therefore, the following guidelines with regard to the collection strategy are applicable: Students who are allowed to register will have to remit the first payment on the date of registration. Students who are awarded bursaries will have to make arrangements with their sponsors to make the first payment available to them. All students, except those who have made the necessary arrangements to pay off the outstanding balance as well as those paying by debit order, will have to adhere to the payment dates for the second and final payments as set out below: 30 April: 60% of fees for the year (includes first payment) 31 August: Outstanding balance (40% of fees for the year)
FACULTY OF SCIENCE ACADEMY OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING TO WHOM IT MAY CONCERN Compulsory Fees payable before or during registration Registration levy: TBA ICT levy: TBA Application fees enrolment 2014 R100-00 FEE STRUCTURE FOR HIGHER CERTIFICATE IN INFORMATION TECHNOLOGY 2014 PART TIME 1 ST YEAR STUDENTS MODULE MODULE CODE MODULE NAME CLASS FEE 1 CER0010 INTRODUCTION TO PROGRAM DESIGN R3100.00 2 CER0020 THE USE OF BASIC DATA STRUCTURES R3100.00 3 CER0030 DATABASES R3100.00 4 CER0040 SOFWARE ENGINEERING R3100.00 5 CER0050 PROJECT DESIGN R3100.00 8 CER0080 DATA COMMUNICATION & NETWORK R3100.00 General guidelines for the payment of fees: Given that a significant proportion of funds are derived from tuition fees, the University is compelled to take precautions to ensure that the maximum amount of funds is recovered. Therefore, the following guidelines with regard to the collection strategy are applicable: Students who are allowed to register will have to remit the first payment on the date of registration. Students who are awarded bursaries will have to make arrangements with their sponsors to make the first payment available to them. All students, except those who have made the necessary arrangements to pay off the outstanding balance as well as those paying by debit order, will have to adhere to the payment dates for the second and final payments as set out below: 30 April: 60% of fees for the year (includes first payment) 31 August: Outstanding balance (40% of fees for the year)
ACADEMY OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING HIGHER CERTIFICATE IN INFORMATION TECHNOLOGY SECOND YEAR STUDENTS 2014 MODULE SUBJECT CLASS DATES EXAM DATE 6 Operating Systems 02 Jun 6 Jun 2014 14 July 2014 09 Jun 13 Jun 2014 7 Information Security 15 Jul 18 Jul 2014 1 September 2014 28 Jul 01 Aug 2014 9 Project Management 02 Sept 05 Sept 2014 13 October 2014 15 Sept 19 Sept 2014 10 Project Implementation Appointments with lecturers 31 May 2014 CLASS TIMES: 18:00 21:00 PLEASE NOTE: ALL CLASSES ARE COMPULSORY AND IT S YOUR RESPONSIBILITY TO TAKE NOTE OF THESE CLASS TIMES AND EXAM DATES.
ACADEMY OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING HIGHER CERTIFICATE IN INFORMATION TECHNOLOGY FIRST YEAR STUDENTS 2014 MODULE SUBJECT CLASS DATES EXAM DATE 1 Introduction to Program Design 27 Jan 31 Jan 2014 03 Feb 07 Feb 2014 15 March 2014 17 Feb 21 Feb 2014 2 The use of basic data structures 24 Feb 28 Feb 2014 3 Databases 17 Mar 20 Mar 2014 5 May 2014 07 Apr 14 Apr 2014 4 Software Engineering 06 May 9 May 2014 23 June 2014 19 May 23 May 2014 5 Project Design Appointments with lecturer 25 October 2014 8 Data Communications and Networks 11 Aug 15 Aug 2014 29 September 2014 25 Aug 29 Aug 2014 CLASS TIMES: 18:00 21:00 PLEASE NOTE: ALL CLASSES ARE COMPULSORY AND IT S YOUR RESPONSIBILITY TO TAKE NOTE OF THESE CLASS TIMES AND EXAM DATES.
ACADEMY OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING Higher Certificate in Information Technology SELECTION FORM 2014 PLEASE COMPLETE IN BLOCK LETTERS Title: Surname: Initials: Telephone: Email: Cellphone: Admission requirements: o A Matric certificate or equivalent qualification o Practical experience in the IT industry o A confirmation letter from employer clearly stating IT work experience. 1. Who will be financing your studies? Self Employer In case of employer, please supply a contact name: Name: 2. Do you have workable knowledge of: Microsoft Word Microsoft Excel Microsoft Access Microsoft PowerPoint Year 3. Programming experience: (If so, in which language?) Extensive Moderate No experience Mark with a 4. Computer related courses completed: a. Programming: COURSE NAME DATE
b. General Information Technology courses: COURSE NAME DATE c. End user training (including word processing): COURSE NAME DATE 5. Other (Any experience or courses not mentioned): SIGNATURE DATE
COURSE FORMAT The course consists of 10 modules, offered as: Part-time block sessions of two weeks per module where you need to attend lectures from 18:00 to 21:00 daily in 8 block sessions over 2 weeks, spread over two years (6 Modules in 1 st year and 4 in 2 nd year). The block sessions consist of lectures and practical classes presented on campus. To qualify for the certificate, all 10 modules must be completed successfully. THE MODULES MODULE 1: Introduction to Program Design and Programming, using the Visual Basic programming language This module will cover: - An introduction to important concepts by way of an in-depth case study. The design of each stage of the problem will be discussed at length, and the necessary constructs will be introduced by way of pseudo code. - An introduction to a wide variety of design problems, which will be implemented using Visual Basic. - Thorough groundwork which will equip you with practical, hands-on experience in program development. In short; even experienced programmers would benefit from the well-structured and well-disciplined approach to programming offered by this module. MODULE 2: The use of Basic Data Structures, using the Visual Basic Programming Language Module 2 includes the following: - An expansion of the programming concept as discussed in module 1. - The case study introduced during Module 1 will be used to illustrate concepts at an advanced level of design and implementation. - Introduction to the concept of basic data structures, such as arrays and structures. (The implementation will be completed in Visual Basic) - Functional discussion and illustration of advanced structures, such as stacks and queues, by means of practical design-oriented problems. Modules 1 & 2 will focus mainly on the design of sound, correct and safe programs - covering data structures and procedures constituting the building blocks of good programming. Although the medium of instruction will be Visual Basic, other programming languages could easily be learnt once these modules have been completed. 2
MODULE 3: Databases This module will deal with: - The selection, design and implementation of database systems. - A strong focus on design. - The entity-attribute relation (EAR) analysis. - The object-oriented model. - A detailed study of the client/server model for distributed processing. - Practical work conducted in Microsoft Access. MODULE 4: Software Engineering This module will entail: - A state-of-the-art-overview of software development in general. - Discussions of the functional information flow approach, as well as the object-oriented approach to software generation. - Stimulation of critical thinking regarding the software generation process. - A review of concepts such as life-cycle models and various methodologies. - The foundation from which to launch several projects which will be completed in the course of modules 5 & 10. MODULE 5: Project Design The main focus of this module will be the launch of a comprehensive design project, the topic which will be chosen in consultation with the Academy. Your work will be evaluated by way of project documentation, presentation and, possibly, a demonstration. Module 5 is a prerequisite for Module 10. Attendance of regular progress meetings is compulsory. MODULE 6: Operating Systems Part 1 This section will be devoted to the architecture of computer systems, including: - An overview of computer systems (CPU, peripherals, memory, control unit, arithmetic logic unit, buses, etc.) - The main elements of processor design, using the Intel 80X86 processors as a basis. - A brief overview of later developments such, as parallel, superscalar and RISC Processors. - Discussion of the characteristics of primary and secondary as well as cache memory. Part 2 This section will focus on: - The role of operating systems in the creation of environments conducive to program execution. - The role of an operating system in its capacity as manager of computer resources, such as CPU time, memory and secondary storage. - Introduction to concepts such as user interfaces, file systems, multi-tasking, scheduling, protection, paging and virtual memory. - A brief overview of commercial operating systems such as MS Windows and UNIX. 3
MODULE 7: Information Security There can be no doubt that Information Security as a discipline has become of age. Firstly, the profile of Information Security has risen immensely in the last few years, and secondly a sound theoretical basis for understanding Information Security has emerged. Developments like the Internet, WWW-based banking systems, electronic commerce and the like, has catapulted Information Security from the technical environment right onto board room and executive management level. A good, well balanced knowledge has become essential not only to IT people, but also to all other players in the field. It has become dangerous to equate Information Security to, for eg, firewalls. The Have firewall are safe syndrome is dangerous because it fosters Information Security Complacency amongst involved parties especially senior management and board members. Information Security is pervasive throughout a company, and is not based on one or more tools. Information Security has involved, and has established itself as a disciple in its own right - a discipline based on sound theoretical principles or services. If these principles of Authentication, Authorization, Confidentiality, Integrity and Non-repudiation are understood, the whole implementation and management of Information Security are simplified. Firewalls now become a mechanism to implement Authorization, encryption a mechanism to implement Confidentiality; Access control lists a mechanism to implement Authorization etc, etc. These principles from the basis of internationally accepted Information Security Architectures. This course will introduce Information Security as a specific discipline. Although the main objective of the course is not to turn laymen into Information Security fundis, it will provide an overview of all the relevant aspects of the field, and will create a greater general awareness of the subject. MODULE 8: Data Communication and Networks This module will focus on: - The principles underlying data communication across computer networks. - The basic principles underlying WAN s, LAN s and the Internet. - Introduction to the network world by way of the 7-layer OSI model, with special reference to specific aspects of the model, e.g.: characteristics of the physical layer; topologies and message routing; packet switched networks; data-linked protocols; data transmission; and error handling - Network management aspects such as Information Security. 4
- Introduction to new developments, such as the ATM protocol for multimedia networks. - The most important LAN architectures and protocols. - Recent developments on the Internet. - Specific reference to the TCP/IP protocol. MODULE 9: Project Management The background: Fortune Magazine rates IT project management as "Career Number 1" and the field has become a top career choice for many highly talented professionals. Today, IT project managers play a key role in launching new products and managing special projects. As project team leaders, project managers create strategies and orchestrate carefully designed action plans to complete projects successfully incorporating complex, dynamic requirements. Both the Gartner Group and Standish Group report that organisations worldwide are increasingly focusing on strengthening their IT management skills, especially IT project management skills. The course contents: The main objective of this module is to expose you to the discipline of IT project management. To this end, it will entail: - Introduction to IT Project Management - The IT Project Management Context and Processes - The 9 knowledge areas IT Project Integration Management IT Project Scope Management IT Project Time Management IT Project Cost Management IT Project Quality Management IT Project Human Resource Management IT Project Communications Management IT Project Risk Management IT Project Procurement Management MODULE 10: Project Implementation In the course of this module, you will be required to implement a workable prototype of the design completed in Module 5. The software-developing environment will be Microsoft Access, and you will need to be proficient in Access. (Keep in mind that no training for Microsoft Access will be provided.) Compulsory project progress meetings will be held regularly. 5
EXAMINATION PROCEDURES Each module will be examined individually either by way of a project or examination, or both. Modules 1 and 2 will be examined at the end of the relevant course week, and the remaining, more theoretical modules will be examined on the first evening of the next module. TUITION FEES R3100.00 per module All training fees, lecture notes and examination fees are included in the above-mentioned amounts. Students must buy their own textbooks - + R 500.00 per module. Textbooks will be available at the Bookshop on Auckland Park Kingsway Campus. Only a limited number of students will be accepted each year. Above fees are for 2014. Fees are reviewed annually. GENERAL INFORMATION The closing date for applications is 6 December. Ms Simangele Msibi / Ms Tosca Ferreira Academy of Computer Science and Software Engineering Auckland Park Kingsway Campus University of Johannesburg PO Box 524 Auckland Park 2006 Tel.: 011 559 2839/ 011 559 2967 Fax: 011 559 2138 e-mail: simangelem@uj.ac.za tferreira@uj.ac.za The Higher Certificate in IT is an extracurricular course that does not affect your entrance to, or credit towards, any university course. Once your application is approved, you will be notified of the relevant lecture times and dates in advance. 6