The online Postgraduate Certificate in Strategic Technology Innovation programme consists of four modules. The first module takes ten weeks to complete and the subsequent modules take eight weeks to complete.
To lay the foundation for successful study, and introduce strategic considerations of the role of IT within an organisation. As a student, you will have the opportunity to gain skills to lead IT more effectively and also to investigate the various functions of an IT organisation and the best ways to perform these functions.
This module is designed to introduce students to the online learning environment and a wide range of strategic considerations associated with software acquisition and deployment, and the management of information systems projects. The module considers the role of software within organisations from the human, social, knowledge and business perspectives. In the context of software acquisition, the module examines a range of processes from off-the-shelf acquisition to bespoke software development including various software lifecycles. Once acquired, software needs to be maintained and evolved, and so the module also examines theories and methods for achieving this.
To provide comprehensive understanding of the techniques and challenges of technology innovation and change management – including the management of organisational resources and environments outside of the IT domain. As a student, you will have the opportunity to gain the knowledge and skills to assess and implement change in a controlled manner that aligns with organisational needs and objectives.
This module will provide students with a comprehensive understanding of how technology becomes an enabler for business and how IT strategies support organisational goals to help to create a sustained competitive advantage in business. More specifically, the module will provide students with the ability to critically evaluate IT strategies and to understand how to deploy such strategies in the context of systems and/or business applications within the IT industry.
To build a detailed and practical foundation relating to the techniques and challenges of technology innovation and change management. As a student, you will have the opportunity to gain the knowledge and skills for the management of resources, the use of new IT innovations and how to implement change in a controlled manner to meet organisational needs and objectives.
This module will provide students with a comprehensive understanding of change models and the impact of change through technology innovation, adoption and implementation. Students will have the opportunity to gain advanced knowledge and skills to manage the design and use of technology to promote growth, innovation and change within organisations. The module will also provide students with a comprehensive understanding of how innovation can act as a change enabler and the importance of building readiness for change within organisations.
To provide insights into cryptographic algorithms and protocols, including a detailed understanding of symmetric key encryption algorithms, hash function algorithms, public key cryptography algorithms and key agreement protocols. You will have the opportunity gain an in-depth understanding of attacks, vulnerabilities and of quantum computing techniques, as well as experience to apply cryptographic algorithms and protocols to solve security issues.
This module provides students with a critical understanding of how to use cryptographic algorithms and protocols to solve practical security problems (such as confidentiality, integrity and authenticity). As a student, the module also allows you to acquire a systematic understanding of open-source tools to build secure applications, and to learn how best to apply such tools.
To provide a comprehensive understanding of big data tools and techniques as well as a critical understanding of an open source software framework for distributed data storage and processing. You will have the opportunity to gain a practical understanding of the issues related to the integration and deployment of big data management systems in the context of enterprise deployment.
This module provides students with detailed knowledge of big data tools and techniques, and big data management frameworks that can be used to support advanced analytics. This module will consider big data management frameworks in general, but with a focus on the Hadoop open-source data storage and processing platform and its underpinning sub-systems. It also provides detailed awareness of how big data systems support data-driven decision making.
To provide a comprehensive overview of cloud architecture models and guidance for building cloud-based services and applications. You will be introduced to cloud industry standardisation, middleware platforms and cloud provider platforms, as well as to all the possibilities that cloud computing has unleashed.
Cloud computing is an important new paradigm in information technology that provides a basis for a new wave of technology developments. Cloud computing embodies advances in computing, networking, and storage technologies which individually and collectively include major hardware and software breakthroughs. These include computer virtualisation, distributed and replicated storage, and software-based networking. Cloud computing motivates further technology advancement and changes how modern IT infrastructures are built and evolved. There is a growing demand for specialists with strong technical background and deep knowledge of cloud computing technologies.
To provide a systematic understanding of the tools and techniques that can be deployed for cybercrime prevention by developing a broad understanding of the information security management landscape. You have the opportunity to develop practical skills to deploy the tools and techniques of cybercrime prevention, in both commercial and non-commercial settings, through the use of ‘ethical hacking’.
This module provides students with a comprehensive understanding of the tools that can be used to prevent and mitigate against cybercrime – including the deployment of cybercrime prevention strategies for application in the workplace by considering the motivations behind cybercrime. Students have the opportunity to build an ‘ethical hacking’ environment with which to experiment and test their skills.
To provide detailed knowledge in the practice of extracting evidence from computers and digital storage media.
This modules provides students with the knowledge to identify, extract, document, interpret and preserve computer media as digital evidence, as well understanding of how to analyse the root cause of security breaches. The module covers issues such as crypto-literacy, data hiding and hostile code.
To provide a detailed, critical understanding of the concepts of data mining, the end-to end data mining process and the ability to deploy appropriate tools and techniques in line with organisational and business requirements. As a student, you will have the opportunity to gain experience in implementing data mining algorithms and evaluating their performance.
This module provides students with an in-depth understanding of the concepts of data mining, including the end-to-end process and major data mining tools and techniques in common use. As a student, you will have the opportunity to apply such tools and techniques to a variety of example data sets so as to gain vital insights into their operation, and when and where these tools can best be applied. You will also have the opportunity, using the 'R' programming language, to implement several different kinds of data mining algorithms to gain a comprehensive understanding of their operation.
To provide a detailed understanding of the concepts and challenges of creating data warehouses. You will have an opportunity to create a data warehouse using open source technologies and free public data sets. You will also be introduced to why data visualisation is important and how to communicate these insights to tell a ‘data story’.
This module introduces students to the concept and challenges of creating data warehouses and how data visualisation tools can be used to ‘tell a story’. As a student, you will have the opportunity to gain practical experience of how to create data warehouses using data from multiple sources. The module will also introduce best practices in data visualisation and data storytelling, using state-of-the-art data visualisation technology.
The module is intended to help you understand the approaches and benefits of data warehousing, and show you how to quickly gain and communicate insights into the data stored in data warehouses using data visualisation techniques.
To provide a systematic understanding of key predictive analytics techniques and an understanding of the types of business problems predictive analytics can solve. You are provided with an opportunity to apply the tools and techniques learned throughout the module to typical business problems.
This module provides students with insight into how predictive analytics can be used to help organisations and their customers make better decisions. As a student, you will have the opportunity to gain a comprehensive understanding of how results from predictive analytics can be used by organisations to grow their customer base and run operations more efficiently. This module is oriented towards practical applications of predictive analytics.
To provide an opportunity to understand and evaluate the professional and ethical issues arising in the use, implementation, operation and monitoring of IT systems. You will also explore the legal and social issues that computing professionals may encounter and develop key management skills required for the effective utilisation and operation of IT.
To function effectively, professional IT practitioners need not only the appropriate technical knowledge, skills and experience, but also a broad understanding of the context in which they operate. IT professionals must understand the relationship between technological change, society and the law, and the powerful role that computers and computer professionals play in a technological society. This module is designed to help you operate effectively in work and community situations, and to be aware of your environment.
To provide in-depth understanding of information security concepts and models. You will have an opportunity to develop the skills to carry out security and risk assessments, to design and deploy security infrastructures, to write security/incident response polices and to conduct penetration testing.
This module provides an insight into information security principles, security policy models/protocols, industry standards for security compliance and risk assessment. As a student, you will develop a critical understanding of how to use information security techniques to solve practical security problems. You will also have the opportunity to gain skills for designing/implementing security infrastructure and writing security/incident response polices. Through practical and hands-on project work, this module is designed to ensure you are ready to apply the knowledge gained in this module in your workplace.
To provide theoretical and practical knowledge of, and insight into the formal, systemic approaches of Cyber Security Risk Management (CSRM). You will have the opportunity to gain practical skills in the application of the concepts, techniques and approaches of Security Risk Management in enterprises of all kinds.
Threats to information security are becoming more sophisticated. Laws and regulations impose strict CSRM requirements on all enterprises to prevent, or at least limit, the potential of cyber-attacks. This module aims to provide the theoretical and practical knowledge to deliver a formal, systematic and in-depth approach to the application of the concepts, techniques, methods, approaches and processes of CSRM in a pragmatic manner and in the context of enterprises of all kinds.