Tshwane University of Technology

Advanced Diploma in Information Technology

Physical, Mathematical, Computer and Life Sciences - Information Technology and Computer Sciences

Purpose and Rationale

Purpose:

This qualification aims to provide learners with the necessary skills and knowledge to work in computer networks, distributed computing systems, information and computer security, network management and control, and infrastructure support services. By focusing on theory, design, implementation, and management of linked computer systems, learners are prepared to meet the technology needs of various organizations in Southern Africa. Possible job positions for qualifying learners include Net and Forensics roles, as well as Infrastructure and User Support. The competencies developed include network theory application, system design and implementation, security assurance, system management, IT support services provision, integration of emerging technologies, algorithmic and mathematical techniques application, and project management principles in communication networks.

Rationale:

This qualification is designed to address the evolving demands of the organizational environment, particularly in network systems administration, network architecture, and network security. It aims to bridge the skills gap present in the local and global economy by aligning with national imperatives and the institution's vision. The qualification also considers industry recommendations and feedback through industry-endorsed advisory boards and mentoring visits. The curriculum is based on the Information Technology Curricula 2017 developed by recognized bodies in the computing field. Learners of this qualification are expected to possess attributes such as effective project management, teamwork skills, communication proficiency, commitment to professional development, ethical awareness, and knowledge of network communication, design, implementation, and security issues.

Potential Career Paths:

Upon completion of this qualification, learners can pursue roles in industries like banking and telecommunications, where network security is paramount. They will be equipped to handle security threats, design and manage networks, and understand the foundations of Internet and network applications. The focus is on developing strategies to mitigate security risks and implement effective network solutions. Overall, the qualification aims to enhance learners' abilities to address complex problems in computer networking and security environments, driving innovation and improving organizational responsiveness, effectiveness, and efficiency, ultimately contributing to the social and economic progress of the country.

Outcomes

  1. Apply the fundamentals of wireless network theory.
  2. Design and implement network management principles.
  3. Deploy and maintain basic administrative tasks of modern computer systems, with particular emphasis on the administration of user accounts.
  4. Evaluate and recommend routing and forwarding algorithms for the Internet.
  5. Identify and explain advance cybersecurity management.
  6. Analyse and create categories of computer security.
  7. Evaluate the importance of LAN switching to network design.
  8. Apply fundamental research methodologies and techniques to analyse and design solutions for Information Technology problems.
  9. Produce a researched orientated solution based on industry expectations.
  10. Deployment of System Administration and Maintenance tools.

Assessment Criteria

Associated Assessment Criteria for Exit Level Outcome 1

  • Explain the main characteristics of mobile IP and how it differs from IP about mobility management and location management as well as performance.
  • Demonstrate (with home agents and foreign agents) on how to route e-mail and other traffic using mobile IP.
  • Implement a simple application that relies on mobile and wireless data communications.
  • Describe the areas of current and emerging interest in wireless and mobile computing, and assessment of the current capabilities, limitations, and near-term potential of each.

Associated Assessment Criteria for Exit Level Outcome 2

  • Discuss the issues for network management arising from a range of security threats, including viruses, worms, Trojan horses, and denial-of-service attacks.
  • Explain a strategy for ensuring appropriate levels of security in a system designed for a particular purpose.
  • Demonstrate knowledge of how to plan, integrate, and manage computer network technologies and services to meet a variety of business needs.
  • List and explain the protection of network resources using security technologies and disaster planning.

Associated Assessment Criteria for Exit Level Outcome 3

  • Explain the installation and maintenance of Windows and Linux server.
  • Discuss the implementation of the sharing of resources on the network.

Associated Assessment Criteria for Exit Level Outcome 4

  • Describe the organization of the network layer.
  • Explain how to forward packets in an IP network.
  • Justify the relation of scalability benefits of hierarchical addressing routing algorithms.

Associated Assessment Criteria for Exit Level Outcome 5

  • Explain a general understanding of malware and social engineering attacks.
  • Discuss application and networking-based attacks.
  • Share and discuss knowledge of host security, application security, and data security.
  • Discuss and demonstrate advanced cryptography.
  • Demonstrate security through network devices.
  • Demonstrate the administration of a secure network.
  • Discuss vulnerability assessment.
  • Introduce wireless network security.
  • Discuss mobile device security.
  • Demonstrate understanding of access control fundamentals.
  • Discuss the implementation of business continuity.
  • Discuss and demonstrate the implementation of security risk mitigation.

Associated Assessment Criteria for Exit Level Outcome 6

  • List and explain likely attacker types against a particular system.
  • Discuss the limitations of malware countermeasures.
  • Identify instances of social engineering attacks and denial of service attacks.
  • Examine how to identify and mitigate denial of service attacks.
  • Discuss risks to privacy and anonymity in commonly used applications.
  • Discuss the concepts of covert channels and other data leakage procedures.

Associated Assessment Criteria for Exit Level Outcome 7

  • Perform analysis of LAN switching technologies and explanation on how critical they are to network design.
  • Evaluate the capabilities, application, and design of LAN switches and switched internetworks.
  • Explain the problems of link congestion that arise from the deployment of LAN switches.
  • Demonstrate how switches and end stations can use a group of independent LAN segments as if they were a single link.
  • List and discuss concerns that environments need to be aware of and how to prevent attacks.
  • Discuss the concepts and operation of source routing in both end stations and bridges.
  • Identify the various uses for Virtual LANs (VLANs) as well as the fundamental concepts employed by devices that implement VLAN capability.

Associated Assessment Criteria for Exit Level Outcome 8

  • Identify and explain fundamental research methodologies and techniques for analyzing and designing solutions for IT problems.
  • Apply fundamental research methodologies and techniques for analyzing and designing solutions to IT problems.

Associated Assessment Criteria for Exit Level Outcome 9

  • Identify and research a solution for industry expectation.
  • Solve industry expectation.

Associated Assessment Criteria for Exit Level Outcome 10

  • Explain issues for network management arising from a range of security threats.
  • Describe the development of a strategy for ensuring appropriate levels of security.

Integrated Assessment

  • A variety of strategies will be applied to achieve an integrated assessment.
  • These assessments will include summative assessment in the form written examinations (class tests, online tests, semester tests) and formative assessment (presentations, group work, individual projects, assignments, practical and a research report).
  • Some of the criteria are assessable through observation of the learners during their classes when they demonstrate their projects.
  • This assessment will supply qualifying learners with applied competence, foundational competence, practical competence, and reflexive competence for furthering their learning.

Qualification Details

Type
Advanced Diploma
NQF Level
07
Min. Credits
120
SAQA Source
More Information

Education Cost Calculator

Tshwane University of Technology
Description
Tshwane University of Technology (TUT) is a higher education institution located in Pretoria, South Africa. It was established in 2004 through the merger of three separate institutions. TUT offers a wide range of undergraduate and postgraduate programs across various fields of study, including engineering, business, science, arts, and technology. The university is known for its focus on practical and career-oriented education, providing students with the necessary skills and knowledge to succeed in their chosen professions. TUT also has a strong emphasis on research and innovation, contributing to the development of new technologies and solutions. With a diverse student body and state-of-the-art facilities, Tshwane University of Technology is committed to providing quality education and making a positive impact on society.

This page includes information from the South African Qualifications Authority (SAQA) . Builtneat Pty Ltd trading as Study Start, has modified all or some of this information. SAQA has not approved, endorsed, or tested these modifications.