ICT50220 Diploma of Information Technology
ICT50220 - Diploma of Information Technology
This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function.
Individuals in these roles carry out moderately complex tasks in a specialist field, working independently, as part of a team or leading a deliverable with others. They may apply their skills across a wide range of industries, business functions and departments, or as a business owner (sole trader/contractor).
The skills required for these roles may include, but are not restricted to:
- advanced networking: configuring and managing virtual computing environments, and security within ICT networks
- advanced programming: applying intermediate and advanced programming skills, managing data and building advanced user interfaces to manage organisational requirements
- back end web development: developing and maintaining website information architecture and data
- business analysis: designing and implementing technical requirements, quality assurance processes and contingency plans for businesses
- cloud architecture: developing, improving and designing cloud infrastructure, including disaster recovery plans
- cloud engineering: building, implementing and managing cloud infrastructure and virtual networks
- cyber security: protecting sensitive data and information through security architecture and developing disaster recovery and contingency plans
- database and data management: creating, designing and monitoring systems that store data and optimise organisational knowledge management
- front end web development: designing dynamic and complex websites, user experience solutions and documents using extensible mark-up languages
- game art and design: creating complex 2D and 3D modelling and animation software through scripts and storyboards
- game programming: creating complex 2D and 3D interactive games and media, building graphical user interfaces and applying artificial intelligence in game development
- systems administration: reviewing maintenance procedures and support to help troubleshoot system applications
- systems analysis: modelling and testing data objects, data processes and preferred ICT system solutions
- telecommunications network engineering: managing logistics, organisational specifications, regulations and legislative requirements across network projects.
https://training.gov.au/Training/Details/ICT50220
The qualification will be delivered over 78 weeks or 1.5 years. This covers 6 x 10 weeks terms and 18 weeks of holidays.
Enrollments dates
Jan 2021, April 2021, July 2021, Sept 2021
Units. There are 20 units required to be completed, 6 core and 14 elective
Core
BSBCRT501 Originate and develop concepts
BSBXCS402 Promote workplace cyber security awareness and best practices
BSBXTW401 Lead and facilitate a team
ICTICT517 Match ICT needs with the strategic direction of the organisation
ICTICT532 Apply IP, ethics and privacy policies in ICT environments
ICTSAS527 Manage client problems
Specialisations
- ICT50220 Diploma of Information Technology (Cyber Security)
- ICT50220 Diploma of Information Technology (Telecommunications Network Engineering)
Contact:
Glossary
- Anti-virus Software
- A software program designed to protect your computer or network against computer viruses
- App
- Also referred to as a mobile application, an app is a term for software that is commonly used for a smartphone or tablet.
- Attachment
- A file sent with an email message
- Authenticator App
- An app used to confirm the identity of a computer user to allow access and control used within multifactor authentication
- Biometrics
- The identification of a person by the measurement of their biological features, e.g. fingerprint or voice.
- Bitcoin
- A digital currency (cryptocurrency), used on the Internet for various services.
- Brute Force Attack
- A type of attack that generates millions of character combinations per second. They are effective against short or single word passwords
- Cyber Criminal
- Any individual who illegally hacks a computer system to damage or steal information.
- Data
- Data is information including files, text, numbers, pictures, sound or videos.
- Default Settings
- Something a computer, operating system or program has predetermined for the user
- Dictionary Attacks
- A type of attack that generates millions of potential attempts based on rules and databases. These are effective against less complex and commonly used passphrases.
- Encryption
- The process of making data unreadable by others for the purpose of preventing others from gaining access to its contents.
- Network
- A collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data.
- Operating System
- Software installed on a computer's hard drive that enables computer hardware to communicate with and run computer programs.
- Software
- Commonly referred to as programs, collection of instructions that enable the user to interact with a computer, its hardware or perform tasks.
- Spyware
- A program designed to gather information about a user's activity secretly – usually installed without a user’s knowledge when they click a link.
- The Cloud
- A network of remote servers that provide massive, distributed storage and processing power.
- Token
- A physical device that can usually fit on a keyring, which generates a security code for use with networks or software applications.
- Trojans
- A type of malware that is often disguised as legitimate software, used by cyber criminals to gain access to users' systems.
- Virus
- A program designed to cause damage, steal personal information, modify data, send e-mail, display messages or a combination of these actions