ICT50220 - Diploma of Information Technology 

This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have established specialised skills in a technical ICT function.

Individuals in these roles carry out moderately complex tasks in a specialist field, working independently, as part of a team or leading a deliverable with others. They may apply their skills across a wide range of industries, business functions and departments, or as a business owner (sole trader/contractor).

The skills required for these roles may include, but are not restricted to:

  • advanced networking: configuring and managing virtual computing environments, and security within ICT networks
  • advanced programming: applying intermediate and advanced programming skills, managing data and building advanced user interfaces to manage organisational requirements
  • back end web development: developing and maintaining website information architecture and data
  • business analysis: designing and implementing technical requirements, quality assurance processes and contingency plans for businesses
  • cloud architecture: developing, improving and designing cloud infrastructure, including disaster recovery plans
  • cloud engineering: building, implementing and managing cloud infrastructure and virtual networks
  • cyber security: protecting sensitive data and information through security architecture and developing disaster recovery and contingency plans
  • database and data management: creating, designing and monitoring systems that store data and optimise organisational knowledge management
  • front end web development: designing dynamic and complex websites, user experience solutions and documents using extensible mark-up languages
  • game art and design: creating complex 2D and 3D modelling and animation software through scripts and storyboards
  • game programming: creating complex 2D and 3D interactive games and media, building graphical user interfaces and applying artificial intelligence in game development
  • systems administration: reviewing maintenance procedures and support to help troubleshoot system applications
  • systems analysis: modelling and testing data objects, data processes and preferred ICT system solutions
  • telecommunications network engineering: managing logistics, organisational specifications, regulations and legislative requirements across network projects.

https://training.gov.au/Training/Details/ICT50220

Duration

The qualification will be delivered over 78 weeks or 1.5 years. This covers 6 x 10 weeks terms and 18 weeks of holidays.

Enrollments dates

Jan 2021, April 2021, July 2021, Sept 2021

Units. There are 20 units required to be completed, 6 core and 14 elective

Core

BSBCRT501 Originate and develop concepts

BSBXCS402 Promote workplace cyber security awareness and best practices

BSBXTW401 Lead and facilitate a team

ICTICT517 Match ICT needs with the strategic direction of the organisation

ICTICT532 Apply IP, ethics and privacy policies in ICT environments

ICTSAS527 Manage client problems

Specialisations
  • ICT50220 Diploma of Information Technology (Cyber Security)
  • ICT50220 Diploma of Information Technology (Telecommunications Network Engineering)

Contact:
Always contact your trainer at first ( their contact details have previously bee sent to via your SMIC email account) or you can contact SMIC for support via: Email info@smic.edu.au Telephone 9744-1356

Good sources of information is Australian Cyber Security Centre  https://www.cyber.gov.au/ 

Glossary

Anti-virus Software
A software program designed to protect your computer or network against computer viruses
App
Also referred to as a mobile application, an app is a term for software that is commonly used for a smartphone or tablet.
Attachment
A file sent with an email message
Authenticator App
An app used to confirm the identity of a computer user to allow access and control used within multifactor authentication
Biometrics
The identification of a person by the measurement of their biological features, e.g. fingerprint or voice.
Bitcoin
A digital currency (cryptocurrency), used on the Internet for various services.
Brute Force Attack
A type of attack that generates millions of character combinations per second. They are effective against short or single word passwords
Cyber Criminal
Any individual who illegally hacks a computer system to damage or steal information.
Data
Data is information including files, text, numbers, pictures, sound or videos.
Default Settings
Something a computer, operating system or program has predetermined for the user
Dictionary Attacks
A type of attack that generates millions of potential attempts based on rules and databases. These are effective against less complex and commonly used passphrases.
Encryption
The process of making data unreadable by others for the purpose of preventing others from gaining access to its contents.
Network
A collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data.
Operating System
Software installed on a computer's hard drive that enables computer hardware to communicate with and run computer programs.
Software
Commonly referred to as programs, collection of instructions that enable the user to interact with a computer, its hardware or perform tasks.
Spyware
A program designed to gather information about a user's activity secretly – usually installed without a user’s knowledge when they click a link.
The Cloud
A network of remote servers that provide massive, distributed storage and processing power.
Token
A physical device that can usually fit on a keyring, which generates a security code for use with networks or software applications.
Trojans
A type of malware that is often disguised as legitimate software, used by cyber criminals to gain access to users' systems.
Virus
A program designed to cause damage, steal personal information, modify data, send e-mail, display messages or a combination of these actions