This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have significant experience in specialist technical skills, or managerial business and people management skills.
Individuals in these roles carry out complex tasks in a specialist field, working independently, leading a team or a strategic direction of a business. They apply their skills across a wide range of industries and business functions, or as a business owner (sole trader/contractor).
The skills required for these roles may include, but are not restricted to:
- advanced data management information: creating, designing and monitoring complex systems that store data, and optimising organisational knowledge management
- cyber security: protecting sensitive data and information through security architecture, and developing disaster recovery and contingency plans
- full stack web development: building advanced user interfaces, developing representational state transfer application program interfaces (REST APIs) and designing user experience solutions
- further programming: applying advanced ICT languages to maintain security and manage data
- IT strategy and organisational development: managing and communicating strategic ICT business solutions
- systems development and analysis: modelling and testing data objects, data processes and preferred ICT system solutions
- telecommunications network engineering: managing logistics, organisational specifications, regulations and legislative requirements across network projects.
Licensing, legislative, regulatory or certification considerations
No licensing, legislative or certification requirements apply to this qualification at the time of publication.
The course is delivered of 78 weeks with 6 x 10 weeks terms and 18 weeks of holidays
Total number of units = 16
6 core units plus 10 elective units
BSBCRT611 Apply critical thinking for complex problem solving
BSBTWK502 Manage team effectiveness
BSBXCS402 Promote workplace cyber security awareness and best practices
ICTICT608 Interact with clients on a business level
ICTICT618 Manage IP, ethics and privacy in ICT environments
ICTSAD609 Plan and monitor business analysis activities in an ICT environment
- ICT60220 Advanced Diploma of Information Technology (Cyber Security)
- ICT60220 Advanced Diploma of Information Technology (Telecommunications Network Engineering)
Always contact your trainer at first ( their contact details have previously bee sent to via your SMIC email account) or you can contact SMIC for support via: Email email@example.com Telephone 9744-1356
- Anti-virus Software
- A software program designed to protect your computer or network against computer viruses
- Also referred to as a mobile application, an app is a term for software that is commonly used for a smartphone or tablet.
- A file sent with an email message
- Authenticator App
- An app used to confirm the identity of a computer user to allow access and control used within multifactor authentication
- The identification of a person by the measurement of their biological features, e.g. fingerprint or voice.
- A digital currency (cryptocurrency), used on the Internet for various services.
- Brute Force Attack
- A type of attack that generates millions of character combinations per second. They are effective against short or single word passwords
- Cyber Criminal
- Any individual who illegally hacks a computer system to damage or steal information.
- Data is information including files, text, numbers, pictures, sound or videos.
- Default Settings
- Something a computer, operating system or program has predetermined for the user
- Dictionary Attacks
- A type of attack that generates millions of potential attempts based on rules and databases. These are effective against less complex and commonly used passphrases.
- The process of making data unreadable by others for the purpose of preventing others from gaining access to its contents.
- A collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data.
- Operating System
- Software installed on a computer's hard drive that enables computer hardware to communicate with and run computer programs.
- Commonly referred to as programs, collection of instructions that enable the user to interact with a computer, its hardware or perform tasks.
- A program designed to gather information about a user's activity secretly – usually installed without a user’s knowledge when they click a link.
- The Cloud
- A network of remote servers that provide massive, distributed storage and processing power.
- A physical device that can usually fit on a keyring, which generates a security code for use with networks or software applications.
- A type of malware that is often disguised as legitimate software, used by cyber criminals to gain access to users' systems.
- A program designed to cause damage, steal personal information, modify data, send e-mail, display messages or a combination of these actions