This course examines the fundamental concepts that comprise the information system (IS) functions in business and society, with emphasis on systems analysis & design. Together, we will study, discuss, analyze, and perform various exercises that bring into focus the myriad issues related to this most important field of study that affects virtually all aspects of business and society.

This course aims to identify, assess and evaluate risk to enable the execution of the enterprise risk management strategy; develop and implement risk responses to ensure that risk factors and events are addressed in a cost-effective manner and in line with business objectives; monitor risk and communicate information to the relevant stakeholders to ensure the continued effectiveness of the enterprise’s risk management strategy; design and implement information systems controls in alignment with the organization’s risk appetite and tolerance levels to support business objectives; monitor and maintain information systems controls to ensure they function effectively and efficiently; and achieve professional qualification as Certified in Risk and Information Systems Control (CRISC).


Embark on a transformative journey with this course in Information Technology Planning. In this course, you wll learn about th intricate work of Information Systems in Business, uncover the potentials of Internet and Web technologies, and learn the essential strategies for Building Successful Information Systems. With a focus on Supporting Decisions and Processes, this comprehensive exploration promises to equip you with the tools and insights needed to thrive in the ever-evolving realm of technology and business.

This course presents an in-depth understanding of operating system (OS) design concepts, the significance of the CPU in computing, and the evolution of modern OSs. With a focus on Microsoft, Linux, and macOS operating systems, students will delve into the intricacies of each system, fostering a comparative learning experience.

You already know networking but are new to Azure and AWS, or maybe you have used these cloud providers but want to understand their networking services better. This course will give you an overview of the Azure and AWS landscape and how it relates to networking in the cloud

This course is designed to teach entry to mid-level security practitioners how to engage all functional levels within the enterprise to deliver information system security. To this end, the course addresses a range of topics, each of which is vital to securing the modern enterprise. These topics include inter alia plans and policies, enterprise roles, security metrics, risk management, standards and regulations, physical security, and business continuity. Each piece of the puzzle must be in place for the enterprise to achieve its security goals; adversaries will invariably find and exploit weak links.

Accessibility

Background Colour Background Colour

Font Face Font Face

Font Kerning Font Kerning

Font Size Font Size

1

Image Visibility Image Visibility

Letter Spacing Letter Spacing

0

Line Height Line Height

1.2

Link Highlight Link Highlight

Text Colour Text Colour