Diploma in Information Technology
The Diploma in Information Technology (DIT) further builds upon the skillsets of the Foundation Diploma in Infocomm Technology and can be taken on its own where entry requirements are met. It prepares one for a career in IT across a wide spectrum of industries and is suitable for those who wish to upskill themselves in the workplace, or as a progression pathway to higher education.
Upon completion of the DIT, students will have the skillsets and requisite base knowledge to progress to the Higher Diploma in Computer Science and may progress to degree programmes at the various UK, US, or Australian Universities and may be eligible to gain advanced standings for certain course selections. Students are encouraged to bring their own laptop for practicing laboratory practical exercises.
Key Facts
Modules
-
Information Systems Modelling & Design
-
Maths for Computing
-
Software Development
-
Computer Systems & Networks
-
This module develops the skills and techniques required for creating an overall plan for the design of software, design of functional specifications based on user and business requirements incorporating various controls, functionality, and interoperability of different elements into designing an information system, modeling which describes the overall architecture in software, databases, hardware, and third-party frameworks that the software will use or interact with. It also covers some of the key legal, social, ethical, and professional issues relating to information systems development.
-
This module introduces the basic concept of quantitative approaches to computing mathematics. This module will help students to attain essential knowledge in mathematical concepts and skills that are required for the study and application of computer science.
-
This module provides students with technical skills, communication skills, to develop applications by coding, testing, debugging, documenting, and reviewing in accordance with object-oriented programming standards for development and security. The module focuses on programming fundamentals such as introduction to computers and object-oriented programming, basic computation, variables, control structures, arrays, and the procedural programming methodology. It then progresses to introduce the object-oriented programming concepts of objects, classes, and inheritance.
-
This module focuses on fundamental computer architecture, network fundamentals, protocols, and models. This module introduces the categories of the network functions, evaluates, and justifies networks, and device performance using the OSI model and the most widely used TCP/IP protocol suite.
-
This module provides students with practical skills to examine, translate complex software ideas and concepts into a web application and establish key design principles and methodologies. Students can select and use appropriate tools and techniques with which to design, build, implement, and test a web application. This module also provides the opportunity to gain work skills to be able to provide professional documentation for the web pages produced.
-
This module provides students with a detailed and essential foundation in cloud computing. Cloud computing is the up and rising technology that will be considered critical in today’s business world. This introductory module to cloud computing describes and explains fundamental aspects of cloud computing concepts, models, technologies, and applications.
-
This module introduces students to design security architectures and controls; either introducing security principles into the design of architectures to mitigate the risks posed by new technologies and business practices, or the actual design and specification of applicable security components, along with the incidental control measures, to meet defined business security needs.
-
This module introduces students to design security architectures and controls; either introducing security principles into the design of architectures to mitigate the risks posed by new technologies and business practices, or the actual design and specification of applicable security components, along with the incidental control measures, to meet defined business security needs.