Accelerated Bachelor of Business Admin - IT

If you put the entire world’s data produced in a year* on CD and piled them on top of each other, the stack would stretch from Earth to the Moon five times! The Information Technology (IT) that allows people and business to understand data is constantly evolving to cope with its ever-increasing volume.

But IT for business is not only about machines and hardware; it’s also about the people that rely on it to deliver the products and services they offer.

Gain an essential foundation in business and the required skills in all aspects of Information Technology from network security and operating systems, algebra and statistics to eCommerce and computer forensics. Accredited by SMC University, this degree is a standalone qualification or may be used as a study pathway to internationally accredited MBA study. The future is yours.

*Based on estimates for 2012.

 

minimum 8 months, maximum 2 and a half years.

Presentation & Communication

By examining the qualities of a dynamic presentation, this course provides students with the required skills to produce clear, concise and persuasive written communication to help enhance your competitive advantage. Topics include reports, proposals, tenders, letters, commercial correspondence and effective reports. The course aims to improve confidence and will examine the theoretical and practical concepts and problems of public speaking.

Management & Business

The ability to identify the best approach to business and management in any environment will give you an upper hand in any organisation. After first understanding the basic concepts of managing, delegating, decision making, management, communication planning and control in an organisation, you will explore not only the management process but the different approaches to it and the external factors influencing the growth of a business.

Entrepreneurship

Learn the theory and practice of managing and owning your own business, problems of running a family business and how new businesses are started. This course explores the entire process of creating and running operations, from planning to execution. It will also give you a thorough perspective of the process of building and presenting business plans.

Key Concepts in Algebra

This course teaches you how to apply algebra to real life. The course deals with the key concepts of algebra, including linear equations, graphs, inequalities, polynomials and functions. At the end of the course, you will be able to understand and solve mathematical problems involving algebra in the context in which they occur in the world of IT and online Networking.

Elementary Statistics

The importance of statistics in business is in assisting business planning. It is useful for reviewing the performance of processes and is vital for predicting the future of a business. This course aims to help you learn from collected data and draw a conclusion while being able to project, record and forecast certain goals or happenings, and by this also prevent certain events that might hinder growth.

Operating Systems: UNIX/Linux

UNIX based operating systems have shaped the software industry. Its programming tools, easy networking and the simple way it creates databases and stores data make it a compulsory object of study. This course will teach fundamental concepts of UNIX/Linux-based operating systems and focus on system administration, hardware configuration, user management and core networking protocols.

Operating Systems: Windows Server

Servers are more powerful versions of desktop computers, designed to efficiently handle corporate networking, Internet/Intranet hosting, databases, enterprise-scale messaging and similar functions. Microsoft Windows Server is one of the leading server interfaces used today and this course teaches you Microsoft Windows Server installation and configuration and administration in a networked environment. These will allow you to understand operation and administration of Windows Server environments and what security issues you may need to deal with.

Networking Basics

A network is the connection of one or many computers with different hardware and software which exchange data. This course will familiarise you with the OSI model in order to gain detailed insight into the application, transport, network and datalink layer of networks. This will help build understanding of how networks are built and how computers communicate with each other, allowing students to better understand IT network security issues and countermeasures.

Systems Design and Analysis

Databases must be assigned automatic workflows in order to process information. The foundation for the functionality of these systems is the correct system architecture. This course introduces you to the analysis, design, implementation and operation of information systems in a security context. It addresses various approaches to analysing information systems and the steps necessary to gather system requirements and to model business needs.

Introduction to Electronic Commerce

One of the fastest growing ways of doing business is eCommerce. In this sector, trade takes place online and is conducted over electronic systems. As this industry is relatively young and still developing, many threats come up and must be eliminated. This course examines a management approach to defining and implementing eCommerce solutions including management and regulatory challenges. Students will learn to explore strategies to address online fraud, payment and mobile application challenges in any eCommerce business.

IT Security Essentials I

Along with evolving computer systems, threats to these systems also evolve. Unauthorised network access, also known as hacking, is one of the major threats as far as Internet safety is concerned. Network security consists of the provisions made in a computer network infrastructure to protect the network and its accessible resources from unauthorised users. IT Security Essentials I covers the management of core IT security challenges such as attack vectors, detection and prevention techniques, cryptography, firewalls, intrusion detection systems, security policies, risk management and incident response.

IT Security Essentials II

This course is the continuation of the IT Security Essentials I with an in-depth study of the use of various cryptographic techniques for securing data from unauthorised access. Students learn the practical use of algorithms for the encryption of data across various application scenarios along with the algorithms used for symmetric ciphers, asymmetric ciphers, and cryptographic data integrity.

Advanced Network Security

This course is the last volume in our IT Security Essentials set of courses. Advanced Network Security examines the essential applications necessary to secure a network from intrusion including firewalls, bastion hosts, proxy servers and honeypots. As a graduate, you will be able to introduce advanced countermeasures to computer networks and to test them for a wide range of vulnerabilities.

Security Policy Design and Administration

Every company has unique security requirements. IT Security also includes planning measures in order to manage a company's security arrangements that have to be adjusted to the changing environment and a company's growing needs. After completing this course, you will be able to define security policies, security management strategies and plans for emergency situations, all according to each company’s individual needs.

Computer Forensics

Today, important documents are signed digitally and saved on devices as evidence. These digital documents are as important and legally binding as paper documents. In case of fraud or similar events, it is very easy to get rid of many files by simply deleting the containing information.  This course addresses the importance of computer forensics and the procedures and responsibilities related to obtaining and recovering digital evidence through the analysis of computers and networks. The course aims to provide you with a deep insight into which data can be valuable and how it can be acquired through forensic processes.