AIB - Học Viện Kinh doanh Quốc Tế

Level 5 Diploma in Computing (with Business Management) (L5DC BM) – Training content (Part 2)

5. Syllabus

5.6. Database Design and Development

Title Database Design and Development
RQF code: D/503/4787
Credits 20
Level 5

 

Guided Learning Hours 60 hours Total Qualification Time 200 hours 

 

Learning Outcomes;
The Learner will:
Assessment Criteria;
The Learner can:
1. Understand the enterprise
application of database systems
1.1 Summarise the common use of distributed database management systems
1.2 Explain the meaning of the term disributed database management system
1.3 Describe the components of a disributed database management system
1.4 Summarise the common use of data warehouses
1.5 Explain the meaning of the term data warehouse
1.6 Describe the structure of a data warehouse
2. Understand how to enhance the design of and further develop a
database system
2.1 Describe how tables that contain redundant data can suffer from update anomalies
2.2 Explain how to overcome update anomalies using normalisation
2.3 Describe how to retrieve data from one or more tables using SQL
3. Be able to enhance a logical
database design
3.1 Check the tables are well-structured using normalisation
3.2 Define the integrity constraints on the tables
4. Be able to develop a physical database design 4.1 Map a logical database design to a physical database design
4.2 Design tables for a target DBMS
4.3 Design a representation of derived data
4.4 Design integrity constraints for the target DBMS
4.5 Denormalise tables where appropriate
5. Be able to enhance a database system using SQL 5.1 Apply integrity constraints
5.2 Retrieve data from one or more tables using join
5.3 Retrieve data from one or more tables using sub-queries

 

Syllabus Content
Topic Course coverage
Key Concepts in
Databases and
Database Management
  • Review of key material from Level 4 databases Unit
  • Common uses of databases
  • Types of databases
  • Overview of database development

Learning Outcome: All

Enhancing Design 1
  • Introduction to normalisation
  • The concept of functional dependency
  • Data redundancy and update anomalies
  • Overcoming anomalies with normalisation

Learning Outcome: 2

Enhancing Design 2
  • Deriving a set of relations from a conceptual data model
  • Validating relations using normalisation
  • Integrity constraints on tables

Learning Outcome: 3 

Data Retrieval 1
  • Table and view structure in a relational database
  • Data types
  • Null values
  • Retrieving data using SQL

Learning Outcome: 2 

Data Retrieval 2
  • Referential integrity in relational databases
  • Types of joins
  • Retrieving data using joins
  • Retrieving data using sub-queries

Learning Outcome: 5

Physical Design 1
  • The purpose of physical design
  • Mapping the logical database design to a physical database design
  • Designing tables for the target DBMS

Learning outcomes: 4

Physical Design 2
  • The concept of derived data
  • Designing a representation of derived data

Learning outcome: 4

Physical Design 3
  • Types of constraints
  • Designing integrity constraints for the target DBMS

Learning outcome: 3, 4 & 5

Physical Design 4
  • Understanding transactions
  • Denormalisation
  • Improving performance
  • Estimating the size of the database

Learning Outcome: 4

Distributed
Databases
  • The need for distributed databases
  • Components of distributed databases
  • Advantages and disadvantages of distributed databases
  • Homogenous and Heterogeneous distribution
  • Distributed Database Design

Learning Outcomes: 1

Data Warehouses
  • The need for business intelligence and the concept of the data warehouse
  • The difference between Online Transaction Processing (OLTP) systems and data warehousing
  • The architecture and main components of a data warehouse

Learning Outcome: 1

Summary
  • Summary of Unit, linking units to objectives and to each other
  • Clarification of material and related issues as identified by students

Learning Outcomes: All

 

Related National Occupational Standards (NOS) 
Sector Subject Area: IT and Telecoms
Related NOS: ESKITP4024 P1-5 – Contribute, under supervision, to the preparation of a data analysis assignment;
ESKITP4024 P6-9– Assist in the development of data analysis models;
ESKITP4024 P10-14– Manage the outcomes from the data analysis assignment;
ESKITP4054 P5-9– Manage, under supervision, the maintenance of data design
assignments;
ESKITP4054 P10-13– Provide others, when requested, with specified information relating to data design activities;
ESKITP4055 P1-5– Select and implement appropriate data design processes;
ESKITP4055 P6-10 – Manage the progress of data design assignments;
ESKITP4055 P11-15 – Review the effectiveness of data design deliverables.

 

Assessment Type 
Global Assignment (100%)
See also Section 3 above

 

5.7. Dynamic Websites

Title Dynamic Websites
RQF code: Y/503/4786
Credits 20
Level 5

 

Guided Learning Hours 60 hours Total Qualification Time 200 hours 

 

Learning Outcomes;
The Learner will:
Assessment Criteria;
The Learner can:
1. Understand the various tools and
techniques used for Web
Application development
1.1 Define and explain web applications and their
functions
1.2 Identify and evaluate appropriate web application development tools for a given scenario
1.3 Identify and evaluate appropriate web application development techniques for a given scenario
2. Be able to develop data-driven websites 2.1 Design and code a web-based user interface
appropriate to a given problem
2.2 Design and build a database which interacts
with a web page
2.3 Create scripts to facilitate data transfer
between a database and a web page.
2.4 Evaluate the functionality of a database-driven
website in the context of a given problem
3. Be able to apply the various tools and techniques used to build datadriven websites 3.1 Select appropriate web development tools for
a given scenario
3.2 Use a development tool to develop a dynamic
web solution which addresses a given scenario
4. Understand the functions of web services 4.1 Define and explain a range of web services
(e.g XML, RSS, SOAP).
4.2 Evaluate and select the optimal web service
solution for a given problem
4.3 Appraise the potential business benefits of web services
5. Be able to create and deploy web services 5.1 Use one or more web services to build a dynamic website which addresses a given business problem
5.2 Evaluate a dynamic website which utilises web
services in the context of business objectives

 

Syllabus Content
Topic Course coverage
Introduction to The
Unit
  • Introduction to the unit
  • Web applications and their functions
  • Web development tools and frameworks
  • Client-server applications
  • Static -v- dynamic websites
  • Web service solutions

Learning Outcome: 1

Designing and
Coding A Website
  • Considerations (colours, fonts, images, file sizes, content)
  • CSS3 and Semantic structure
  • HTML5
  • Responsive design (layout, flexible images and media – dynamic resizing or CSS)
  • Templates (bootstrap)

Learning Outcome: 2

Design and
Developing for
Mobile Websites
  • CCS3
  • Flexible layouts
  • Resizing and adjustments
  • Code to redirect mobile users
  • Location map
  • Web form

Learning Outcome: 2

Design and Build a
Database (1)
  • PHP (source code and HTML code, creating tables,
    manipulating tables and querying databases)

Learning Outcome: 2

Design and Build A
Database (2)
  • MySQL (what it is, database queries, data types and ranges, SQL statements)
  • Ruby (what it is, how it can be used, simple coding, basic templates, simple web application)

Learning Outcome: 2

Using Scripts (1)
  • Interactive elements (consumer suggestions, displays)
  • Java/jQuery (loops, arrays, arithmetic operations, strings)

Learning outcomes: 2

Using Scripts (2)
  • jQuery for mobile devices (HTML 5, CCS3, JavaScript and AJAX)
  • XML (difference with HTML and examples linked to carrying data)
    • JSON

Learning outcome: 2

Web Development
Tools
  • Cookies and Sessions
  • Ajax Database Development

Learning outcome: 3

Mobile Application
Development
Integration
  • Developing mobile applications
  • DOM,
  • XSLT (content delivered to mobile devices)
  • API
  • Links to mobile applications

Learning Outcome: 3

Web Services
  • Examples – WSDL, SOAP
  • Streaming (RSS)
  • Web API further

Learning Outcomes: 4

Building A Dynamic
Website
  • Consideration of security issues (cyber security/SSL and encryption)
  • Integration
  • Testing (google mobile and HTML code)

Learning Outcome: 5

Evaluating Websites
  • Use of web application
  • Functionality of data driven website
  • Web service solutions
  • Business benefits of web services

Learning Outcomes: 5

 

Related National Occupational Standards (NOS) 
Sector Subject Area: IT and Telecoms
Related NOS: ESKITP4074 P1-4 – Prepare, under supervision, for system/solution/service design activities;
ESKITP4074 P5-8 – Assist with the design of system/solution/service design;
ESKITP4074 P9-11 – Monitor the progress of system/solution/service design activities;
ESKITP5015v2 P4-7- Initiate systems development activities;
ESKITP5015v2 P8-12- Manage systems development activities;
ESKITP5022v2 – Perform software development activities

 

Assessment Type 
Global Assignment (100%)
See also Section 3 above

 

5.8. Ethical Hacking and Information Security Assessments 

Title Ethical Hacking and Information Security Assessments
RQF code: A/618/1452
Credits 20
Level 5

 

Guided Learning Hours 80 hours Total Qualification Time 200 hours 

 

Learning Outcomes;
The Learner will:
Assessment Criteria;
The Learner can:
1. Assess ethical and legal requirements of security assessment. 1.1 Evaluate the current security trends
1.2 Describe the elements of information security
1.3 Explain information security threats and attack
vectors
1.4 Describe hacking concepts, types, and phases
1.6 Explain information security controls
1.6 Explain the penetration testing process
1.7 Discuss information security Acts and Laws
2. Understand different types of footprinting, tools and countermeasures 2.1 Describe footprinting concepts
2.2 Perform footprinting through multiple platforms
including; search engines, web services, social
networking sites, website, email and competitive
intelligence
2.3 Perform Whois, DNS, network and social
engineering footprinting
2.4 Use different footprinting tools and apply best
practice
2.5 Perform footprinting penetration testing
3. Understand different types of network scanning techniques and enumerations countermeasures. 3.1 Describe the network scanning concepts
3.2 Use various scanning tools and techniques to
perform scanning penetration testing and to check
for live systems and open ports
3.3 Scan beyond intrusion detection system (IDS) and firewalls
3.4 Perform banner grabbing
3.5 Draw network diagrams using network discovery
tools
4. Analyse different
enumerations techniques and different vulnerabilities
4.1 Describe the enumeration concepts
4.2 Explain different techniques for NetBIOS, SNMP,
LDAP, NTP, SMTP AND DNS enumeration
4.3 Explain other enumerations such as IPsec, VoIP,
RPC, and Linux/Unix enumeration
4.4 Understand vulnerability research and vulnerability classification
4.5 Describe different characteristics of good
vulnerability assessment solutions
4.6 Explain different types of vulnerability assessment
tools
5. Understand the system
hacking methodology
5.1 Describe the CEH Hacking Methodology
5.2 Explain different techniques to gain access to the
system and apply privilege escalation
5.3 Explain different techniques to create and maintain remote access to the system
5.4 Describe different types of rootkits
5.5. Explain steganography and steganalysis
techniques
5.6 Apply different techniques to hide the evidence of
compromise
5.7 Perform system hacking penetration testing
6. Compare and contrast
different types of malware
6.1 Describe the concepts of malware and malware
propagation techniques
6.2 Describe the concepts of Viruses, Trojans and
Worms, their types, and how they infect files /
systems
6.3 Perform malware analysis and explain different
techniques to detect malware
6.4 Perform malware penetration testing and apply
malware countermeasures
7. Assess various packet
sniffing techniques
7.1 Describe the packet sniffing concepts
7.2 Explain different MAC and DHCP attacks
7.3 Describe ARP and DNS poisoning
7.4 Use different packet sniffing tools and apply packet sniffing countermeasures
7.5 Apply various techniques to detect packet sniffing
7.6 Perform packet sniffing penetration testing
8. Assess various social
engineering and Dos/DDoS attack techniques.
8.1 Describe social engineering concepts and
techniques to perform it.
8.2 Describe identity theft and perform impersonation
on social networking sites
8.3 Apply social engineering and identify theft
countermeasures
8.4 Perform social engineering and DoS/DDoS
penetration testing
8.5 Describe the DoS/DDoS concepts, explain different DoS/DDoS attack tools and the techniques used to perform DoS/DoS.
8.6. Apply best practices to mitigate DoS/DDoS attacks

 

Syllabus Content
Topic Course coverage
1. Introduction to
Ethical Hacking
  • Information security
  • Hacking, Ethical Hacking concepts and penetration testing concepts
  • Information Security Controls

Learning Outcome: 1

2. Footprinting and
Reconnaissance
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Learning Outcome: 2

3. Scanning
Networks
  • Network Scanning Concepts
  • Network Scanning Techniques
  • Network Scanning Pen Testing
  • Network Scanning Beyond IDS and Firewall

Learning Outcome: 3

4. Enumeration
  • Enumeration Concepts
  • Enumeration Countermeasures
  • Enumeration Pen Testing

Learning Outcome: 4

5. Vulnerability
Analysis
  • Vulnerability Assessment Concepts
  • Assessment Solutions
  • Scoring Systems
  • Assessment Tools
  • Assessment Reports

Learning Outcome: 4

6. System Hacking –
Part One
  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges

Learning outcomes: 5 

7. System Hacking –
Part Two
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Learning outcome: 5

8. Malware Threats –
Part One
  • Malware Concepts
  • Trojan

Learning outcome: 6

9. Malware Threats –
Part Two
  • Virus and Worm
  • Malware Analysis
  • Countermeasures
  • Malware Penetration Testing

Learning Outcome: 6

10. Packet Sniffing
  • Packet Sniffing Concepts
  • Packet Sniffing Techniques

Learning Outcomes: 7

11. Social
Engineering
  • Social Engineering Concepts
  • Social Engineering Techniques

Learning Outcome: 8

12. Denial-of-Service
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques

Learning Outcomes: 8

 

Assessment Type 
Global Assignment (100%)
See also Section 3 above

 

5.9. Information Systems Analysis

Title Information Systems Analysis
RQF code: Y/503/4769
Credits 20
Level 5

 

Guided Learning Hours 63 hours (incl. 3-hour exam) Total Qualification Time 200 hours

 

Learning Outcomes;
The Learner will:
Assessment Criteria;
The Learner can:
1. Understand soft and hard
approaches to the analysis of
information systems
1.1 Explain the key aspects of Soft Systems
Methodology (SSM) and related approaches
1.2 Explain the key aspects of Structured Systems Analysis and Design Methodology (SSADM) and related approaches
1.3 Identify business situations where a soft or hard systems analysis might be appropriate
1.4 Explain combined soft/hard frameworks (such as Multiview).
2. Understand the techniques
associated with requirements
capture
2.1 Explain and apply stakeholder analysis techniques
2.2 Explain and apply CATWOE
3. Understand the different viewpoints associated with IS
methodologies
3.1 Explain object-oriented IS methodologies
3.2 Explain organisation-oriented IS methodologies
3.3 Explain process-oriented IS methodologies
3.4 Explain people-oriented IS methodologies
3.5 Evaluate IS methodologies of different types in the context of a business scenario
4. Be able to apply various analytical techniques for understanding a complex organisational environment 4.1 Evaluate a knowledge-based view of organisations
4.2 Define and apply techniques for analysing the business environment (such as PEST and SWOT)
5. Understand the relationship between the economic, social, political and technical factors influencing a business problem 5.1 Analyse the economic, social, political and technical aspects of a business systems problem
5.2 Evaluate the different aspects of a business problem in the context of potential solutions
6. Understand and apply the
principles of interface design and the requirements and characteristics of users that motivate these
6.1 Design or evaluate an interface with regard to the characteristics of its users
6.2 Explain the requirements of computer users and how good design can address these

 

Syllabus Content
Topic Course coverage
Introduction to
Information Systems
Analysis
  • An introduction to the Unit
  • Define and explain the term information system
  • Identify types and examples of information systems
  • Discuss Information systems analysis in the context of the SDLC
  • Define and explain the abbreviation SDLC
  • Define and explain analysis and requirements capture
  • Discuss the role of analysis and requirements capture in specific contexts
  • Define the term methodology
  • Determine the requirement for different methodologies
  • Present an overview of Information System Analysis and Design methodologies
  • Research and discuss case studies

Learning Outcome: 1

Hard Approaches to
the Analysis of
Information Systems
  • Define and explain the term hard approach to systems analysis
  • Identify examples of hard approach methodologies
  • Identify business situations where a hard approach to systems analysis might be appropriate
  • Define and explain the abbreviation SSADM
  • Identify and discuss the advantages of SSADM
  • Identify and discuss the disadvantages of SSADM
  • Define and explain the abbreviation DFD
  • Define and explain terminology associated with DFDs
  • Illustrate the use of DFDs
  • Construct DFDs
  • Provide solutions to business problems using DFDs

Learning Outcome: 1

Soft Approaches to
the Analysis of
Information Systems
  • Define and explain the term soft approach to systems analysis
  • Identify examples of soft approach methodologies
  • Identify business situations where a soft approach to systems analysis might be appropriate
  • Define and explain the abbreviation SSM
  • Identify and discuss the advantages of SSM
  • Identify and discuss the disadvantages of SSM
  • Provide solutions to business problems using SSM
  • Research and discuss case studies

Learning Outcome: 1

Combined Soft/Hard
Approaches to the
Analysis of Information
Systems
  • Define and explain the term combined soft/hard approach to systems analysis
  • Identify examples of combined soft/hard approach methodologies
  • Identify business situations where a combined soft/hard approach to systems analysis might be appropriate
  • Define and explain the term Multiview
  • Identify and discuss the advantages of Multiview
  • Identify and discuss the disadvantages of Multiview
  • Provide solutions to business problems using Multiview
  • Research and discuss case studies
  • Compare and contrast soft, hard and combined approaches to systems analysis

Learning Outcome: 1

Techniques
Associated with
Requirements
Capture
  • Define and explain the term stakeholder
  • Identify and discuss types of stakeholder analysis techniques
  • Define and illustrate the Stakeholder Analysis Matrix
  • Define and explain the abbreviation CATWOE
  • Identify and discuss the advantages of CATWOE
  • Identify and discuss the disadvantages of CATWOE
  • Provide solutions to business problems using CATWOE
  • Evaluate CATWOE

Learning Outcome: 2

OrganisationOriented and
People-Oriented IS
Methodologies
  • Define and explain the term organisation-oriented IS methodology
  • Identify the types of organisation-oriented IS methodologies
  • Identify and discuss the advantages of organisation-oriented methodologies
  • Identify and discuss the disadvantages of organisationoriented methodologies
  • Evaluate and discuss an organisation-oriented methodology in the context of a business scenario
  • Define and explain the term people-oriented IS methodology
  • Identify the types of people-oriented IS methodologies
  • Identify and discuss the advantages of people-oriented methodologies
  • Identify and discuss the disadvantages of people-oriented methodologies
  • Define and explain the abbreviation ETHICS
  • Evaluate and discuss the ETHICS methodology in the context of a business scenario
  • Define and explain the term Agile methodology
  • Evaluate and discuss the Agile methodology in the context of a business scenario

Learning outcomes: 3

Process-Oriented IS
Methodologies
  • Define and explain the term process-oriented IS methodology
  • Identify the types of process-oriented IS methodologies
  • Identify and discuss the advantages of process-oriented methodologies
  • Identify and discuss the disadvantages of process-oriented methodologies
  • Define and explain the term Yourdon methodology
  • Evaluate and discuss the Yourdon methodology in the context of a business scenario
  • Define and explain the abbreviation POEM
  • Evaluate and discuss the POEM methodology in the context of a business scenario

Learning outcome: 3

Object-Oriented IS
Methodologies
  • Define and explain the term object-oriented IS methodology
  • Identify the types of object-oriented IS methodologies
  • Define and explain terminology associated with an object oriented methodology
  • Illustrate the construction of an object-oriented methodology
  • Identify and discuss the advantages of object-oriented methodologies
  • Identify and discuss the disadvantages of object-oriented methodologies
  • Evaluate and discuss an object-oriented methodology in the context of a business scenario

Learning outcome: 3

Analytical
Techniques for
Understanding a
Complex
Organisational
Environment
  • Define and explain the term knowledge-based view of organisations
  • Identify and discuss the advantages of an organisationoriented methodology
  • Identify and discuss the advantages of an organisationoriented methodology
  • Define and explain the abbreviation SWOT
  • Demonstrate how SWOT can be used
  • Apply SWOT to a business scenario
  • Define and explain the abbreviation PEST
  • Demonstrate how PEST can be used
  • Apply PEST to a business scenario

Learning Outcome: 4

Analysis of Factors
Influencing a
Business Problem
  • Analyse the economic aspects of a business systems problem
  • Evaluate and discuss the economic aspects of a business systems problem in the context of potential solutions
  • Analyse the social aspects of a business systems problem
  • Evaluate and discuss the social aspects of a business systems problem in the context of potential solutions
  • Analyse the political aspects of a business systems problem
  • Evaluate and discuss the political aspects of a business systems problem in the context of potential solutions
  • Analyse the technical aspects of a business systems problem
  • Evaluate and discuss the technical aspects of a business systems problem in the context of potential solutions
  • Research and discuss case studies

Learning Outcomes: 5

Principles of
Interface Design and
the Requirements
and Characteristics
of Users that
Motivate These
  • Identify the principles and good practice of interface design
  • Analyse the requirements of the users of an interface
  • Analyse the characteristics of the users of an interface
  • Demonstrate how good interface design can address the requirements and characteristics of an interface user

Learning Outcome: 6

Design or Evaluate
an Interface with
regard to the
Requirements and
Characteristics of its
Users
  • Design an interface that addresses the requirements and characteristics of an interface user
  • Evaluate and discuss whether interface design principles have been applied to an interface
  • Evaluate and discuss whether interface design principles have addressed the requirements and characteristics of the interface user

Learning Outcomes: 6

 

Related National Occupational Standards (NOS) 
Sector Subject Area: IT and Telecoms
Related NOS: ESKITP4014 P1-5 – Carry out IT/technology architecture activities
ESKITP4014 P6-11 – Contribute to information activities relating to IT/technology
architecture models
ESKITP4024 P1-5 – Contribute, under supervision, to the preparation of a data analysis assignment;
ESKITP4024 P6-9 – Assist in the development of data analysis models
ESKITP6013 P1-5 – Contribute to information management
ESKITP6013 P6-8 – Document information assets
ESKITP6014 P1-3 – Manage the classification and categorisation of information

 

Assessment Type 
Global Assignment (100%)
See also Section 3 above

 

Level 5 Diploma in Computing (with Business Management) (L5DC BM): Here

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay Connected

22,048FansLike
2,817FollowersFollow
0SubscribersSubscribe
- Advertisement -

Latest Articles