established 1985
Benefiting from over 30 years’ experience, Fitzwilliam Institute’s Online Diploma in Computer Science and Cloud Security course features:
Computer Architecture, Machine Language, Program Execution, Arithmetic/Logic Instructions, Communicating with Other Devices, Other Architectures, Network Fundamentals, the Internet, the World Wide Web, Internet Protocols, Security, The History of a Computing Hardware, The History of a Computing Software.
Managing Information, Thinking Machines, the Turing Test, Aspects of AI, Knowledge Representation, Semantic Networks, Search Trees, Expert Systems, Networking, Types of Networks, Internet Connections, Packet Switching, Open systems and protocols, TCP/IP, High- Level Protocols, MIME types, Firewalls, Information Retrieval, Organisation.
CPU Scheduling, Memory Process and CPU management, Batch Processing, Multiprocessor Operating Systems, Computers and Electricity, Gates 94, Gate 96, XOR gate 96, NAND and NOR gates 97, Transistors, Combinational Circuits, Adders, Multiplexers, Circuits as Memory, Integrated Circuits, CPU Chips, Individual Computer Components, Stored-program Concept, von Neumann Architecture, The Fetch-Execute Cycle, RAM and ROM, Secondary Storage Devices, Touch Screens, Embedded Systems, Parallel Computing, Parallel Hardware.
The History of Operating Systems, Operating System Architecture, Coordinating the Machine’s Activities, Handling Competition among Processes, Security Roles of an Operating system, Memory Management, Process Management, Capabilities of the Hardware, Single User OS – Network OS, Real-time Operating Systems, Embedded Systems, Management of Input and Output, Processes and Scheduling, Threads, Sychronisation, Semaphores, Monitors, Deadlock, Scheduling, Memory Management.
Numbers and Computing, Positional Notation, Binary, Octal, and Hexadecimal, Arithmetic in Other Bases, Power-of-2 Number Systems, Converting from Base 10 to other Bases. Binary Values and Computers.
The Definition of an Algorithm, The Role of Algorithms, The Science of Algorithms, The Concept of an Algorithm, Algorithm Representation, Unsolvable Problems, Analysing Algorithms, Algorithms with Simple Variables, Composite Variables, Algorithm Discovery, Iterative Structures Recursive Structures, Efficiency and Correctness.
Spreadsheets, Spreadsheet Formulas, Circular References, Spreadsheets Analysis, Database Management Systems, the Relational Model, Relationships, Structured Query Language, Database Design, E-Commerce, The Ubiquitous Database, Database types, Advantages of Using a Database, Modelling the Data Domain, Building a relational Database from the Data Model, Normalisation, SQL, DDL, DML, Storied Procedures, Triggers, Data Integrity, Transaction Isolation Levels, Accessing the Database Programmatically.
Organization, Machine Languages, Assembly Languages and High-Level Languages, History of the Internet and World Wide Web, World Wide Web Consortium (W3C), Web, Personal, Distributed and Client/Server Computing, Hardware Trends, Object Technology, JavaScript: Object-Based Scripting for the Web, Browser Portability, C, C++ and Java, BASIC, Visual Basic, Visual C++, C# and .NET, Software Technologies.
What Is Web?, Search, Content Networks, User-Generated Content, Blogging, Social Networking, Social Media, Tagging, Social Bookmarking, Software Development, Rich Internet Applications (RIAs), Web Services, Mashups, Widgets and Gadgets, Location-Based Services, XML, RSS, Atom, JSON and VoIP, Web Monetization Models, Web Business Models, Future of the Web, Where to Go for More Web, Information, Web Bibliography, Web Glossary.
Editing XHTML, First XHTML Example, W3C XHTML Validation Service, Headings, Linking, Images, Special Characters and Horizontal Rules, Lists, Tables, Forms, Internal Linking, meta Elements.
Inline Styles, Embedded Style Sheets, Conflicting Styles, Linking External Style Sheets, Positioning, Elements, Backgrounds, Element Dimensions, Box Model and Text Flow, Media Types, Building a CSS Drop-Down Menu,User Style Sheets, CSS 3.
Computer Operations, Machine Language, Assembly Language, Expressing Algorithms, Generations of Languages, Compilers and Interpreters, Virtual Machines, Procedural Programming, Object- Orientated Programming, Scripting Languages, Functional Languages, Language Design, Language Syntax and Semantics.
The Software Engineering Discipline, The Software Life Cycle, Software Engineering Methodologies, Modularity, Tools of the Trade, Quality Assurance, Documentation, Software Ownership and Liability.
Ethics Theories, Intellectual Property, Privacy, Encryption, Viruses, Worms and Trojan Horses, Hackers, Can Computers kill?, Information Security, Preventing unauthorised Access, Malicious Code, Antivirus Software, Security attacks, Passwords, CAPTCHA, Fingerprint Analysis, Cryptography, Security and Portable Devices, Wikileaks.
History of Cloud Computing. How Cloud Computing started. The companies behind the creation of Cloud Computing. What is the cloud? Defining the characteristics of the cloud. Cloud Service models. Cloud Deployment Models. Community and Hybrid Clouds.
Introduction to Cloud Computing Architecture. Horizontal and Vertical Scaling. Architectural Layers of Cloud Environments. Design Patterns. Assessing Design Patterns
Overview of Cloud Security. Cloud Security Alliance. Software Assurance Initiative. CIA Triad of Information System Security. Integrity. Availability. Cloud Security Services. Authentication. Authorization. Auditing. Accountability. Failsafe Security. Economy of Mechanism. Complete Mediation. Open Design. Least Common Mechanism. Weakest Link. Leveraging Existing Components. Secure Cloud Sofware Requirements. Secure Development Practices. Handling Data. Code Practices. Language Options. Input Validation and Content Injection. Monitoring Internal and External Requirements. NIST 33 Security Principles.
Introduction to Virtualization. History of Virtualization. Virtualization vs. Abstraction. Resource Virtualization. The need for Virtualization. Benefits of Virtualisation. Limitations of Virtualisation. Virtualization Concepts and Definitions. Traditional and Contemporary Virtualization. Virtualization Uses.
Computer Life Cycles. Cloud Life Cycle Differences. Implementing a Cloud Computing Life Cycle. Life Cycle Issues. Lifecycles and Security. Cloud service Lifecycle. Cloud Lifecycle Management. Adoption Lifecycle. Data Security Lifecycle. Systmes Development Lifecycle. Virtualization Lifecycle. Application Lifecycle.
Strategic Analysis. Questioning Your Strategy. Maturity Models. Cloud Maturity Model. 6 Levels of Maturity. External Analysis. PEST. Porter's Five Forces. Porter's Diamond. Internal Analysis. Growth Share Matrix. Strategic Re-Alignment. SWOT Analysis.
Introduction to Security Architecture. Shared Responsibility. Cloud Security Threats and Mitigation. Public/ Hybrid Cloud threats. Private Cloud Threats. Threat to Cloud Service Availability. Clouyd Security Architecture Plan. Security as a Servcie Architecture. Cloud Security Principles. Cloud Security Architecture Patterns.
Security Policy Implementation. Policy Types. Senior Management Statement of Policy. Regulatory Policies. Advisory Policies. Informative Policies. Computer Security Incident Response Team. Virtualization Security Management. Virtual Enviornment Types. Virtualization Management Roles. Virtual Threats.
Introduction to Identity and Access Management. Identity Provisioning and Storage. Authentication. Authorization. IAM Providers. Federated services and their IAM use. Claims Based Security. Roles and Permissions.
What is Cloud Governance? Managing the Cloud. IT Governance. Governing the Cloud. Deciding on a Governor. Imagining a Scenario. Knowing the Risks of Running in the Cloud. Compliance and Risk Measures. Understanding Risks. Deducing IT Risk. Monitoring and Measuring IT.
Online Lecture Modules, Subject Expert Feedback Sessions after each Module, Practical Case Studies, End of Module Practical Activities etc.
Full support is available from our Subject Experts by email at the end of each module and an ongoing basis during the course.
Anyone working in the general Computer Science sector in a senior or support role which is likely to require Computing Skills and Cloud Security.
On successful completion of this course you will receive a Diploma level qualification that is certified and awarded by the ICM (Institute of Commercial Management)
The Institute of Commercial Management was founded in 1979 and is one of the leading Professional Examination and Certification Bodies in the world today. Fitzwilliam Institute have developed and provided practical skills training courses in liaison with the Institute of Commercial Management qualifications and certifications framework for over 25 years. The Institute of Commercial Management certifications and continual professional development training awards are recognised throughout Europe, the USA, Canada, Australia, South Africa and Asia in a total of 140 countries, by leading industries, bodies and professions.
Duration: You will have full access to online resources and subject expert support for one calendar year. However, you can complete the course in as little as 4 - 6 months, by dedicating 6-8 hours of study per week.
Course Fees: 995.00 EUR
To secure your place on the course the full fee is required. All fees must be paid in full before the course begins. Please note, the full course fees are inclusive of all course materials and certification costs.
Enrolment intake is strictly limited on this course. Early application is advised. Places are allocated on a first come first served basis.
Fitzwilliam Institute closes on Bank Holidays and for a number of days at Christmas and New Year. Fitzwilliam Institute reserves the right to postpone, cancel or alter courses without notice or to change any of the details in this brochure. Fees are not refundable unless the course is cancelled by Fitzwilliam Institute. Distance Learning courses are provided by Fitzwilliam Institute BGLS Ltd.
Year on year, we have the pleasure of training students from top Ireland and international companies. See where our most recent students come from and find out what they have to say.