|
All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source. |
| SOUTH AFRICAN QUALIFICATIONS AUTHORITY |
| REGISTERED QUALIFICATION: |
| Postgraduate Diploma in Information Technology |
| SAQA QUAL ID | QUALIFICATION TITLE | |||
| 110062 | Postgraduate Diploma in Information Technology | |||
| ORIGINATOR | ||||
| Tshwane University of Technology (TUT) | ||||
| PRIMARY OR DELEGATED QUALITY ASSURANCE FUNCTIONARY | NQF SUB-FRAMEWORK | |||
| CHE - Council on Higher Education | HEQSF - Higher Education Qualifications Sub-framework | |||
| QUALIFICATION TYPE | FIELD | SUBFIELD | ||
| Postgraduate Diploma | Field 10 - Physical, Mathematical, Computer and Life Sciences | Information Technology and Computer Sciences | ||
| ABET BAND | MINIMUM CREDITS | PRE-2009 NQF LEVEL | NQF LEVEL | QUAL CLASS |
| Undefined | 120 | Not Applicable | NQF Level 08 | Regular-Provider-ELOAC |
| REGISTRATION STATUS | SAQA DECISION NUMBER | REGISTRATION START DATE | REGISTRATION END DATE | |
| Reregistered | EXCO 0821/24 | 2019-07-25 | 2027-06-30 | |
| LAST DATE FOR ENROLMENT | LAST DATE FOR ACHIEVEMENT | |||
| 2028-06-30 | 2031-06-30 | |||
| In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise. |
This qualification does not replace any other qualification and is not replaced by any other qualification. |
| PURPOSE AND RATIONALE OF THE QUALIFICATION |
| Purpose:
A qualifying learner will be able to demonstrate an ability to use a range of specialised skills to identify, analyse and address complex or abstract problems drawing systematically on the body of knowledge and methods appropriate to a computer networks and security. The learner will be able to apply, in a self-critical manner, learning strategies which effectively address his or her professional and ongoing learning needs and the professional and ongoing learning needs of others in the context of computer networks and security. Learners will also have the ability to operate effectively within a computer networks or security system, or manage a system based on an understanding of the roles and relationships between elements within the system. Qualifying learners of this qualification will be able to: Rationale: The problem of skills shortage in South Africa poses a significant limitation on the country's short and long-term economic growth potential. Several organs of government such as Information and Communications Technology (MICT) Sector Education and Training Authority (SETA's), the Career Junction Index (CJI) and the media report have confirmed the high demand of Information technology experts in South Africa. Through vigorous meetings with local industries, this qualification was designed. This qualification will enable the learner to develop the knowledge and technical expertise to be able to take on specific responsibility within a network/security team or as a team leader for the security aspects of that network, particularly in industries such as banking, where security is crucially important and telecommunication industries. The focus is on the steps and strategies that can be adopted to mitigate security threats; design and manage networks; and build a solid foundation on internet or network applications. |
| LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING |
| Recognition of Prior Learning (RPL):
Recognition of Prior Learning (RPL) may be used to demonstrate competence for admission to this qualification. RPL may also be used to obtain credits for some learning outcomes. Evidence of prior learning will be assessed through formal policies and procedure. Entry Requirements: The minimum entry requirement for this qualification is: Or Or |
| RECOGNISE PREVIOUS LEARNING? |
| Y |
| QUALIFICATION RULES |
| This qualification consists of compulsory and elective modules at Level 8, totalling 120 Credits.
Compulsory Modules: 60 Credits: Electives Modules: 60 Credits (Select four modules in the area of specialisation (Computer Networks or Computer Security). Computer Networks: Or Computer Security: |
| EXIT LEVEL OUTCOMES |
| 1. Synthesise a digital investigation approach, the sources of digital evidence, and the limitations of forensics from literature.
2. How to write a report in a team environment based on research of the latest trends. 3. Describe Wide Area Network(WAN) technologies and network services required by converged applications in enterprise networks. 4. Examine the technologies used by both web applications and by web services. 5. Application of Network management from several different angles, culminating in a project of how these aspects are combined into management reference models. 6. Synthesise the concept of privacy including personally private information, potential violations of privacy due to security mechanisms, and describe how privacy protection mechanisms run in conflict with security mechanisms from recent literature. 7. Implement principles of network design, such as layering, packet switching, and the end-to-end argument, 8. Explain how public key infrastructure supports digital signing and encryption and discuss the limitations/vulnerabilities. 9. Apply research principles to analyse how has Software Defined Networking(SDN) been shaping networking research and industry. 10. Propose a researched solution for an organisation on ethical hacking. 11. Apply forensics tools to investigate security breaches. 12. Apply research to integrate and design solution to topical problems in network security or network design/management for an organisation. |
| ASSOCIATED ASSESSMENT CRITERIA |
| Associated Assessment Criteria for Exit Level Outcome 1:
Associated Assessment Criteria Exit Level Outcome 2: Associated Assessment Criteria Exit Level Outcome 3: Associated Assessment Criteria for Exit Level Outcome 4: Associated Assessment Criteria for Exit Level Outcome 5: Associated Assessment Criteria for Exit level outcome 6: Associated Assessment Criteria Exit Level Outcome 7: Associated Assessment Criteria Exit Level Outcome 8: Associated Assessment Criteria Exit Level Outcome 9: Associated Assessment Criteria Exit Level Outcome 10: Associated Assessment Criteria Exit Level Outcome 11: Associated Assessment Criteria Exit Level Outcome 12: |
| INTERNATIONAL COMPARABILITY |
| The Postgraduate Diploma in Information Technology is comparable favourably in structure of Computer Science Curricular as done by Joint Task Force on Computing Curricula association for Computing Machinery (ACM) and IEEE Computer Society and with international universities from United Kingdom, Australia and United States of America. There are few countries that offer Postgraduate Diploma in Information Technology or Postgraduate Diploma in Information Security.
Country: Australia. Institution: The Northern Sydney Institute. Provide high-level Information and Communications Technology(ICT) technical base with appropriate security units and the ability to specialise in a number of areas, including voice, wireless, network infrastructure. Country: United States of America. Institution: Carnegie Mellon University. The Carnegie Mellon University organise their curriculum following topics: Assurance process and management, Assurance across the life cycle, Risk management, Assurance assessment, Assurance management Assurance product and technology, System security assurance, Potential attack methods, Analysis of threats to software, Methods of defence, System functionality assurance, System operational assurance. Country: United States of America. Institution: The University of Kent. The University of Kent qualification is similar to this qualification in that it provides a broad coverage of computer networks, computer security and mobile device technologies and also looks in depth at some of the security issues that fixed and wireless networks are subject to, and the current solutions employed to address these problems. Country: United Kingdom. Institution: Oxford Brookes University. Oxford Brookes University offers similar courses as this qualification: Network Security, Advance networking, Network Systems Management. |
| ARTICULATION OPTIONS |
| This qualification allows for both horizontal and vertical articulation possibilities:
Horizontal Articulation: Vertical Articulation: |
| MODERATION OPTIONS |
| N/A |
| CRITERIA FOR THE REGISTRATION OF ASSESSORS |
| N/A |
| NOTES |
| N/A |
| LEARNING PROGRAMMES RECORDED AGAINST THIS QUALIFICATION: |
| NONE |
| PROVIDERS CURRENTLY ACCREDITED TO OFFER THIS QUALIFICATION: |
| This information shows the current accreditations (i.e. those not past their accreditation end dates), and is the most complete record available to SAQA as of today. Some Primary or Delegated Quality Assurance Functionaries have a lag in their recording systems for provider accreditation, in turn leading to a lag in notifying SAQA of all the providers that they have accredited to offer qualifications and unit standards, as well as any extensions to accreditation end dates. The relevant Primary or Delegated Quality Assurance Functionary should be notified if a record appears to be missing from here. |
| 1. | Tshwane University of Technology (TUT) |
| All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source. |