SAQA All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.
SOUTH AFRICAN QUALIFICATIONS AUTHORITY 
REGISTERED QUALIFICATION: 

Postgraduate Diploma in Information Technology 
SAQA QUAL ID QUALIFICATION TITLE
110062  Postgraduate Diploma in Information Technology 
ORIGINATOR
Tshwane University of Technology (TUT) 
PRIMARY OR DELEGATED QUALITY ASSURANCE FUNCTIONARY NQF SUB-FRAMEWORK
CHE - Council on Higher Education  HEQSF - Higher Education Qualifications Sub-framework 
QUALIFICATION TYPE FIELD SUBFIELD
Postgraduate Diploma  Field 10 - Physical, Mathematical, Computer and Life Sciences  Information Technology and Computer Sciences 
ABET BAND MINIMUM CREDITS PRE-2009 NQF LEVEL NQF LEVEL QUAL CLASS
Undefined  120  Not Applicable  NQF Level 08  Regular-Provider-ELOAC 
REGISTRATION STATUS SAQA DECISION NUMBER REGISTRATION START DATE REGISTRATION END DATE
Reregistered  EXCO 0821/24  2019-07-25  2027-06-30 
LAST DATE FOR ENROLMENT LAST DATE FOR ACHIEVEMENT
2028-06-30   2031-06-30  

In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise.  

This qualification does not replace any other qualification and is not replaced by any other qualification. 

PURPOSE AND RATIONALE OF THE QUALIFICATION 
Purpose:
A qualifying learner will be able to demonstrate an ability to use a range of specialised skills to identify, analyse and address complex or abstract problems drawing systematically on the body of knowledge and methods appropriate to a computer networks and security. The learner will be able to apply, in a self-critical manner, learning strategies which effectively address his or her professional and ongoing learning needs and the professional and ongoing learning needs of others in the context of computer networks and security.

Learners will also have the ability to operate effectively within a computer networks or security system, or manage a system based on an understanding of the roles and relationships between elements within the system.

Qualifying learners of this qualification will be able to:
  • Apply knowledge of computing and logic appropriate to the discipline.
  • Effectively integrate Information Technology(IT) based solutions into the user environment.
  • Understand best practices, standards and their applications.
  • Create and manage an effective project plan; function effectively on teams to accomplish a common goal.
  • Communicate effectively with a range of audiences; engage in continuing professional development.
  • Understand issues and responsibilities related to professionalism, ethics, legalities, security and society.

    Rationale:
    The problem of skills shortage in South Africa poses a significant limitation on the country's short and long-term economic growth potential. Several organs of government such as Information and Communications Technology (MICT) Sector Education and Training Authority (SETA's), the Career Junction Index (CJI) and the media report have confirmed the high demand of Information technology experts in South Africa. Through vigorous meetings with local industries, this qualification was designed.

    This qualification will enable the learner to develop the knowledge and technical expertise to be able to take on specific responsibility within a network/security team or as a team leader for the security aspects of that network, particularly in industries such as banking, where security is crucially important and telecommunication industries. The focus is on the steps and strategies that can be adopted to mitigate security threats; design and manage networks; and build a solid foundation on internet or network applications. 

  • LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING 
    Recognition of Prior Learning (RPL):
    Recognition of Prior Learning (RPL) may be used to demonstrate competence for admission to this qualification. RPL may also be used to obtain credits for some learning outcomes. Evidence of prior learning will be assessed through formal policies and procedure.

    Entry Requirements:
    The minimum entry requirement for this qualification is:
  • A Bachelor's Degree in Information Technology.
    Or
  • An Advanced Diploma in Information Technology.
    Or
  • A Bachelor of Technology Degree in Information Technology specialised in Communication Networks or Computer Security. 

  • RECOGNISE PREVIOUS LEARNING? 

    QUALIFICATION RULES 
    This qualification consists of compulsory and elective modules at Level 8, totalling 120 Credits.

    Compulsory Modules: 60 Credits:
  • Principle of Research V, 15 Credits.
  • Social Engineering and New Trends in Networks, 15 Credits.
  • Network Research Project V, 15 Credits.
  • Digital Forensics V, 15 Credits.

    Electives Modules: 60 Credits (Select four modules in the area of specialisation (Computer Networks or Computer Security).
    Computer Networks:
  • Computer Networks 501, 15 Credits.
  • Network Management 501, 15 Credits.
  • Computer Networks 502, 15 Credits.
  • Software Defined Networks 502, 15 Credits.
    Or
    Computer Security:
  • Computer Security 501, 15 Credits.
  • Security policy and governance 501, 15 Credits.
  • Cryptography 502, 15 Credits.
  • Ethical Hacking 502, 15 Credits. 

  • EXIT LEVEL OUTCOMES 
    1. Synthesise a digital investigation approach, the sources of digital evidence, and the limitations of forensics from literature.
    2. How to write a report in a team environment based on research of the latest trends.
    3. Describe Wide Area Network(WAN) technologies and network services required by converged applications in enterprise networks.
    4. Examine the technologies used by both web applications and by web services.
    5. Application of Network management from several different angles, culminating in a project of how these aspects are combined into management reference models.
    6. Synthesise the concept of privacy including personally private information, potential violations of privacy due to security mechanisms, and describe how privacy protection mechanisms run in conflict with security mechanisms from recent literature.
    7. Implement principles of network design, such as layering, packet switching, and the end-to-end argument,
    8. Explain how public key infrastructure supports digital signing and encryption and discuss the limitations/vulnerabilities.
    9. Apply research principles to analyse how has Software Defined Networking(SDN) been shaping networking research and industry.
    10. Propose a researched solution for an organisation on ethical hacking.
    11. Apply forensics tools to investigate security breaches.
    12. Apply research to integrate and design solution to topical problems in network security or network design/management for an organisation. 

    ASSOCIATED ASSESSMENT CRITERIA 
    Associated Assessment Criteria for Exit Level Outcome 1:
  • Explain methods on how to design software to support forensics.
  • Describe the legal requirements for use of seized data.
  • Create the process of evidence seizure from the time when the requirement was identified to the disposition of the data from literature.
  • Compile and compare procedures on how data collection is accomplished and store the original and forensics copy.
  • Demonstrate how to conduct data collection on a hard drive.

    Associated Assessment Criteria Exit Level Outcome 2:
  • Analyse and discuss the selection of papers spanning a wide spectrum of topics in computer networks, including internet and multimedia, security and cryptography, wireless networks, parallel and distributed computing, and performance evaluation.
  • Demonstrate and discuss social engineering concepts, techniques and countermeasures.
  • Examine new trends in networking technology.
  • Explain and apply ethical, privacy and security issues and measures in the online social network ecosystem.

    Associated Assessment Criteria Exit Level Outcome 3:
  • Introduce and compare integrated network services and select the appropriate devices and technologies to meet network requirements.
  • Demonstrate how to detect, troubleshoot, and correct common enterprise network implementation issues through simulation (e.g., OPNET system).
  • Figure out how to implement and configure common data link protocols and apply Wide Area Network(WAN) security concepts, principles of traffic, access control, and addressing services to a project.

    Associated Assessment Criteria for Exit Level Outcome 4:
  • Explain and summarise the implications of client-side technologies (Java Script and Java applets) used in web applications.
  • Identify and discuss implications of XML security technologies.
  • List and apply the authentication methods used for both web applications and web services.
  • Apply the techniques used for secure programming in a project.
  • Discuss and justify procedures to identify, explain and detect common vulnerabilities associated with web applications.

    Associated Assessment Criteria for Exit Level Outcome 5:
  • Present an overview of what network management is about and why it is relevant.
  • Summarise the different building blocks of network management, such as management protocols, management organisation, management communication patterns and functions, tools, and activities associated with it.

    Associated Assessment Criteria for Exit level outcome 6:
  • Identify and analyse methods on how an attacker can infer a secret by interacting with a database.
  • Demonstrate how to set a data backup, password refresh and breach disclosure policy.
  • Describe the consequences of data retention policies.
  • Identify the risks and benefits of outsourcing to the cloud.

    Associated Assessment Criteria Exit Level Outcome 7:
  • Compile growth and control of the Internet into a project.
  • Compare daily life before and after the advent of personal computers and the Internet.
  • Discuss organisation of the Internet (Internet Service Providers, Content Providers, etc.) is.
  • Describe internet technologies and network technologies.
  • Identify and discuss protocols used to enhance Internet communication, and choose the appropriate protocol for a particular case.

    Associated Assessment Criteria Exit Level Outcome 8:
  • Compare and discuss basic Cryptography Terminology covering notions pertaining to the different (communication) partners, secure/unsecure channel, attackers and their capabilities, encryption, decryption, keys and their characteristics and signatures.
  • List and discuss the purpose of cryptography and the ways it is used in data communications.
  • Summarise the role of cipher, cryptanalysis, cryptographic algorithm, and cryptology, and two basic methods (ciphers) for transforming plain text in cipher text.

    Associated Assessment Criteria Exit Level Outcome 9:
  • Explore the current state of the Open-Flow model and centralised network control.
  • Examine The structure and capabilities of commercial and open source controllers.
  • Survey the available technologies for network programmability.
  • Trace the modern data centre from desktop-centric to highly distributed models.
  • Compile the rational for Software Defined Networking(SDN) through recent literature.
  • Compile and discuss information on construction and maintenance of an SDN network topology.

    Associated Assessment Criteria Exit Level Outcome 10:
  • Research how intruders escalate privileges.
  • Propose a solution.

    Associated Assessment Criteria Exit Level Outcome 11:
  • Identify and explain the sources of digital evidence, and the limitations of forensics.
  • Demonstrate how to recover data based on a given search term from an imaged system.
  • Explain the reconstruction of an application history from application artefacts.
  • Explain the reconstruction of a web browsing history from web artefacts.
  • Demonstrate how to capture and interpret network traffic.
  • Discuss the challenges associated with mobile device forensics.

    Associated Assessment Criteria Exit Level Outcome 12:
  • Identify and discuss research principles and techniques.
  • Demonstrate recent articles and access databases from the library. 

  • INTERNATIONAL COMPARABILITY 
    The Postgraduate Diploma in Information Technology is comparable favourably in structure of Computer Science Curricular as done by Joint Task Force on Computing Curricula association for Computing Machinery (ACM) and IEEE Computer Society and with international universities from United Kingdom, Australia and United States of America. There are few countries that offer Postgraduate Diploma in Information Technology or Postgraduate Diploma in Information Security.

    Country: Australia.
    Institution: The Northern Sydney Institute.
    Provide high-level Information and Communications Technology(ICT) technical base with appropriate security units and the ability to specialise in a number of areas, including voice, wireless, network infrastructure.

    Country: United States of America.
    Institution: Carnegie Mellon University.
    The Carnegie Mellon University organise their curriculum following topics: Assurance process and management, Assurance across the life cycle, Risk management, Assurance assessment, Assurance management Assurance product and technology, System security assurance, Potential attack methods, Analysis of threats to software, Methods of defence, System functionality assurance, System operational assurance.

    Country: United States of America.
    Institution: The University of Kent.
    The University of Kent qualification is similar to this qualification in that it provides a broad coverage of computer networks, computer security and mobile device technologies and also looks in depth at some of the security issues that fixed and wireless networks are subject to, and the current solutions employed to address these problems.

    Country: United Kingdom.
    Institution: Oxford Brookes University.
    Oxford Brookes University offers similar courses as this qualification: Network Security, Advance networking, Network Systems Management. 

    ARTICULATION OPTIONS 
    This qualification allows for both horizontal and vertical articulation possibilities:
    Horizontal Articulation:
  • Bachelors Honours in Information Technology, Level 8.
  • Postgraduate Diploma in Information Technology, Level 8.

    Vertical Articulation:
  • Master of Information Technology, Level 9. 

  • MODERATION OPTIONS 
    N/A 

    CRITERIA FOR THE REGISTRATION OF ASSESSORS 
    N/A 

    NOTES 
    N/A 

    LEARNING PROGRAMMES RECORDED AGAINST THIS QUALIFICATION: 
     
    NONE 


    PROVIDERS CURRENTLY ACCREDITED TO OFFER THIS QUALIFICATION: 
    This information shows the current accreditations (i.e. those not past their accreditation end dates), and is the most complete record available to SAQA as of today. Some Primary or Delegated Quality Assurance Functionaries have a lag in their recording systems for provider accreditation, in turn leading to a lag in notifying SAQA of all the providers that they have accredited to offer qualifications and unit standards, as well as any extensions to accreditation end dates. The relevant Primary or Delegated Quality Assurance Functionary should be notified if a record appears to be missing from here.
     
    1. Tshwane University of Technology (TUT) 



    All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.