SAQA All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.
SOUTH AFRICAN QUALIFICATIONS AUTHORITY 
REGISTERED QUALIFICATION: 

Advanced Diploma in Information Technology 
SAQA QUAL ID QUALIFICATION TITLE
117676  Advanced Diploma in Information Technology 
ORIGINATOR
Tshwane University of Technology (TUT) 
PRIMARY OR DELEGATED QUALITY ASSURANCE FUNCTIONARY NQF SUB-FRAMEWORK
CHE - Council on Higher Education  HEQSF - Higher Education Qualifications Sub-framework 
QUALIFICATION TYPE FIELD SUBFIELD
Advanced Diploma  Field 10 - Physical, Mathematical, Computer and Life Sciences  Information Technology and Computer Sciences 
ABET BAND MINIMUM CREDITS PRE-2009 NQF LEVEL NQF LEVEL QUAL CLASS
Undefined  120  Not Applicable  NQF Level 07  Regular-Provider-ELOAC 
REGISTRATION STATUS SAQA DECISION NUMBER REGISTRATION START DATE REGISTRATION END DATE
Reregistered  EXCO 0821/24  2020-09-16  2027-06-30 
LAST DATE FOR ENROLMENT LAST DATE FOR ACHIEVEMENT
2028-06-30   2031-06-30  

In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise.  

This qualification does not replace any other qualification and is not replaced by any other qualification. 

PURPOSE AND RATIONALE OF THE QUALIFICATION 
Purpose:
This qualification through theory and practical components will equip learners to work in the environments computer networks, distributed computing systems, information and computer security, network management and control, and infrastructure support services.

This area of study focuses on the theory, design, implementation and management of linked systems of computers to maximise efficiency and productivity in an Information Technology (IT) environment. The qualification prepares learners to meet the computer technology needs of the business, government, healthcare, schools, and other types of organisations, as well as academic research in Southern Africa. Qualifying Learners may occupy the following positions: Net and Forensics, Infrastructure and User Support.

The purpose of this qualification is to produce learners that can demonstrate the following competencies:
  • Application of network theory and network computing systems.
  • Design and implementation of networking systems.
  • Security of network systems and assure computer-based systems.
  • Management and evaluation of network systems.
  • Provision of IT support services.
  • Integration and application of emerging technologies.
  • Application of algorithmic and mathematical techniques and solutions to networking and security domains.
  • Application of management principles to communication network project.

    Rationale:
    The rationale for the qualification is to meet the ever-changing demands of the organisation environment (Network Systems administrator, Network architecture, Network security) and comply with the skills shortages encountered in the local and global economy. Adhering to the national imperatives, the institution and the Faculty of Information Communication Technology (ICT) vision and mission, the Department of Information Technology is aligning its qualifications through three significant thrusts, namely: teaching and learning, research and development; and community service.

    The Advisory Board of the industry-endorsed and recommended this qualification. Furthermore, qualifying learners within industry visit mentors and highlight areas that need improvement. For the qualification's modules development, the institution adopted the Information Technology Curricula 2017 as developed by the Task Group on Information Technology Curricula for Computing Machinery (ACM) and IEEE Computer Society of 2008 and African Universities.

    A typical learner of this qualification will have the following attributes:
  • Create and manage an effective project plan;
  • Function effectively on teams to accomplish a common goal;
  • Communicate effectively with a range of audiences;
  • Engage in continuing professional development; understand issues and responsibilities related to professionalism, ethics, legalities, security and society;
  • Deal with communication networks aspects, network design and implementation, and security issues.

    The qualification will enable the learner to develop the knowledge and technical expertise to be able to take on specific responsibility within a network/security team or as a team leader for the security aspects of that network. The industries where learners can work include banking, where security is crucially important and telecommunication industries. The focus is on the steps and strategies that can be adopted to mitigate security threats; design and manage networks; and build a solid foundation on the Internet or network applications.

    The qualification will promote understanding of the complexities and uncertainties of electing, applying or transferring appropriate standard solutions, procedures, processes or techniques to unfamiliar problems in a computer network or security environment. This knowledge also includes the research, identification, analysis, and design; propose expansion and management of organisational IT systems to aid innovation, and for the betterment of organisational responsiveness, effectiveness and efficiency, which improves the social and economic stance of the country. 

  • LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING 
    Recognition of Prior Learning (RPL):
    Prospective learners may use the Recognition of Prior Learning (RPL) to demonstrate competence for admission to this qualification. RPL may also be used to grant credits for some learning outcomes. Credits earned by RPL must not include credits at the exit levels. The institution assesses evidence of prior learning through formal policies and procedures of the institution.

    Entry Requirements:
    The minimum entry requirement for this qualification is:
  • Diploma in Information Technology, NQF Level 6. 

  • RECOGNISE PREVIOUS LEARNING? 

    QUALIFICATION RULES 
    This qualification consists of the following compulsory and elective modules at NQF Level 7 totalling 120 Credits.

    Compulsory Modules, Level 7, 90 Credits:
  • Principles of Research, 15 Credits.
  • Wireless Networks IV, 15 Credits.
  • System Administration and Maintenance IV, 15 Credits.
  • Network Management IV, 15 Credits.
  • Network Applications IV, 15 Credits.
  • Research Project, 15 Credits.

    Elective Modules at Level 7, 30 Credits (Choose two modules):
  • Computer Networks IV A, 15 Credits.
  • Computer Networks IV B, 15 Credits.
  • Computer Security IV A, 15 Credits.
  • Computer Security IV B, 15 Credits. 

  • EXIT LEVEL OUTCOMES 
    1. Apply the fundamentals of wireless network theory.
    2. Design and implement network management principles.
    3. Deploy and maintain basic administrative tasks of modern computer systems, with particular emphasis on the administration of user accounts.
    4. Evaluate and recommend routing and forwarding algorithms for the Internet.
    5. Identify and explain advance cybersecurity management.
    6. Analyse and create categories of computer security.
    7. Evaluate the importance of LAN switching to network design.
    8. Apply fundamental research methodologies and techniques to analyse and design solutions for Information Technology problems.
    9. Produce a researched orientated solution based on industry expectations.
    10. Deployment of System Administration and Maintenance tools. 

    ASSOCIATED ASSESSMENT CRITERIA 
    Associated Assessment Criteria for Exit Level Outcome 1:
  • Explain the main characteristics of mobile IP and how it differs from IP about mobility management and location management as well as performance.
  • Demonstrate (with home agents and foreign agents) on how to route e-mail and other traffic using mobile IP.
  • Implement a simple application that relies on mobile and wireless data communications.
  • Describe the areas of current and emerging interest in wireless and mobile computing, and assessment of the current capabilities, limitations, and near-term potential of each.

    Associated Assessment Criteria for Exit Level Outcome 2:
  • Discuss the issues for network management arising from a range of security threats, including viruses, worms, Trojan horses, and denial-of-service attacks.
  • Explain a strategy for ensuring appropriate levels of security in a system designed for a particular purpose.
  • Demonstrate knowledge of how to plan, integrates, and manages computer network technologies and services to meet a variety of business needs.
  • List and explain the protection of network resources using security technologies and disaster planning.

    Associated Assessment Criteria for Exit Level Outcome 3:
  • Explain the installation and maintenance of Windows and Linux server.
  • Discuss the implementation of the sharing of resources on the network.

    Associated Assessment Criteria for Exit Level Outcome 4:
  • Describe the organisation of the network layer.
  • Explain how to forward packets in an IP network.
  • Justify the relation of scalability benefits of hierarchical addressing routing algorithms.

    Associated Assessment Criteria for Exit Level Outcome 5:
  • Explain a general understanding of malware and social engineering attacks.
  • Discuss application and networking-based attacks.
  • Share and discuss knowledge of host security, application security, and data security.
  • Discuss and demonstrate advanced cryptography.
  • Demonstrate security through network devices.
  • Demonstrate the administration of a secure network.
  • Discuss vulnerability assessment.
  • Introduce wireless network security.
  • Discuss mobile device security.
  • Demonstrate understanding of access control fundamentals.
  • Discuss the implementation of business continuity.
  • Discuss and demonstrate the implementation of security risk mitigation.

    Associated Assessment Criteria for Exit Level Outcome 6:
  • List and explain likely attacker types against a particular system.
  • Discuss the limitations of malware countermeasures.
  • Identify instances of social engineering attacks and denial of service attacks.
  • Examine how to identify and mitigate denial of service attacks.
  • Discuss risks to privacy and anonymity in commonly used applications.
  • Discuss the concepts of covert channels and other data leakage procedures.

    Associated Assessment Criteria for Exit Level Outcome 7:
  • Perform analysis of LAN switching technologies and explanation on how critical they are to network design.
  • Evaluate the capabilities, application, and design of LAN switches and switched internetworks.
  • Explain the problems of link congestion that arise from the deployment of LAN switches.
  • Demonstrate how switches and end stations can use a group of independent LAN segments as if they were a single link.
  • List and discuss concerns that environments need to be aware of and how to prevent attacks.
  • Discuss the concepts and operation of source routing in both end stations and bridges.
  • Identify the various uses for Virtual LANs (VLANs) as well as the fundamental concepts employed by devices that implement VLAN capability.

    Associated Assessment Criteria for Exit Level Outcome 8:
  • Identify and explain fundamental research methodologies and techniques for analysing and designing solutions for IT problems.
  • Apply fundamental research methodologies and techniques for analysing and designing solutions to IT problems.

    Associated Assessment Criteria for Exit Level Outcome 9:
  • Identify and research a solution for industry expectation.
  • Solve industry expectation.

    Associated Assessment Criteria for Exit Level Outcome 10:
  • Explain issues for network management arising from a range of security threats.
  • Describe the development of a strategy for ensuring appropriate levels of security.

    Integrated Assessment:
    A variety of strategies will be applied to achieve an integrated assessment. These assessments will include summative assessment in the form written examinations (class tests, online, tests, semester tests) and formative assessment (presentations, group work, individual projects, assignments, practical and a research report).

    Some of the criteria are assessable through observation of the learners during their classes when they demonstrate their projects. This assessment will supply qualifying learners with applied competence, foundational competence, practical competence and reflexive competence for furthering their learning. 

  • INTERNATIONAL COMPARABILITY 
    The qualification compares favourably in structure of Computer Science Curricular as done by Joint Task Force on Computing Curricula Association for Computing Machinery (ACM) and IEEE Computer Society and with international universities from Australia, UK, Malaysia and USA.

    There are not many countries nor international universities that offer Advanced Diploma in Information Technology or Advanced Diploma in Information Security. However, majority universities offers BSc qualifications in Cybersecurity or Computer Networks, then an Advanced Diploma. Below are listed some of the universities against which this qualification was benchmarked. They are:

    Australia
    The Professional Association for Australia's ICT sector provides a Bachelor of Information Technology (Network Security). This qualification is a three-year degree that will prepare you to work as a network security specialist in the fast growing and dynamic IT industry.

    United States of America
    Pittsburgh Technical College is presenting a 3-year BSc Information Technology focusing on Cybersecurity as well as Information Systems and Technology. It has been named the National Centre of Academic Excellence in Cyber Defence Education (CAE-CDE). This is awarded jointly through the National Security Agency (NSA) and the Department of Homeland Security (DHS).

    Malaysia
    The Bachelor of Computer Science (Computer Networks & Security) is offered either on a full-time basis or part-time by the Universiti Teknologi Malaysia. This qualification is full-time 4 years and part-time 6 years.

    United Kingdom (UK)
    Oxford Brookes University in the UK offers a Bachelor of Science (BSc) in Computer Science for Cyber Security which equips learners with the key skills needed for a career in computer science and cyber security.

    Based on the comparisons and Advisory Committee meeting, the South African institution created its own version of an industry-related Advanced Diploma in Information Technology. 

    ARTICULATION OPTIONS 
    This qualification allows possibilities for both vertical and horizontal articulation.

    Horizontal Articulation:
  • Bachelor of Information Technology, NQF Level 7.
  • Advanced Diploma in Information and Communication Technology in Applications Development, NQF Level 7.

    Vertical Articulation:
  • Postgraduate Diploma in Information Technology, NQF Level 8.
  • Bachelor of Science Honours in Information Technology, NQF Level 8. 

  • MODERATION OPTIONS 
    N/A 

    CRITERIA FOR THE REGISTRATION OF ASSESSORS 
    N/A 

    NOTES 
    N/A 

    LEARNING PROGRAMMES RECORDED AGAINST THIS QUALIFICATION: 
     
    NONE 


    PROVIDERS CURRENTLY ACCREDITED TO OFFER THIS QUALIFICATION: 
    This information shows the current accreditations (i.e. those not past their accreditation end dates), and is the most complete record available to SAQA as of today. Some Primary or Delegated Quality Assurance Functionaries have a lag in their recording systems for provider accreditation, in turn leading to a lag in notifying SAQA of all the providers that they have accredited to offer qualifications and unit standards, as well as any extensions to accreditation end dates. The relevant Primary or Delegated Quality Assurance Functionary should be notified if a record appears to be missing from here.
     
    1. Tshwane University of Technology (TUT) 



    All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.