You are eligible if you meet our stipulated entry requirements.
Enter the course name to discover your desired programme.
You are eligible if you meet our stipulated entry requirements.
The aim of this course is to develop learners’ understanding of reflective practice in leading an organisation and planning for personal development so that they can apply it in an educational context.
This course aims to develop learners’ knowledge and use of information technology including the use of standard office applications to prepare documents and presentations. This includes computer software and hardware, basic computer operations, application software, operating systems, information systems and IT-related issues in computing.
The course also seeks to provide learners with an awareness of ethical issues essential to an IT professional. This includes ethics in the cyberspace, intellectual property, privacy, the issue of security and reliability, how computing affects our health, professional code of ethics and how IT changes our daily lives.
The aim of this course is to provide learners with a thorough understanding of the link between current educational research and practice by developing understanding of educational theory, policy and practice.
The "Corporate Governance and Globalisation" module aims to provide professionals with a sound understanding of the concept of Corporate Governance and global best practices in this field. By exploring the four pillars of governance and learning how to formulate and implement proper strategies aligned with an organisation's goals, learners will gain an in-depth understanding of the importance of good Corporate Governance practices. The module also covers the impact of globalisation on corporate governance and teaches learners how to adopt good Corporate Governance practices to ensure an organisation's sustainability and resilience in a rapidly changing global business environment. By the end of the module, learners will have the knowledge and skills necessary to become responsible corporate leaders who can navigate the challenges of globalisation and ensure the long-term success of an organisation.
This course aims to provide the knowledge needed to administer a system in Linux and Windows. Topics covered include user and group management; file system management; task automation; shell scripting; Dynamic Host Configuration Protocol (DHCP) servers; mail servers; domain name servers; files and printers sharing; basic utilities and tools; application management; registry; local and group policies; backup policies; restore policies and performance tuning.
Knowing how to build a cyber defense strategy, what legal tools require consideration, how policies can be written and embedded, are all vital ingredients to successful in-house cyber security practices.
In this unit the learner will bring together knowledge acquired from previous units and build on this in relation to developing plausible strategic plans, executive buy-in and legal compliance. Key questions and challenges are posed: What is ‘strategy’ and what can a ‘cybersecurity’ strategy’ look like? How do we achieve senior-level buy-in? How do we monitor and safeguard compliance, particularly if our operations are dispersed across a multinational environment? What are the key legal requirements and industry standards that can assist and enhance our cyber security strategies and practices?