Postgraduate Diploma in Information Technology
Purpose:
Source: SAQA official qualification record. Yiba Verified does not own the underlying qualification data shown on this page.
Qualification type
Postgraduate Diploma
Credits
120
Sub-framework
HEQSF - Higher Education Qualifications Sub-framework
Providers listed
1
Qualification snapshot
Official qualification identity fields captured from the qualification record.
Originator
Tshwane University of Technology (TUT)
Quality assurance functionary
CHE - Council on Higher Education
Field
Field 10 - Physical, Mathematical, Computer and Life Sciences
Subfield
Information Technology and Computer Sciences
Qual class
Regular-Provider-ELOAC
Recognise previous learning
Y
Important dates
These dates are carried directly from the qualification record.
Registration start
2019-07-25
Registration end
2027-06-30
Last date for enrolment
2028-06-30
Last date for achievement
2031-06-30
Purpose and entry context
Official SAQA text formatted for easier reading.
Purpose and rationale
Purpose
A qualifying learner will be able to demonstrate an ability to use a range of specialised skills to identify, analyse and address complex or abstract problems drawing systematically on the body of knowledge and methods appropriate to a computer networks and security. The learner will be able to apply, in a self-critical manner, learning strategies which effectively address his or her professional and ongoing learning needs and the professional and ongoing learning needs of others in the context of computer networks and security.
Learners will also have the ability to operate effectively within a computer networks or security system, or manage a system based on an understanding of the roles and relationships between elements within the system.
Qualifying learners of this qualification will be able to
- Apply knowledge of computing and logic appropriate to the discipline.
- Effectively integrate Information Technology(IT) based solutions into the user environment.
- Understand best practices, standards and their applications.
- Create and manage an effective project plan; function effectively on teams to accomplish a common goal.
- Communicate effectively with a range of audiences; engage in continuing professional development.
- Understand issues and responsibilities related to professionalism, ethics, legalities, security and society.
Rationale
The problem of skills shortage in South Africa poses a significant limitation on the country's short and long-term economic growth potential. Several organs of government such as Information and Communications Technology (MICT) Sector Education and Training Authority (SETA's), the Career Junction Index (CJI) and the media report have confirmed the high demand of Information technology experts in South Africa. Through vigorous meetings with local industries, this qualification was designed.
This qualification will enable the learner to develop the knowledge and technical expertise to be able to take on specific responsibility within a network/security team or as a team leader for the security aspects of that network, particularly in industries such as banking, where security is crucially important and telecommunication industries. The focus is on the steps and strategies that can be adopted to mitigate security threats; design and manage networks; and build a solid foundation on internet or network applications.
Entry requirements and RPL
Recognition of Prior Learning (RPL)
Recognition of Prior Learning (RPL) may be used to demonstrate competence for admission to this qualification. RPL may also be used to obtain credits for some learning outcomes. Evidence of prior learning will be assessed through formal policies and procedure.
Entry Requirements
The minimum entry requirement for this qualification is
- A Bachelor's Degree in Information Technology.
Or
- An Advanced Diploma in Information Technology.
Or
- A Bachelor of Technology Degree in Information Technology specialised in Communication Networks or Computer Security.
Replacement note
This qualification does not replace any other qualification and is not replaced by any other qualification.
Structure and assessment
Qualification rules, exit outcomes, and assessment criteria from the SAQA record.
Qualification rules
This qualification consists of compulsory and elective modules at Level 8, totalling 120 Credits.
Compulsory Modules: 60 Credits
- Principle of Research V, 15 Credits.
- Social Engineering and New Trends in Networks, 15 Credits.
- Network Research Project V, 15 Credits.
- Digital Forensics V, 15 Credits.
Electives Modules: 60 Credits (Select four modules in the area of specialisation (Computer Networks or Computer Security).
Computer Networks
- Computer Networks 501, 15 Credits.
- Network Management 501, 15 Credits.
- Computer Networks 502, 15 Credits.
- Software Defined Networks 502, 15 Credits.
Or
Computer Security
- Computer Security 501, 15 Credits.
- Security policy and governance 501, 15 Credits.
- Cryptography 502, 15 Credits.
- Ethical Hacking 502, 15 Credits.
Exit level outcomes
- Synthesise a digital investigation approach, the sources of digital evidence, and the limitations of forensics from literature.
- How to write a report in a team environment based on research of the latest trends.
- Describe Wide Area Network(WAN) technologies and network services required by converged applications in enterprise networks.
- Examine the technologies used by both web applications and by web services.
- Application of Network management from several different angles, culminating in a project of how these aspects are combined into management reference models.
- Synthesise the concept of privacy including personally private information, potential violations of privacy due to security mechanisms, and describe how privacy protection mechanisms run in conflict with security mechanisms from recent literature.
- Implement principles of network design, such as layering, packet switching, and the end-to-end argument,
- Explain how public key infrastructure supports digital signing and encryption and discuss the limitations/vulnerabilities.
- Apply research principles to analyse how has Software Defined Networking(SDN) been shaping networking research and industry.
- Propose a researched solution for an organisation on ethical hacking.
- Apply forensics tools to investigate security breaches.
- Apply research to integrate and design solution to topical problems in network security or network design/management for an organisation.
Associated assessment criteria
Associated Assessment Criteria for Exit Level Outcome 1
- Explain methods on how to design software to support forensics.
- Describe the legal requirements for use of seized data.
- Create the process of evidence seizure from the time when the requirement was identified to the disposition of the data from literature.
- Compile and compare procedures on how data collection is accomplished and store the original and forensics copy.
- Demonstrate how to conduct data collection on a hard drive.
Associated Assessment Criteria Exit Level Outcome 2
- Analyse and discuss the selection of papers spanning a wide spectrum of topics in computer networks, including internet and multimedia, security and cryptography, wireless networks, parallel and distributed computing, and performance evaluation.
- Demonstrate and discuss social engineering concepts, techniques and countermeasures.
- Examine new trends in networking technology.
- Explain and apply ethical, privacy and security issues and measures in the online social network ecosystem.
Associated Assessment Criteria Exit Level Outcome 3
- Introduce and compare integrated network services and select the appropriate devices and technologies to meet network requirements.
- Demonstrate how to detect, troubleshoot, and correct common enterprise network implementation issues through simulation (e.g., OPNET system).
- Figure out how to implement and configure common data link protocols and apply Wide Area Network(WAN) security concepts, principles of traffic, access control, and addressing services to a project.
Associated Assessment Criteria for Exit Level Outcome 4
- Explain and summarise the implications of client-side technologies (Java Script and Java applets) used in web applications.
- Identify and discuss implications of XML security technologies.
- List and apply the authentication methods used for both web applications and web services.
- Apply the techniques used for secure programming in a project.
- Discuss and justify procedures to identify, explain and detect common vulnerabilities associated with web applications.
Associated Assessment Criteria for Exit Level Outcome 5
- Present an overview of what network management is about and why it is relevant.
- Summarise the different building blocks of network management, such as management protocols, management organisation, management communication patterns and functions, tools, and activities associated with it.
Associated Assessment Criteria for Exit level outcome 6
- Identify and analyse methods on how an attacker can infer a secret by interacting with a database.
- Demonstrate how to set a data backup, password refresh and breach disclosure policy.
- Describe the consequences of data retention policies.
- Identify the risks and benefits of outsourcing to the cloud.
Associated Assessment Criteria Exit Level Outcome 7
- Compile growth and control of the Internet into a project.
- Compare daily life before and after the advent of personal computers and the Internet.
- Discuss organisation of the Internet (Internet Service Providers, Content Providers, etc.) is.
- Describe internet technologies and network technologies.
- Identify and discuss protocols used to enhance Internet communication, and choose the appropriate protocol for a particular case.
Associated Assessment Criteria Exit Level Outcome 8
- Compare and discuss basic Cryptography Terminology covering notions pertaining to the different (communication) partners, secure/unsecure channel, attackers and their capabilities, encryption, decryption, keys and their characteristics and signatures.
- List and discuss the purpose of cryptography and the ways it is used in data communications.
- Summarise the role of cipher, cryptanalysis, cryptographic algorithm, and cryptology, and two basic methods (ciphers) for transforming plain text in cipher text.
Associated Assessment Criteria Exit Level Outcome 9
- Explore the current state of the Open-Flow model and centralised network control.
- Examine The structure and capabilities of commercial and open source controllers.
- Survey the available technologies for network programmability.
- Trace the modern data centre from desktop-centric to highly distributed models.
- Compile the rational for Software Defined Networking(SDN) through recent literature.
- Compile and discuss information on construction and maintenance of an SDN network topology.
Associated Assessment Criteria Exit Level Outcome 10
- Research how intruders escalate privileges.
- Propose a solution.
Associated Assessment Criteria Exit Level Outcome 11
- Identify and explain the sources of digital evidence, and the limitations of forensics.
- Demonstrate how to recover data based on a given search term from an imaged system.
- Explain the reconstruction of an application history from application artefacts.
- Explain the reconstruction of a web browsing history from web artefacts.
- Demonstrate how to capture and interpret network traffic.
- Discuss the challenges associated with mobile device forensics.
Associated Assessment Criteria Exit Level Outcome 12
- Identify and discuss research principles and techniques.
- Demonstrate recent articles and access databases from the library.
Progression and comparability
Articulation options
This qualification allows for both horizontal and vertical articulation possibilities
Horizontal Articulation
- Bachelors Honours in Information Technology, Level 8.
- Postgraduate Diploma in Information Technology, Level 8.
Vertical Articulation
- Master of Information Technology, Level 9.
International comparability
The Postgraduate Diploma in Information Technology is comparable favourably in structure of Computer Science Curricular as done by Joint Task Force on Computing Curricula association for Computing Machinery (ACM) and IEEE Computer Society and with international universities from United Kingdom, Australia and United States of America. There are few countries that offer Postgraduate Diploma in Information Technology or Postgraduate Diploma in Information Security.
Country: Australia.
Institution: The Northern Sydney Institute.
Provide high-level Information and Communications Technology(ICT) technical base with appropriate security units and the ability to specialise in a number of areas, including voice, wireless, network infrastructure.
Country: United States of America.
Institution: Carnegie Mellon University.
The Carnegie Mellon University organise their curriculum following topics: Assurance process and management, Assurance across the life cycle, Risk management, Assurance assessment, Assurance management Assurance product and technology, System security assurance, Potential attack methods, Analysis of threats to software, Methods of defence, System functionality assurance, System operational assurance.
Country: United States of America.
Institution: The University of Kent.
The University of Kent qualification is similar to this qualification in that it provides a broad coverage of computer networks, computer security and mobile device technologies and also looks in depth at some of the security issues that fixed and wireless networks are subject to, and the current solutions employed to address these problems.
Country: United Kingdom.
Institution: Oxford Brookes University.
Oxford Brookes University offers similar courses as this qualification: Network Security, Advance networking, Network Systems Management.
Providers currently listed
This reflects provider names published on the official record. It is useful for qualification discovery, but it should not be treated as a substitute for checking the relevant quality body’s latest provider status.
Related Qualifications
Explore other relevant certificates and degrees in this field.
Purpose:
The Diploma intends as specialised training for people who intend qualifying as Chartered Accountants.
Purpose:
Purpose:
Purpose:
Purpose:
Use this qualification in your readiness workflow
Once the qualification identity is clear, your institution can structure the readiness work around the right title, NQF level, dates, and supporting records instead of rebuilding that story later.