Course Code: ICT50120
CRICOS Code: 102852G
Course Code: ICT60120 | CRICOS Code: 102853F
This qualification reflects the role of individuals in a variety of information and communications technology (ICT) roles who have significant experience in specialist technical skills, or managerial business and people management skills.
Individuals in these roles carry out complex tasks in a specialist field, working independently, leading a team or a strategic direction of a business. They apply their skills across a wide range of industries and business functions, or as a business owner (sole trader/contractor).
The skills required for these roles may include, but are not restricted to:
- Advanced data management information: creating, designing and monitoring complex systems that store data, and optimising organisational knowledge management.
- Cyber security: protecting sensitive data and information through security architecture, and developing disaster recovery and contingency plans.
- Full stack web development: building advanced user interfaces, developing representational state transfer application program interfaces (REST APIs) and designing user experience solutions.
- Further programming: applying advanced ICT languages to maintain security and manage data.
- IT strategy and organisational development: managing and communicating strategic ICT business solutions.
- Systems development and analysis: modelling and testing data objects, data processes and preferred ICT system solutions.
This course is superseded.
No pre-requisite requirement for this qualification as per course training package.
Course Duration: 78 weeks
Course Fee: AUD $26,000 (Includes Material, Lab Training and Enrolment Fees)
Enrolment Fee: AUD $350
Blended (Face to Face + Online)
|January 2021||April 2021|
|July 2021||October 2021|
*This course is available at Haymarket , Parramatta & Perth Campus.
The following are the Admission requirements of Lead college:
1. 18 years of Age or Above at the time of Enrolment
2. Must have completed Year 12 or equivalent
3. IELTS Overall 6.0 with no band less than 6.0 / TOEFL IBT 60 / PTE Academic 50 / CAE 169 / OET PASS/ GE Advanced Level/ MOI Certificate or equivalent or Diploma level in Australian Qualification
4. Must complete an LLN Assessment – diagnostic process to identify if prospective student required LLN Support
5. Must complete the FaceCruit Interview test with Lead College Admissions Officer
Assessments are designed to provide learners with opportunities to demonstrate they have attained the required skills and knowledge using a range of practically based activities and tasks, as required by recognised standards.
Students will need to successfully complete all units in this course to receive certificate of ICT60120 Advanced Diploma of Information Technology. Learners who partially complete the qualification will receive a Statement of Attainment for the units they are deemed competent.
Graduates of this diploma can explore career paths as:
- Cybersecurity Operation Centre officer
- Computer technical Support Security
- Information security
- Penetration Tester
- Network Audit Officer
- Security system help desk support
- Website/ Network Security Officer
RECOGNITION OF PRIOR LEARNING RPL/ CREDIT TRANSFER
Lead College recognises qualifications issued by other RTOs. Lead College will accept and mutually recognise the qualifications and Statements of Attainment awarded by any other registered training organisation unless precluded by licensing requirements. We can also grant you Credit Transfer for subjects or units you have completed where equivalence can be established between the unit in your course, and the subject or unit you have completed.
Recognition of Prior Learning (RPL) is a process where skills and knowledge that you have gained through work and life experience and other unrecognised training can be formally recognised.
During the entry process and interview stage LEAD College will discuss with you the process and options for RPL. Suitability is often determined on how much experience you have in a certain area, your work history and previous training. If RPL is determined as a possibility for you, you will be provided with a kit that will guide you in working through each unit to determine relevant skills and experience and identify whether you would be able to provide the required evidence.
UNIQUE STUDENT IDENTIFIER (USI) REQUIREMENT
USI is needed for all students studying with LEAD College. From 1 January 2015 for undertaking Nationally Recognised Training delivered by a Registered Training Organisation the students will need to have a Unique Student Identifier (USI). The USI is available online and at no cost to the student. This USI will stay with the student for life and be recorded with any nationally recognised VET course that is completed. Please see the official USI website https://www.usi.gov.au.The student after enrolment is required to create USI (Unique Student Identifier) or allow LEAD College to create an USI on their behalf.
STUDENT SUPPORT WELFARE and GUIDANCE SERVICES
Relevant resources are available at LEAD College to ensure that the students settle in well, smoothly transit life in new places and achieve the required level of competency in all accredited courses. Our staff assists in how to seek help with local welfare and guidance services.
Orientation to assist students is provided by LEAD College as an age and culturally appropriate program. Please refer Pre-enrolment Information Pack at www.leadcollege.edu.au Students will be permitted to attend classes only after they have attended and completed the orientation session for the enrolled courses.
After completing ICT60120 Advanced Diploma of Information Technology (Cyber Security) you may progress to a Bachelor of Information Technology at University or any other related degree course.
The ICT60120 Advanced Diploma of Information Technology requires the completion of the following 16 Units (including 6 core and 10 electives).
|BSBCRT601||Research and apply concepts and theories of creativity|
|BSBWOR502||Lead and manage team effectiveness|
|BSBXCS402||Promote workplace cyber security awareness and best practices|
|ICTICT608||Interact with clients on a business level|
|ICTICT618||Manage IP, ethics and privacy in ICT environments|
|ICTSAD609||Plan and monitor business analysis activities in an ICT environment|
Note: Not all elective units listed may be available to study, please enquire for more information before enrolling.
|Group A Advanced Data Management Information Specialisation|
|ICTDBS604||Build data warehouses|
|ICTDBS605||Develop knowledge management strategies|
|ICTDBS606||Determine database functionality and scalability|
|ICTICT523||Gather data to identify business requirements|
|Group B Cyber Security Specialisation|
|ICTCYS604||Implement best practices for identity management|
|ICTCYS606||Evaluate an organisation’s compliance with relevant cyber security standards and law|
|ICTCYS608||Perform cyber security risk assessments|
|ICTCYS612||Design and implement virtualised cyber security infrastructure for organisations|
|Group C Full Stack Web Development Specialisation|
|ICTICT530||Design user experience solutions|
|ICTPRG535||Build advanced user interfaces|
|ICTPRG553||Create and develop REST APIs|
|ICTSAD612||Implement and maintain uses of containerisation|
|Group D Further Programming Specialisation|
|ICTPRG537||Implement security for applications|
|ICTPRG547||Apply advanced programming skills in another language|
|ICTPRG554||Manage data persistence using noSQL data stores|
|Group E IT Strategy and Organisational Development Specialisation|
|ICTICT611||Develop ICT strategic business plans|
|ICTSAD604||Manage and communicate ICT solutions|
|ICTSAD608||Perform ICT-focused enterprise analysis|
|ICTSAD611||Manage assessment and validation of ICT solutions|
|Group F Systems Development and Analysis Specialisation|
|ICTPRG605||Manage development of technical solutions from business specifications|
|ICTSAD610||Analyse stakeholder requirements|
|ICTSAD612||Implement and maintain uses of containerisation|
|ICTSAD613||Install and configure container orchestration services|
|Group G General electives|
|Advanced Cloud Computing|
|ICTCLD601||Develop cloud computing strategies for businesses|
|ICTCLD602||Manage information security compliance of cloud service deployment|
|Advanced Cyber Security|
|ICTCYS603||Undertake penetration testing for organisations|
|ICTCYS607||Acquire digital forensic data|
|ICTCYS609||Evaluate threats and vulnerabilities of IoT devices|
|Application and Software Development|
|ICTPRG549||Apply intermediate object-oriented language skills|
|ICTPRG603||Develop advanced mobile multi-touch applications|
|ICTPRG614||Create cloud computing services|
|Cyber Security Network Operations|
|ICTCYS601||Create cyber security standards for organisations|
|ICTCYS602||Implement cyber security operations|
|ICTCYS611||Configure security devices for organisations|
|ICTDBS505||Monitor and improve knowledge management systems|
|BSBPMG513||Manage project quality|
|BSBPMG517||Manage project risk|
|BSBPMG520||Manage project governance|
|ICTICT505||Determine acceptable developers for projects|
|ICTICT529||Organise and lead agile projects|
|ICTPMG612||Manage ICT project initiation|
|ICTPMG613||Manage ICT project planning|
|ICTPMG614||Manage ICT project delivery|
|ICTPMG615||Manage ICT project closure|
|ICTPMG616||Manage ICT project systems implementation|
|ICTPMG617||Plan and direct complex ICT projects|
|ICTSAS522||Manage the testing process|
|IT Work Ready Skills|
|ICTICT522||Evaluate vendor products and equipment|
|ICTICT612||Develop contracts and manage contract performance|
|ICTICT613||Manage the use of development methodologies|
|ICTICT616||Develop communities of practice|
|ICTICT617||Lead the evaluation and implementation of current industry specific technologies|
|ICTSAD602||Conduct knowledge audits|
|ICTSAD605||Elicit ICT requirements|
|ICTSUS601||Integrate sustainability in ICT planning and design projects|
|PSPPCM023||Manage strategic contracts|
|CPPSEC3124||Prepare and present evidence in court|
|CPPSEC5003||Assess security risk management options|
|CPPSEC5004||Develop security risk management plans|
|CPPSEC5005||Implement security risk management plans|
|CPPSEC5006||Develop strategies to implement advanced technology security systems|
|ICTNWK537||Implement secure encryption technologies|
|ICTNWK538||Install and maintain valid authentication processes|
|ICTNWK539||Design and implement integrated server solutions|
|ICTNWK540||Design, build and test network servers|
|ICTNWK541||Configure, verify and troubleshoot WAN links and IP services|
|ICTNWK544||Design and implement a security perimeter for ICT networks|
|ICTNWK549||Design ICT security frameworks|
|ICTNWK552||Install and configure network access storage devices|
|ICTNWK553||Configure enterprise virtual computing environments|
|ICTNWK554||Manage enterprise virtual computing environments|
|ICTNWK556||Identify and resolve network problems|
|ICTNWK557||Configure and manage advanced virtual computing environments|
|ICTNWK558||Monitor and troubleshoot virtual computing environments|
|ICTNWK559||Install an enterprise virtual computing environment|
|ICTNWK603||Plan, configure and test advanced internetwork routing solutions|
|ICTNWK604||Plan and configure advanced internetwork switching solutions|
|ICTNWK605||Design and configure secure integrated wireless systems|
|ICTNWK606||Implement voice applications over secure wireless networks|
|ICTNWK610||Design and build integrated VoIP networks|
|ICTNWK611||Configure call processing network elements for secure VoIP networks|
|ICTNWK612||Plan and manage troubleshooting advanced integrated IP networks|
|ICTNWK613||Develop plans to manage structured troubleshooting process of enterprise networks|
|ICTNWK615||Design and configure desktop virtualisation|
|ICTNWK617||Configure and manage a storage area network|
|ICTNWK618||Design and implement a security system|
|ICTNWK619||Plan, configure and test advanced server-based security|
|ICTNWK620||Design and implement wireless network security|
|ICTNWK621||Configure network devices for a secure network infrastructure|
|ICTNWK622||Configure and manage intrusion prevention system on network sensors|
|ICTSAS517||Use network tools|
|Strategy and Business Management|
|BSBINN601||Lead and manage organisational change|
|BSBMGT608||Manage innovation and continuous improvement|
|BSBPMG518||Manage project procurement|
|ICTICT614||Identify and implement business innovation|
|ICTICT615||Implement knowledge management strategies|
|ICTSAD507||Design and implement quality assurance processes for business solutions|
|ICTSAD508||Develop technical requirements for business solutions|
|ICTSAS602||Implement change management processes|
|Web design and Development|
|ICTWEB513||Build dynamic websites|
|ICTWEB514||Create dynamic web pages|
|ICTWEB517||Create web-based programs|
|ICTWEB519||Develop complex web page layouts|
Course Code: ICT60120
CRICOS Code: 102853F
Course Code: ICT60615
CRICOS Code: 102349M