Diploma in Computer Science and Cloud Security via Online Distance Learning

Enrolment date: 15 December 2017

Benefiting from over 30 years’ practical skills training experience, Fitzwilliam Institute’s Online Diploma in Computer Science and Cloud Security course features:

  • Comprehensive modules covering all aspects of both Computer Science and Cloud Security: Computer Systems, Communication and Information, Microprocessor Systems, Operating Systems, Mathematics for Computing, Algorithms, Data Structure and Computability, Databases, CSS, JavaScript, Java Applications, Using Classes and Objects, Control Statements and Methods, Arrays, GUI Programming, Cloud Computing, Computer Security, Cloud Computing Architecture, Virtualisation, Cloud Computing Life Cycle, Developing a Cloud Strategy, Computer Security, and many more.
  • Interactive course expert support, advice and guidance from leading industry professionals. Always ready to help or answer any questions you might have throughout the course, all of our course experts are top industry professionals with many years of successful experience. Our Diploma in Computer Science and Cloud Security contains the core and vital industry key skillset and, on completion, all of our students are industry-ready.
  • Real life computer science and cloud security briefs. Fitzwilliam Institute’s Diploma in Computer Science and Cloud Security offers practical and specific skills that can be applied in real world situations. You will gain exposure to invaluable toolkits and resources and prepare real life Computer Science and Cloud Security briefs, which will enable you to improve your work portfolio.
  • Flexible online learning. Fitzwilliam Institute’s Diploma in Computer Science and Cloud Security course can be completed in your own time, from the comfort of your own home, to suit your lifestyle. You will have full access to online resources and subject expert support for one calendar year. However, you can complete the course in as little as 4-6 months, by dedicating 6-8 hours of study per week.
  • Jobs, Networking and Volunteer Opportunities. Benefiting from many years of industry experience, we are extremely well placed within the industry. Employers are always looking for Fitzwilliam Institute’s students and alumni. Our website features a comprehensive jobs and volunteer opportunities section.

Computer Systems

Computer Architecture; Machine Language; Program Execution; Arithmetic/Logic Instructions; Communicating with Other Devices; Other Architectures; Network Fundamentals; the Internet; the World Wide Web; Internet Protocols; Security; The History of a Computing Hardware; The History of a Computing Software;

Communication and Information

Managing Information; Thinking Machines; the Turing Test; Aspects of AI; Knowledge Representation; Semantic Networks; Search Trees; Expert Systems; Networking; Types of Networks; Internet Connections; Packet Switching; Open systems and protocols; TCP/IP; High- Level Protocols; MIME types; Firewalls; Information Retrieval; Organisation;

Microprocessor Systems

CPU Scheduling; Memory Process and CPU management; Batch Processing; Multiprocessor Operating Systems; Computers and Electricity; Gates 94; Gate 96; XOR gate 96; NAND and NOR gates 97; Transistors; Combinational Circuits; Adders; Multiplexers; Circuits as Memory; Integrated Circuits; CPU Chips; Individual Computer Components; Stored-program Concept; von Neumann Architecture; The Fetch-Execute Cycle; RAM and ROM; Secondary Storage Devices; Touch Screens; Embedded Systems; Parallel Computing; Parallel Hardware;

Operating Systems

The History of Operating Systems; Operating System Architecture; Coordinating the Machine’s Activities; Handling Competition among Processes; Security Roles of an Operating system; Memory Management; Process Management; Capabilities of the Hardware; Single User OS – Network OS; Real-time Operating Systems; Embedded Systems; Management of Input and Output; Processes and Scheduling; Threads; Synchronization; Semaphores; Monitors; Deadlock; Scheduling; Memory Management;

Mathematics for Computing

Numbers and Computing; Positional Notation; Binary; Octal and Hexadecimal; Arithmetic in other Bases; Power-of-2 Number Systems; Converting from Base 10 to other Bases; Binary Values and Computers;

Algorithms, Data Structures and Computability

The Definition of an Algorithm; The Role of Algorithms; The Science of Algorithms; The Concept of an Algorithm; Algorithm Representation; Unsolvable Problems; Analyzing Algorithms; Algorithms with Simple Variables; Composite Variables; Algorithm Discovery; Iterative Structures Recursive Structures; Efficiency and Correctness;

Databases

Spreadsheets; Spreadsheet Formulas; Circular References; Spreadsheets Analysis; Database Management Systems; the Relational Model; Relationships; Structured Query Language; Database Design; E-Commerce; The Ubiquitous Database; Database types; Advantages of Using a Database; Modelling the Data Domain; Building a relational Database from the Data Model; Normalisation; SQL; DDL; DML; Storied Procedures; Triggers; Data Integrity; Transaction Isolation Levels; Accessing the Database Programmatically;

Introduction to Computers and the Internet

Organization; Machine Languages; Assembly Languages and High-Level Languages; History of the Internet and World Wide Web; World Wide Web Consortium (W3C); Web; Personal; Distributed and Client/Server Computing; Hardware Trends; Object Technology; JavaScript: Object-Based Scripting for the Web; Browser Portability; C; C++ and Java; BASIC; Visual Basic; Visual C++; C# and ;NET; Software Technologies;

Web Browser Basics: Google Chrome

Introduction to the Google Chrome Web Browser; Connecting to the Internet; Features; Customizing Browser Settings; Searching the Internet; Keeping Track of Your Favorite Sites; File Transfer Protocol (FTP); Online Help; Other Web Browsers;

Understanding Web 2.0

What Is Web? Search; Content Networks; User-Generated Content; Blogging; Social Networking; Social Media; Tagging; Social Bookmarking; Software Development; Rich Internet Applications (RIAs); Web Services; Mashups; Widgets and Gadgets; Location-Based Services; XML; RSS; Atom; JSON and VoIP; Web Monetization Models; Web Business Models; Future of the Web; Where to Go for More Web; Information; Web Bibliography; Web Glossary;

Introduction to XHTML

Editing XHTML; First XHTML Example; W3C XHTML Validation Service; Headings; Linking; Images; Special Characters and Horizontal Rules; Lists; Tables; Forms; Internal Linking; meta Elements;

Cascading Style Sheets (CSS)

Inline Styles; Embedded Style Sheets; Conflicting Styles; Linking External Style Sheets; Positioning; Elements; Backgrounds; Element Dimensions; Box Model and Text Flow; Media Types; Building a CSS Drop-Down Menu;User Style Sheets; CSS 3;

JavaScript: Introduction to Scripting

Simple Program: Displaying a Line of Text in a Web Page; Modifying Our First Program; Obtaining User Input with prompt Dialogs; Dynamic Web Page; Adding Integers; Memory Concepts; Arithmetic; Decision Making: Equality and Relational Operators;

JavaScript: Control Statements

Algorithms; Pseudocode; Control Structures; if Selection Statement; while Repetition Statement; Formulating Algorithms: Counter-Controlled Repetition; Formulating Algorithms: Sentinel-Controlled Repetition; Formulating Algorithms: Nested Control Statements; Assignment Operators; Increment and Decrement Operators; Essentials of Counter-Controlled Repetition; for Repetition Statement; Examples Using the for Statement switch Multiple-Selection Statement; break and continue Statements; Labeled break and continue Statements; Logical Operators; Summary of Structured Programming;

Human Computer Interaction

Modularity; Tools of the Trade; Quality assurance; Documentation; The Human- Machine Interface; Neural Networks – Biological/Artificial Neural Networks; Natural Language Processing; Voice Synthesis; Voice Recognition; Natural Language Comprehension; Robotics; The Sense-Plan-Act Paradigm; Physical Components;

Fundamentals of Programming and Program Design

Computer Operations; Machine Language; Assembly Language; Expressing Algorithms; Generations of Languages; Compilers and Interpreters; Virtual Machines; Procedural Programming; Object- Orientated Programming; Scripting Languages; Functional Languages; Language Design; Language Syntax and Semantics;

Creating Java Applications

Introduction to Java Applications; Using the javac command to compile Java applications; Using the java command to run Java applications; Displaying Text with printf; Variables and Introducing Arithmetic Operators; Equality and Relational Operators;

Using Classes and Objects

Classes; Objects; Methods and Instance Variables; Declaring Class and Methods; Instantiating an Object of a Class; Declaring a Method with a Parameter; Instance Variables; set Methods and get Methods; Primitive Types vs; Reference Types; Initializing Objects with Constructors; Floating-Point Numbers and Type double;

Control Statements and Methods

"if" Single-Selection Statement; "if" ;;; else Double-Selection Statement; while Repetition Statement; Counter-Controlled Repetition; Sentinel-Controlled Repetition; Nested Control Statements; Compound Assignment Operators; Increment and Decrement Operators; Primitive Types; Essentials of Counter-Controlled Repetition; break and continue Statements; Logical Operators; Static Methods; static Fields and Class Math; Notes on Declaring and Using Methods; Method-Call Stack and Activation Records;

Arrays

Declaring and Creating Arrays; Examples Using Arrays; Enhanced for Statement; Passing Arrays to Methods; Multidimensional Arrays;

Classes and Objects and Inheritance

Classes and Objects; Inheritance: Constructors and Subclasses;

Polymorphism and Exception Handling

Polymorphism Overview; Creating Interfaces and Drawing with Polymorphism; Exception Handling;

Database and JDBC

Databases: SQL, MySQL, JDBC and Java DB;

GUI Programming

Computer Graphics and Modelling; Computer Rendering and Animation;

Software Engineering

The Software Lifecycle; Methodologies, Ownership and Liability; Reading a Software License; Software Disasters;

Computer Security

Computer Threats; Preventing Computer Threats;

Introduction to Cloud Computing

Defining a Cloud; History of Cloud Computing; The Value of Cloud Computing; Cloud Glossary of Terms; The Value of Cloud Computing;

Cloud Computing Architecture

Architectural Layers; Design Patterns;

Virtualization

Introduction to Virtualisation; Virtualisation Uses; Cloud Computing and Virtualisation;

Best Practices and Standards

Practices and Standards; Cloud Checklist; Cloud Contracts; Data Processing and Storage; Example Contract Clauses; Vendor Relationships; Standards Groups; The Distributed Management Task Force;

Cloud Computing Life Cycle

Computer Life Cycles; Cloud Life Cycle differences; Implementing a Cloud Computing Life Cycle; Life Cycle Issues; Lifecycles and Security; Cloud Service Lifecycle; Cloud Lifecycle Management; Adoption Lifecycle; Data Security Lifecycle; Systems Development Lifecycle; Virtualization Lifecycle; Application Lifecycle;

Developing a Cloud Strategy

Strategic Analysis; Questioning Your Strategy; Maturity Models; Cloud Maturity Model; 6 Levels of Maturity; External Analysis; PEST; Porter's Five Forces; Porter's Diamond; Internal Analysis; Growth Share Matrix; Strategic Re-Alignment; SWOT Analysis;

Computer Security 

Ethics Theories; Intellectual Property; Privacy; Encryption; Viruses; Worms and Trojan Horses; Hackers; Can Computers kill?; Information Security; Preventing unauthorized Access; Malicious Code; Antivirus Software; Security attacks; Passwords; CAPTCHA; Fingerprint Analysis; Cryptography; Security and Portable Devices; WikiLeaks;

Introduction to Cloud Computing

History of Cloud Computing; How Cloud Computing started; The companies behind the creation of Cloud Computing; What is the cloud? Defining the characteristics of the cloud; Cloud Service models; Cloud Deployment Models; Community and Hybrid Clouds;

Cloud Computing Architecture

Introduction to Cloud Computing Architecture; Horizontal and Vertical Scaling; Architectural Layers of Cloud Environments; Design Patterns; Assessing Design Patterns

Introduction to Cloud Security

Overview of Cloud Security; Cloud Security Alliance; Software Assurance Initiative; CIA Triad of Information System Security; Integrity; Availability; Cloud Security Services; Authentication; Authorization; Auditing; Accountability; Failsafe Security; Economy of Mechanism; Complete Mediation; Open Design; Least Common Mechanism; Weakest Link; Leveraging Existing Components; Secure Cloud Sofware Requirements; Secure Development Practices; Handling Data; Code Practices; Language Options; Input Validation and Content Injection; Monitoring Internal and External Requirements; NIST 33 Security Principles;

Virtualization

Introduction to Virtualization; History of Virtualization; Virtualization vs; Abstraction; Resource Virtualization; The need for Virtualization; Benefits of Virtualisation; Limitations of Virtualisation; Virtualization Concepts and Definitions; Traditional and Contemporary Virtualization; Virtualization Uses;

Best Practices and Standards

Practices and Standards; Cloud Checklist; Cloud Contracts; Data Processing and Storage; Example Contract Clauses; Vendor Relationships; Standards Groups; The Distributed Management Task Force;

Cloud Computing Life Cycle

Computer Life Cycles; Cloud Life Cycle Differences; Implementing a Cloud Computing Life Cycle; Life Cycle Issues; Lifecycles and Security; Cloud service Lifecycle; Cloud Lifecycle Management; Adoption Lifecycle; Data Security Lifecycle; Systmes Development Lifecycle; Virtualization Lifecycle; Application Lifecycle;

Developing a Cloud Strategy

Strategic Analysis; Questioning Your Strategy; Maturity Models; Cloud Maturity Model; 6 Levels of Maturity; External Analysis; PEST; Porter's Five Forces; Porter's Diamond; Internal Analysis; Growth Share Matrix; Strategic Re-Alignment; SWOT Analysis;

Cloud Security Architecture

Introduction to Security Architecture; Shared Responsibility; Cloud Security Threats and Mitigation; Public/ Hybrid Cloud threats; Private Cloud Threats; Threat to Cloud Service Availability; Clouyd Security Architecture Plan; Security as a Servcie Architecture; Cloud Security Principles; Cloud Security Architecture Patterns;

Cloud Security Challenges

Security Policy Implementation; Policy Types; Senior Management Statement of Policy; Regulatory Policies; Advisory Policies; Informative Policies; Computer Security Incident Response Team; Virtualization Security Management; Virtual Enviornment Types; Virtualization Management Roles; Virtual Threats;

Identity and Access Management

Introduction to Identity and Access Management; Identity Provisioning and Storage; Authentication; Authorization; IAM Providers; Federated services and their IAM use; Claims Based Security; Roles and Permissions;

Cloud Governance

What is Cloud Governance? Managing the Cloud; IT Governance; Governing the Cloud; Deciding on a Governor; Imagining a Scenario; Knowing the Risks of Running in the Cloud; Compliance and Risk Measures; Understanding Risks; Deducing IT Risk; Monitoring and Measuring IT;

On successful completion of this course you will receive a Diploma level qualification that is certified and awarded by the ICM (Institute of Commercial Management)

The Institute of Commercial Management was founded in 1979 and is one of the leading Professional Examination and Certification Bodies in the world today. Fitzwilliam Institute have developed and provided practical skills training courses in liaison with the Institute of Commercial Management qualifications and certifications framework for over 25 years. The Institute of Commercial Management certifications and continual professional development training awards are recognised by leading industries, bodies and professions.

next start date: 15th December 2017

Duration: You will have full access to online resources and subject expert support for one calendar year. However, you can complete the course in as little as 4 - 6 months, by dedicating 6-8 hours of study per week.

Course Fees: 795.00 GPB

To secure your place on the course the full fee is required. All fees must be paid in full before the course begins. Please note, the full course fees are inclusive of all course materials and certification costs.

Enrolment intake is strictly limited on this course. Early application is advised. Places are allocated on a first come first served basis.

Fitzwilliam Institute closes on Bank Holidays and for a number of days at Christmas and New Year. Fitzwilliam Institute reserves the right to postpone, cancel or alter courses without notice or to change any of the details in this brochure. Fees are not refundable unless the course is cancelled by Fitzwilliam Institute. Distance Learning courses are provided by Fitzwilliam Institute BGLS Ltd.

Year on year, we have the pleasure of training students from top UK and international companies. See where our most recent students come from and find out what they have to say.