Search our site :

Postgraduate Diploma in Management in Information Systems (CG031INF02)

Curriculum Computer Forensics (INF4016W) Part Time

Summary

The programme comprises two modules:

The Postgraduate Diploma, the coursework for which takes one year part time. Students may stop at that point and obtain the postgraduate diploma by completing a work-related project (see below). Alternatively, if students obtain a sufficiently high academic standard in the coursework component (65%), they may be invited to convert to:

The Part Time Honours, which takes a further year (effectively 9 months) and which is primarily oriented towards research and the production of a technical report (thesis).

The Honours is primarily intended for candidates continuing on from the diploma who have achieved the requisite level of performance. In rare cases, suitable candidates with the necessary background derived from other sources may be considered.

Prerequisites

You should be matriculated with a University Exemption pass (or equivalent) and have at least one of the following:

·       A three year undergraduate degree in information systems or computer science and at least three years relevant commercial experience‚ OR

·       A degree OR NQF Level 7 Diploma in another cognitive field (e.g. BCom‚ BSc‚ LLB) plus at least three years relevant commercial experience with some IT exposure‚ OR

·       Five or more years relevant‚ high-quality full time IT work experience.

 

NB: Places are limited and candidates may be screened via written test and / or interviews. All candidates are evaluated on a competitive basis and a limited number of places will be offered.

 Apply

To apply click ‚ here.

RECOGNITION FOR PRIOR LEARNING APPLICANTS (RPL)

Applicants without a degree, who have five or more years relevant, high-quality full time IT work experience are required to prove Recognized Prior Learning (RPL) and submit a Portfolio of Evidence (POE). Recognized Prior Learning (RPL) may be proven by completing assessment(s). 

RPL PROCESS:

1.    Applicants apply for admission as per the standard UCT admissions process (http://applyonline.uct.ac.za), indicating on the application that they are applying on the grounds of RPL.

2.   The department screens applications, and only those applicants that have a chance of being accepted (based on the evidence they submitted e.g. CV and statement of work experience) may be advised to complete the RPL assessment(s).

3.   Selected candidates are informed of the RPL assessment(s).

4.   There will also be an online submission process to manage the applicant’s Portfolio of Evidence (PoE). 

     A PoE should contain the following:

  • A letter of motivation
  • Reference letters indicating proven work experience
  •  A Curriculum Vitae which includes all Job titles held
  •  A current job description
  • A testimonial from their current line manager

5.   Completion of the assessment requires students to have received a minimum mark of 50% for that assessment.

6.   Applicants who complete the assessment, and whose submitted application documents (motivation letter, CV and statement of work experience) are evaluated as providing evidence of equivalent knowledge may be considered for placement.

7.   Applicants who complete the assessment, but whose application documents are evaluated as NOT providing evidence of equivalent knowledge, will not be admitted.

Apply

Click here  to apply.

Computer Forensics Coursework Outline

Objectives

This course is part of a modular postgraduate programme offered by the Department of Information Systems within the Faculty of Commerce. It is intended for students who have had significant commercial work experience and are currently working in Information Technology (IT), or intend to work in IT in a professional capacity. It aims to impart state of the art knowledge and appreciation in the areas of cyber law, investigation processes, computer and Internet technologies, the management of investigations, and corporate governance. It is highly relevant for anyone involved in computer security and the investigation of high technology crime. The course is suitable for a variety of candidates, including:

  • Someone who has previously completed a three year Information Systems or Computer Science degree at undergraduate level and now wants to progress to postgraduate study or update his/her knowledge. Candidates should have at least a couple of years relevant experience in the work environment.
  • Someone who holds a technikon diploma in information systems or computer science or UNISA Diploma in Datametrics, has at least three years relevant IT experience and wishes to progress to more advanced study.
  • Candidates who do not possess a tertiary qualification in IT, but who have significant practical experience in the field (5 years plus) and wish to formalise their knowledge.
  • Candidates who are graduates in other fields like law or auditing, have relevant commercial experience, and who need obtain a qualification in the field of computer forensics.

Content

The world of high technology crime is changing rapidly. Intended for candidates with business work experience, this programme addresses developments in the field of computer forensics like legal principals, investigation techniques, technologies relevant to computer and high technology crime, storage technologies, operating system principals, computer and Internet security principals, evidence analysis, the management of investigations and corporate governance.

The course cover the following major areas:

  • Legal Principals (South African ICT Act, International cyber Law, handling of evidence, laws relating to privacy and interception of data)
  • Technology (Operating system principals (Windows & UNIX) relating to computer crime, storage principals, analysis of data, preservation of evidence, other technologies (PDA, Cell phone))
  • Project Management (Type of high technology crime, detection & prevention intrusions, management of investigations, reporting, chain of custody, psychological aspects of computer crime)
  • Corporate Governance (Governance, theory of corporate governance, legislation, relationship between corporate governance, IT governance and computer forensics.
Following the course work, the students who do not enroll in the PT Honours programme are required to complete and report on a work-related project which demonstrates clearly how the knowledge gained in the course has been applied in their day-to-day work environment. The nature of the project is flexible but a written project report of no less than 50 pages, as well as a presentation of the report is expected on completion.

Format

This course commences in January.

Candidates are expected to complete their course work in November of the same year and their work related project in the course of the following year, or may continue on to Honours study subject to entrance requirements and other prerequisites.

Honours would normally be completed in a further year of study and include the submission of a Technical Report.

From February to November, there are four full time weeks, one in January, one in April, one in June and one in September. These are intensive and candidates will attend Monday through Friday from 08h30 till late.

A variety of assignments, papers and presentations will be required of students throughout the program.

Two examinations of three hours each are written, one in June and another in November. Candidates are also continuously assessed for their attendance, participation and contribution during the year.

Evaluation

Students will be evaluated on multiple deliverables and overall participation. The provisional 2013 mark allocations are as follows:

Writing Assignment                                                          10%

Written Examination                                                         50%

(A mark of 50% is required to pass the programme)

Assignments                                                                    40%

Students missing more than 20% of the deliverables classes may be asked to leave the programme.

Each of the four modules will be examined. The examinations may be written at the end of each module on dates announced at the start of the semester, and/or in combined papers in June and November.

Guests

During the programme, we may on occasion invite guests from industry and other institutions to participate in some of the sessions. They may be vendors, IT professionals within commercial organizations, or independent experts/consultants. They add richness to the sessions by offering information, critiquing staff and student presentations, participation in discussions and occasional presentations or demonstrations.

Prescribed Books

Readings will be given during the course.

Fees

Please see the UCT Fees Handbook

Contact and Queries
Nocky Bobo (See contact details below)

Last updated : 10 Jan 2017



Staff Members on this course :

Mr. Andrie Stander Senior Lecturer

+27 (0)21 650 4254
Adrie.Stander@uct.ac.za
3.3, Leslie Commerce
View Staff Profile

Additional Information :
Convenor: INF2010S Convenor: INF4016W

Nocky Bobo Administrative Officer

021 650 4670
nocky.bobo@uct.ac.za
Leslie Commerce

Additional Information :
Administrator: Postgraduate Diploma







There are no downloads available.