Code | DE0742 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Name | Quality, Risk and Security Technologies | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Status | Compulsory/Courses of Limited Choice | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Level and type | Post-graduate Studies, Academic | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Field of study | Computer Science | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Faculty | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Academic staff | Ērika Nazaruka, Renāte Strazdiņa | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credit points | 6.0 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Parts | 1 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Annotation |
A modern enterprise's operations are closely related to the application of information and communications technology. For the most part, enterprises cannot remain competitive and viable without resorting to ICT. However, selecting the most appropriate technologies for a specific company requires an understanding of ICT. Some of the most crucial prerequisites for successful deployment of ICT in an enterprise is the quality of technologies chosen, understanding of the risks associated with such technologies and security of the selected technologies. The main topic of the course is an overview of the existing quality, risk and security technologies from the following viewpoints: 1) Process; 2) Activities; 3) Standards; 4) Methods applied; and 5) Best practice examples. To ensure that the aim of the course is successfully attained, theoretical studies are complemented with practical deployment and analysis of the technologies discussed. During the practical part of the course, narratives of quality, risk and security management processes are created, existing methods and standards are applied to real-life enterprises' situation examples and existing technologies are applied in practice.. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Contents |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Goals and objectives of the course in terms of competences and skills |
The goal of the course is to expand the student's knowledge in IT quality, risk and security management, as well as to develop skills in the organization and implementation of quality, risk and security processes. Objectives of the study course: 1) To develop the student's ability to discuss the basic principles and limitations of IT quality, risk and security management; 2) To expand knowledge in the IT quality, risk and security processes and the standards used in them; 3) To improve skills to independently organize the implementation of quality, risk and safety processes, taking into account the goals of the organization and business structure; 4) To improve the skills to perform IT risk analysis and identify potential vulnerabilities in the company, offering scenarios to improve quality and / or risks and / or security processes for real-life examples of business situations. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning outcomes and assessment |
Can discuss and support his / her views on the basic principles, and limitations thereof, of IT quality, risk and security management; The student can explain IT quality, risk and security management. - Positively passed tests and exam.
Criteria: can provide complete answers on the development of secure computer systems, communication technologies, software and methods of their use; can perform situation analysis with proposals for improving the competitiveness of an IT company. Can support their view on necessity of implementation of the IT quality, risk, and security management process and the most effective way depending on organization goals and structure. - Positively passed independent individual assignment. Criteria: can analyze the situation and develop a description of the IT quality and / or risk and / or security management process. Can deploy appropriate tools to designing a quality and / or risk and / or security process in an enterprise (in a certain environment). - Positively performed laboratory and practical assignements, active participation in classes. Criteria: can analyze the situation; can establish the quality and / or risk and / or safety process in the company according to the results of the analysis. Can perform a risk assessment and design improvements. - Positively performed laboratory and practical assignements, active participation in classes. Criteria: can analyze the situation; can create quality and / or risk and / or security process improvement scenarios in the company according to the results of the analysis. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Evaluation criteria of study results |
Active participation in classes - 10%
Tests - 25% Laboratory and practical assignments in groups and individual assignments - 25% Exam - 40% |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Course prerequisites | Information system life cycle, knowledge about ICT infrastructure, knowledge about project management. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Course planning |
|