eaf49544-d4db-49f2-9b16-0af743a09020 zoom

Hover

eaf49544-d4db-49f2-9b16-0af743a09020
Full Screen

Information Technology Planning

2.500,00 $

The fundamental concepts of information systems with historical and evolutionary
perspectives. Systems, organizational and strategic role and added value of information
systems, decision support systems, data mining, Management information systems
(MIS), information systems planning, data management, computer networking, internet,
analysis, design, development, and maintenance of information systems, competitive
edge of information systems.

25 Seats

  Ask a Question
Center
Categories: ,
Start Date End Date Proposed time
September 5, 2021 September 11, 2021 08:00 To 04:00

Description

COURSE OBJECTIVES

After successfully completing this unit, students should be able to:

* Explain the components of Information Systems and how they support organizational strategy to achieve competitive advantage.
* Develop an understanding of hardware and software on which different information systems are built.
* Develop insights into the management of data, distinguish between Data, Information, and Knowledge and manage data using Data Bases, Data Base Management Systems, Data Warehouses, and Data Marts.
* Describe components of computer networks and how computer networks are built.
* Discuss the role of Transaction Processing Systems (TPS), Functional Area Information Systems (FAIS), and others that support internal business operations.
* Explain Decision Support Systems and Business Intelligence and the role they play in enhancing the performance of a firm.
* Debate how strategic information systems SCM and CRM provide a sustainable competitive advantage to firms.
* Discuss how strategic information system ERP provides a sustainable competitive advantage to firms.
* Describe World Wide Web and explain the increasingly important role E-commerce and Mobile commerce are playing in the business landscape.
* Plan and execute information system development or acquisition effectively.
* Understand cybercrime and potential threat to information security and develop effective strategies to deal with security issues.
* Discuss privacy and ethical issues in relation to Information systems.

COURSE OUTLINE

Chapter 1: Introduction
1. Strategic role of IS for contemporary organizations

Chapter 2: ORGANIZATIONAL VIEW
2. Information-data-knowledge
3. What is an IS?
4. System environment feedback Business information value chain

Chapter 3: MANAGEMENT VIEW
5. Business processes
6. Transaction processing systems
7. Management information systems
8. Decision support systems
9. Enterprise applications

Chapter 4: ETHICAL AND SOCIAL ISSUES
10. IS and ethics
11. Technological trends raising ethical issues
12. Candidate ethical principles
13. Challenges to privacy and intellectual property

Chapter 5: IT INFRASTRUCTURE
14. Evolution of IT
15. Components
16. hardware
17. operating systems
18. enterprise software applications

19. data management and storage
20. networking/telecommunications
21. Internet
22. system integration services
23. Current trends
24. Quantum computing
25. virtualization
26. cloud computing
27. green computing
28. open-source software
29. web software
30. web services
31. SOA
32. software outsourcing

Chapter 6: BUSINESS INTELLIGENCE
33. File organization
34. Problems with traditional file environments
35. Databases
36. DBMS
37. Relational DBMS operations
38. Data definition
39. data dictionary
40. data manipulation
41. SQL
42. Designing databases
43. Normalization
44. Referential integrity
45. E-R diagrams
46. Tools: big data warehouses Hadoop in-memory computing Data mining text mining web mining

47. Computer networks

48. Client-server architecture
49. Packet switching
50. TCP/IP
51. Network types
52. Bandwidth
53. Physical transmission media
54. The Internet
55. DNS
56. Architecture
57. IPv6
58. VoIP
59. VPN
60. The Web
61. HTML
62. HTTP
63. Web 20
64. Web 30
65. Wireless communication
66. Cellular systems Bluetooth Wi-Fi RFID WSN

Chapter 8: SECURITY
67. System vulnerability
68. Internet vulnerability
69. Wireless security challenges
70. Malware
71. Hackers computer crime
72. Spoofing
73. DoS DDoS
74. Internal threats Software vulnerability Computer forensics
75. General controls
76. Application controls Risk assessment Security policy
77. Disaster recovery
78. IS audit
79. Firewalls
80. Encryption81. Public key infrastructure
Chapter 9: SYSTEMS DEVELOPMENT
82. Business process management
83. Systems development life cycle (SDLC):
*analysis
*design
*coding
*testing
*conversion
*production &maintenance
84. Structured vs object-oriented development
85. Traditional systems life cycle Waterfall process model
86. Prototyping
87. End-user development
88. Application software packages Outsourcing

Chapter 10: CRM Systems
89. Strategic information systems SCM and CRM
90. Providing sustainable competitive advantage to firms

Chapter 11: ERP Systems
91. Strategic information system ERP
92. Providing sustainable competitive advantage to firms

Reviews

There are no reviews yet.

Be the first to review “Information Technology Planning”

Your email address will not be published. Required fields are marked *

Information Technology Planning

Refund Policy

❑ Confirmation of registration is based on receiving a Purchase Purchase History or Registration Form. ❑ Any course cancellation must be done in writing: ❑ No fine fees will be imposed if the cancellation occurred one week before the course starting date. ❑ A 50% cancellation fee will be imposed if the cancellation occurs three days before the course starts. ❑ 100% will be imposed if the cancellation occurred on the date of the course.

General Inquiries

There are no inquiries yet.

Information Technology Planning
2.500,00 $
25 Seats
Cart
  • No Courses in the cart.
دورات بالقرب منك
مراكز بالقرب منك
يرجى التحديد
مدرب
متدرب
مركز
إنضم الينا
يمكنك الانضمام إلينا بسهولة
لديك حساب مسبقًا؟
قابل للتحميل
في الواقع
إفتراضي
إختر نوع الدورة
Online
On Place
Virtual
Select Course Type
Trainer
Client
Training Firm
Join as
You can easily join us in moments
Already Registered?
An individual trainer is an account that centers can search for and nominate for training purposes at centers around the world. You can register in several steps and within a minute you can be among the candidates on our platform.
Start Your Business Now
Business Account Using Catalog
An individual trainer is an account that centers can search for and nominate for training purposes at centers around the world. You can register in several steps and within a minute you can be among the candidates on our platform.
Registration Now!
Trainer Using Catalog
Who we are Our website address is: https://training-inn.com. What personal data we collect and why we collect it Comments When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment. Media If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website. Contact forms Cookies If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day. Embedded content from other websites Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website. Analytics Who we share your data with If you request a password reset, your IP address will be included in the reset email. How long we retain your data If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information. What rights you have over your data If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes. Where we send your data Visitor comments may be checked through an automated spam detection service. Your contact information Additional information How we protect your data What data breach procedures we have in place What third parties we receive data from What automated decision making and/or profiling we do with user data Industry regulatory disclosure requirements
Courses around me
Centers around me
Please choose what you need