23.01.2015 Views

undergraduate

undergraduate

undergraduate

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Second major students take:<br />

CSG3204 Information Services Management 15<br />

Elective<br />

Careers<br />

Network Security Manager, Digital Forensics Investigator,<br />

Computer Security Manager, Information Security Manager,<br />

Computer Security Auditor, Computer Incident Investigator.<br />

Information Services<br />

Equips students for a career in information services as a<br />

librarian, knowledge or information manager. Prepares<br />

graduates for roles within government organisations, corporate<br />

library and information services, or the information systems<br />

field by exploring key areas associated with information systems.<br />

Required Units<br />

Credit Points<br />

IST1141 Information Agencies and Environment 15<br />

IST1161 Library Systems 1 15<br />

IST1143 Information Organisation 1 15<br />

IST2161 Client Services in Libraries 1 15<br />

CSG2344 Project Methods and Professionalism 15<br />

IST3162 Information Literacy and Life Long Learners 15<br />

IST3344 Theories of Information Organisation 15<br />

CSG3303 Applied IT Project 15<br />

Careers<br />

Librarian, Knowledge Manager, Information Manager.<br />

Information Technology<br />

Focuses on current and emerging areas of IT. Provides<br />

graduates with both practical and theoretical skills in<br />

programming, database, data communications, information<br />

systems, knowledge and project management.<br />

IST2118 Information Retrieval and Document<br />

Management 15<br />

CSG2431 Interactive Web Development 15<br />

CSP2103 Markup Languages 15<br />

CSI2102 Information Security 15<br />

CSG3206 Knowledge Computing 15<br />

IST3131 Information Policies 15<br />

First Major students take:<br />

CSG2344 Project Methods and Professionalism 15<br />

CSG3303 Applied IT Project 15<br />

Second Major students take:<br />

Elective (3000 Level)<br />

Elective<br />

Careers<br />

Computer Support Officer, Software Developer, Help Desk<br />

Officer, Wireless Network Administrator, Wireless Systems<br />

Developer, Wireless Security Consultant, Wireless Support<br />

Officer, Mobile Systems Programmer, Computer Programmer,<br />

Applications Developer Games Programmer, Business Analyst,<br />

Business Consultant, Business Systems Developer, IT Support<br />

Officer, IT Manager, Computer Security Officer, Computer<br />

Security Consultant, Computer Forensics Investigator,<br />

Computer Intelligence Officer.<br />

Software Engineering<br />

Reflects the modern engineering approach to developing<br />

software. The major covers all the areas of the systems<br />

development lifecycle including analysis, design,<br />

implementation and testing.<br />

E-lab – Joondalup Campus<br />

Required Units<br />

Credit Points<br />

CSP2348 Data Structures 15<br />

CSI2312 Foundations of Software Engineering 15<br />

CSI2441 Applications Development 15<br />

CSI2343 Object-oriented Analysis and Design 15<br />

CSI3303 Component Based Software Engineering 15<br />

CSI3304 Software Development Frameworks 15<br />

First Major students take:<br />

CSG2344 Project Methods and Professionalism 15<br />

CSG3303 Applied IT Project 15<br />

Second Major students take:<br />

CSG3204 Information Services Management 15<br />

Elective<br />

Careers<br />

Software Developer, Software Engineer, Software Project<br />

Manager, Systems Analyst, Software Analyst, Systems Architect.<br />

See more course information:<br />

reachyourpotential.com.au/courses/U67<br />

Bachelor of Science (Security) E72 - JO<br />

Duration: 3 Years<br />

Develops knowledge and skills in security management,<br />

risk management and security technologies necessary for<br />

employment in such areas as: government security, private<br />

sector security, strategic critical facilities, security consultancies,<br />

retail security, financial institutions security, corporate security<br />

and major security organisations. Emphasises security risk and<br />

the function and management of security technology in the<br />

protection of assets and is supported by appropriate studies in<br />

law and ethics.<br />

Security & computing<br />

91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!