Information Systems Management
Course
In Hammersmith
Description
-
Type
Course
-
Level
Intermediate
-
Location
Hammersmith
-
Duration
3 Days
Upon completion of this course, you will be able to understand:
The development of information systems.
The primary responsibilities of the IS department.
The reasons for outsourcing IS services, the most common and popular outsource alternatives, and the outsourcing risks.
The rights and responsibilities regarding services provided by the IS department.
The threats to computer security.
Techniques that should be employed to protect computing devices and data.
Technical, data, and human safeguards.
How organisations should respond to security threats and incidents.
Facilities
Location
Start date
Start date
About this course
Those who wish to assess, evaluate, and apply emerging information systems (IS) technology to business.
Those who wish to take an active role in systems development to create an IS that meets their needs.
Those who need to learn how to employ IS to accomplish their job tasks.
Those who want to use IS to achieve their business strategies.
Reviews
-
Lectures were good and I had a great time in all. Thanks to all!
← | →
Course rating
Recommended
Centre rating
Khalid A,
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 5 years
Subjects
- Computer Security
- Information Systems
- System Operation
- Information Systems management
- Information Visualisation
- Systems Engineering
- Consulting
- Systems
- Information and creation of products
- Information Management
- Systems development
Course programme
- What is systems development?
- The five phases of the systems development lifecycle (SDLC)
- Accomplishing system definition
- The users’ role in the requirement phase
- Designing the five components
- Implementing an IS
- The tasks for system maintenance
- Problems with the SDLC
- Functions and organisation of the IS department
- How do organisations plan the use of IS?
- Advantages and disadvantages of outsourcing
- User rights and responsibilities
- The goal of IS security
- How big is the computer security problem?
- Responding to security threats
- Technical safeguards
- Data safeguards
- Human safeguards
- Responding to security incidents
Information Systems Management