Preaload Image

Levels 4 and 5 IT & Computing Diploma

User Avatar

Duration: 2 Years

Program pace: Self-pace

Credits: 240 credits

Language: English

Location: Fully Online

Tution Fee: 3.000 €

Equivalent to the first two years of University

Combined Levels 4 and 5 Diplomas in IT and Computing at Online Business Academy is an excellent opportunity of getting two courses at a special price. Level 4 Diploma is equal to the first year of a BA University diploma, while Level 5 Diploma is equivalent to the second year. Although we offer these programs as separate qualifications, you can choose a combined program that you will get at a lower price.

The combination of these studies takes you more into depth and helps you turn your passion for computers into a career. Levels 4 and 5 in IT & Computing consist of 20 modules (10 at each year) and written assignments, and they carry 240 credits (120 each level). The program will equip you with the skills you need to become an IT professional. While completing the course, students will have access to a variety of additional materials to help in the completion of the program. The program is entirely individual and self-paced, which means that students learn on their own.

To enroll in a Levels 4 and 5 you must be at least 18 and have a full secondary education (high school diploma)

Entry Criteria

These qualifications provide a flexible route for learners who have already achieved qualifications at a lower level as well as for learners who do not have IT and Computing qualifications but may have skills in other areas or prior IT & Computing experience in the workplace.

Age: 18 +

Entry profile:


  • A GCE Advanced level profile with achievement in 2 or more subjects supported by 5 or more GCSEs at grades C and above
  • High School Diploma in case a student comes from a country that doesn’t follow the UK education standards
  • Other related Level 3 subjects
  • An Access to Higher Education Certificate delivered by an approved further education institute and validated by an Access Validating Agency
  • Other equivalent international qualifications

Career Path

Through this course, a student will develop skills in programming, systems analysis, design and software development, engineering, and project management. Upon successful completion of the course, students can pursue a career in IT within the public or private sector.

This program will help you acquire an understanding of IT and to develop key computing skills. It is suitable for those who have achieved IT qualifications at a lower level or have prior relevant work experience. This qualification is particularly relevant if you are seeking to progress to higher education to take a BA degree course in an area of computing or management or you wish to progress your career in an IT management role.

The primary purpose of this qualification is to support your progression to further learning. However, through this course, you will get knowledge and understanding of IT and Computing concepts and develop the skills required to work in this industry. This course gives you a comprehensive introduction to the IT industry, enabling you to execute numerous IT roles with confidence. For example, Programming, Management of Information Systems, Web Development, Software Engineering, and even Project Management. Moreover, this program allows you to choose additional units that help you acquire specific knowledge. All this can significantly help in your career development. 

Both Levels 4 and 5 have ten written assignments each. When a student completes the module, they will get access to the assignments. These assignments are approximately 3000-5000 words each.

The Assignment unit titles are:

First year 

  1. Management Information systems
  2. IT and Society
  3. Computer Systems and Software
  4. Computer Programming
  5. Relational Database Systems
  6. Software Engineering
  7. Systems Analysis and Design
  8. E-commerce Applications
  9. Human-Computer Interactions
  10. Information Systems Theory

Second year 

  1. Ethical, Legal and Regulatory Issues and Professional Responsibilities in IT
  2. Network Design
  3. Web-Based Development
  4. Database Design And Development
  5. Relational Database Systems
  6. Innovative Technologies in Computing
  7. Computer Research Methods
  8. Managing a Computing Project
  9. Software Development Methodologies
  10. Strategic Management Information systems

Assessment at Online Business Academy is a very straightforward process:

  • When you finalize an online module, you’ll have to complete an online assessment that consists of 30 multiple-choice questions. You will have one hour to complete these questions. They are divided into sets of five, so you will have plenty of time to review and edit your answers. After an hour, the test will automatically end.
  • You will get results immediately after you finish the test. If you didn’t pass, you will receive a notification of a “refer,” and you will have to retake a module assessment. You can complete these modules at your own pace, as there is no deadline to complete the course.
  • When you finalize modules, you will be able to take the final written assignments that test your knowledge and understanding of the modules.

This qualification will help you to gain a solid foundation of knowledge, understanding, and skills relating to IT across sectors, which will enable your progression to further learning. This program is equal to the second year of a bachelor’s degree and covers the same amount of knowledge and skills. Therefore, it is a natural progression route to a degree program in a higher education institution, where you should be able to claim exemptions for some of the units completed. After finalizing Level 4 and 5 in IT, you can proceed to Level 6 in Business and Management at our Online Business Academy. That will expand your area of expertise and increase your employability rate. 


You should take this combined program if you:

  • are relatively new to the IT industry or are seeking a first IT role
  • have completed training at this level in a related area to IT, or have prior, relevant experience in the workplace
  • want to develop a comprehensive set of knowledge, understanding, and skills relating to IT & Computing
  • have sufficient time to achieve a qualification of 240 credits
  • are planning to embark on a degree course and are looking for a qualification which will be regarded as equivalent to the first year and therefore ‘count towards’ your degree.


EduWW Online Business Academy offers high-quality UK programs at affordable tuition fees. The tuition fee differs depending on the study program. Additionally, we allow students to pay it in monthly installments. 

Students are required to pay enrollment fees, as the first installment of tuition fees, in advance, and the rest will be divided into equal monthly payments. See the table below for more details. 

We accept online payment and wire transfer. The tuition fee covers all our services. We will not impose any additional or hidden expenses on your behalf. 

Program Tuition Fee Enrollment fee  Monthly installments Monthly fee
Level 4&5 IT 3,000.00 euros 700 euros 10 230 euros

The fee for enrolling onto the Level 4 and Level 5 courses together is 3,000.00 . Alternatively, students can enroll onto a single level (level 4 or 5) for 2,500.00 each.

Students are required to pay an enrollment fee of 700 € in advance, while the rest of the tuition fee 2,300.00€ can be paid in up to 10 installments, which is 230€ monthly. 

The course is Accredited by the ATHE and approved and regulated by OFQUAL.

Qualification Title

ATHE Level 5 Diploma In Computing

Qualification Number


Qualification Status

Available to learners

Owner organization


Qualification Level

Level 5

European Qualification Framework Level

Level 5

You can find out more by clicking on the following Ofqual register link

Ofqual Register

This is a program you are looking for?




Course Features

  • Lectures 194
  • Quizzes 0
  • Students 0
  • Assessments Yes

    This module examines the impact of technology on society and explores trends and changes created. It will examine management issues and potential conflicts in terms of security and data management.

    • Lecture1.1
      Computers and society: explaining digital citizenship, community and the information age, gender, age, culture
    • Lecture1.2
      Impact of IT in society: understanding the environment, explaining the impact of the information age on social groups
    • Lecture1.3
      IT induced changes for individuals: everyday life, at home, at school, the workplace
    • Lecture1.4
      Social issues: government role in information handling, cultural diversity as a success factor for IT, regional and national perceptions of IT
    • Lecture1.5
      Professional issues: code of ethics, IT professional culture
    • Lecture1.6
      Shaping the future developments: Internet penetration in everyday life, smart devices, social networks, managing data and information
    • Lecture1.7
      Legal issues: IT related liabilities, legislation relating to IT, impact of legislation on systems development
    • Lecture1.8
      Ethical issues: dealing with personal data, ethical systems design and development
    • Lecture1.9
      Risks: computer threats, digital crime, privacy, security, impact of e-everything (e.g. e-marketing, ebanking)

    This module will explore the functions of computing systems and the basics of design, configuration, and routine maintenance.

    • Lecture2.1
      Computer components: defining a computer system, system component types
    • Lecture2.2
      Networking infrastructures: system connectivity, network types, hardware infrastructure, networking software
    • Lecture2.3
      Component functionality: processing, memory, system interfaces (input/output)
    • Lecture2.4
      Peripheral devices: limitations of computer systems, designing expandable systems, device types
    • Lecture2.5
      Operating systems: the role of an operating system, OS types
    • Lecture2.6
      Software applications: the role of software applications, functionality and services supported by software, application types
    • Lecture2.7
      Web applications: the impact of the World Wide Web, architecture of web applications, web application types, web services
    • Lecture2.8
      Mobile applications: the role of mobile applications, interface issues, mobility issues, connectivity issues, security issues

    This module examines the basis of OOS and how programming fits into the broader aspects of usage of applications.

    • Lecture3.1
      Application Programming Interface (API) evaluation: the need for API, API technologies, API evaluation criteria (security, functionality, usability)
    • Lecture3.2
      Software Development Life Cycle: SDLC importance, SDLC and programming
    • Lecture3.3
      Programming paradigms: procedural programming, functional programming, object-oriented programming
    • Lecture3.4
      Programming language constructs: variables, constants, operators, loops, conditional statements
    • Lecture3.5
      Designing a computer programme: using data models, the role of conceptual modelling, algorithms, pseudocode
    • Lecture3.6
      Developing a computer programme: structuring a simple program
    • Lecture3.7
      Testing a program: testing programming practices, testing data structures, testing algorithm
    • Lecture3.8
      Analysing test results: test reports, verification, validation
    • Lecture3.9
      Evaluating feedback: user evaluation, the role of software documentation dealing with integration, installation, deployment, updates
    • Lecture3.10
      Improving a program: change requests, scalability, maintenance, support

    This module will enable understanding of database design and development and enable students to develop and design a database and explore solutions to meet client brief. Learners will learn how to design a database.

    • Lecture4.1
      DBMS: DBMS overview, DBMS types
    • Lecture4.2
      Database architectures: data models, data schemas, DBMS levels
    • Lecture4.3
      Transaction processing: concepts, transaction processing systems, OLTP, OLAP
    • Lecture4.4
      Data integrity: data quality management, quality control in DBMS, data integrity explained, data security
    • Lecture4.5
      Database relationships: relationships, joins, keys
    • Lecture4.6
      Integrity constraints: referential integrity, domain integrity, entity integrity, foreign key integrity
    • Lecture4.7
      Functional dependencies: schema normalisation, normal forms
    • Lecture4.8
      Database administration: the role of the DBA, DBA skills and responsibilities
    • Lecture4.9
      Relational database design: design fundamentals, logical vs. physical design
    • Lecture4.10
      Database documentation: stakeholders for database documentation, documentation types
    • Lecture4.11
      Database evaluation: performance evaluation benchmarks, verification, validation
    • Lecture4.12
      Database evaluation: performance evaluation benchmarks, verification, validation

    This module is concerned with the analysis of IT and computing needs to develop requirement specifications and develop and test prototypes.

    • Lecture5.1
      Software engineering principles, software development process, software development management
    • Lecture5.2
      Traditional software development approaches, software process modelling, agile software development
    • Lecture5.3
      Software modelling, system interaction, system structure, system behaviour
    • Lecture5.4
      Analysis tasks, design tasks, Implementation tasks
    • Lecture5.5
      Software development and business information, organisational aspects of system development
    • Lecture5.6
      Programming teams, software engineering roles, software engineering tasks
    • Lecture5.7
      Project management for software development, project planning, business process reengineering
    • Lecture5.8
      Data modelling, object oriented analysis and design, behavioural models
    • Lecture5.9
      Data verification, data validation

    This module provides an understanding of IS concepts and how they relate to organization needs in respect of business processes and transformation of information.

    • Lecture6.1
      Systems development lifecycle: waterfall, V-shape, spiral
    • Lecture6.2
      Systems development methods: SSADM, DSDM, agile, prototyping
    • Lecture6.3
      Systems analysis: requirements elicitation, stakeholder analysis, systems design process
    • Lecture6.4
      Information gathering techniques: interviews, observation, documentation investigation, surveys, focus groups
    • Lecture6.5
      Business requirements: using client briefs, feasibility study, analysis of system components
    • Lecture6.6
      Design processes: process specification, data flow diagrams, entity relationship diagrams, using UML
    • Lecture6.7
      Present solution: feasibility plan, requirements elicitation
    • Lecture6.8
      Design specification: process specification, data flow diagram, entity relationship diagram
    • Lecture6.9
      Proposed solution: implementation plan, deployment plan, post-implementation planning

    This module explores the role of eCommerce in the modern world and in particular the identification of aims and objectives within a business and the design issues arising from the definition of requirements. Human Computer Interaction This module will develop students understanding of principles and models of Human Computer Interaction and evaluate existing HCI design and principles and use this to help them plan their own prototype multimedia user interface.

    • Lecture7.1
      Stages: understanding e-commerce concepts
    • Lecture7.2
      Differences between ecommerce and e-business: e-business defined, overview of e-business models, benefits of e-commerce for businesses, e-commerce versus e-business
    • Lecture7.3
      Opportunities and benefits
    • Lecture7.4
      Threats: identifying e-commerce threats, risk assessment in e-commerce, dealing with Internet threats, infrastructure practices techniques and tools for dealing with e-commerce threats
    • Lecture7.5
      E-commerce strategies: developing an e-commerce strategy, assessing e-commerce readiness, measuring effectiveness of e-commerce solutions
    • Lecture7.6
      E-commerce models: modelling e-commerce transactions, importance of e-commerce transaction models, overview of e-commerce transaction models
    • Lecture7.7
      E-commerce revenue models: creating online revenue, historical evolution of e-commerce transactions, current and future e-commerce revenue models
    • Lecture7.8
      E-marketing techniques
    • Lecture7.9
      E-commerce applications – implementation strategies for e-commerce applications, identifying ecommerce application requirements, designing an e-commerce solution
    • Lecture7.10
      Create online presence
    • Lecture7.11
    • Lecture7.12
      Present solution – deployment of e-commerce solutions, integration with legacy systems, maintenance and support of e-commerce applications, catering for multiple platforms and different users

    • Lecture8.1
      Cognitive and perceptual principles/laws: HCI origins, perception and attention, Norman’s theory of interaction, Hyck-Hyman response-selection law, Fitts’ law
    • Lecture8.2
      User interface design rules
    • Lecture8.3
      Interaction: HCI interaction styles, the interaction design process, user analysis, evaluating interfaces against requirements
    • Lecture8.4
      Plan: storyboards, navigation, screen content
    • Lecture8.5
      Apply: task-centred user interface evaluation, usability evaluation, methods for evaluating user interfaces
    • Lecture8.6
      Justify: user interface specification, user interface fundamental principles, the role of user interface prototypes, user interface development process
    • Lecture8.7
      Conclude: user interface design basics, best practices and principles in user interface design, techniques for designing user interfaces
    • Lecture8.8
      Generate: identifying application requirements for user interface design, selecting success criteria for user interface design, aligning user interface components to user functionality
    • Lecture8.9
      Critique: performing a usability evaluation of user interfaces, testing visual components, assessing interface structure and layout, testing alternative navigation designs, evaluating interface accessibility
    • Lecture8.10
      Revise: performing cooperative evaluation of interface designs, obtaining user feedback, assessing interface design success

    This module explores elements of project management key to successful development and implementation of specific IT projects.

    • Lecture9.1
      Comparing information systems: IS scope, IS structure, IS functionality
    • Lecture9.2
      Evaluating information systems: IS success criteria, IS integration, IS deployment, IS use
    • Lecture9.3
      Information system’s needs: user needs analysis, task needs analysis
    • Lecture9.4
      Project plan: project management techniques, planning IS projects
    • Lecture9.5
      Feasibility planning: feasibility study, feasibility report
    • Lecture9.6
      Requirements elicitation: requirements capture, requirements analysis, requirements specification, requirements report
    • Lecture9.7
      Implementing an IS project: project management stages
    • Lecture9.8
      Developing an information system: design, coding, testing, deployment
    • Lecture9.9
      Evaluating an information system: user evaluation, feedback mechanisms, testing
    • Lecture9.10
      Improving an information system: change requests, scalability, bug fixing, planned maintenance, support

    This module focusses on understanding concepts of information systems and how they support business needs in terms of information processing and data processing.

    • Lecture10.1
      Different types of information: routine, exception, summary
    • Lecture10.2
      Features of information system: common features information system, how support information system, common features computer systems, systems and application software, digital systems/applications
    • Lecture10.3
      Data security including storage: backup, archive, hack, ethical use of information, DPA, etc
    • Lecture10.4
      IS for competitive advantage: enterprise systems, supply chain management, customer relationship management, knowledge management systems
    • Lecture10.5
      MIS and performance: managing assets and operations (equipment, software, networks, individuals, procedures, resources)
    • Lecture10.6
      MIS effectiveness: impact of MIS, principles for effective information management
    • Lecture10.7
      MIS improvements: studying people, studying technology, studying organisations
    • Lecture10.8
      MIS extensions: process identification, process selection, assessment of current processes, process plan, process changes

    This module will enable an understanding of the importance of digital security to business, to understand industry standards of digital security and be able to recommend improvements in security.

    • Lecture11.1
      Cyber security risks: authentication, educating staff, software and hardware vulnerabilities
    • Lecture11.2
      Network vulnerabilities: network vulnerability analysis, network exposures, conducting network vulnerability scans, vulnerability verification and reporting
    • Lecture11.3
      Impact of cyber security: network security concepts, network security threats, security attacks
    • Lecture11.4
      Cyber security management: cyber risk management, reducing cyber risks, information risk management regimes
    • Lecture11.5
      Cyber security strategies: identifying security objectives, assessing network security threats, dealing with security challenges, tackling cyber crime
    • Lecture11.6
      Network security improvements: network monitoring, security controls, network boundaries, security configuration, user privileges, incident handling
    • Lecture11.7
      Training in network security: user awareness, network security training, prevention mechanisms

    This module focuses on understanding database design and development includes advanced languages to analyze and query database data. Students will research database management and critically test and evaluate databases.

    • Lecture12.1
      Developing databases for organisations: organisational structures, data elements, data sets, forms and reports
    • Lecture12.2
      Database design: entities, relationships, attributes, keys, data types, normalisation
    • Lecture12.3
      Database connectivity: connecting databases to applications, relational database connectivity, ODBC, JDBC
    • Lecture12.4
      Database management systems
    • Lecture12.5
      Planning relational database design: database requirements, ERD, DFD, data dictionary, decomposition, functional dependencies
    • Lecture12.6
      Database design: designing database table, creating database indexes and constraints, designing SQL queries, forms, macros, security
    • Lecture12.7
      Normalisation: identifying insufficiency of normal forms, comparing normal forms, 1NF, 2NF and 3NF, de-normalisation
    • Lecture12.8
      Database construction: advanced SQL queries, user actions
    • Lecture12.9
      Implementing database features: database security features, database links (LAMP, WAMP), graphical user interfaces (GUI)
    • Lecture12.10
      Database testing: testing plans, database components, extreme data, error handling
    • Lecture12.11
      Database documentation, database architecture, database documentation components
    • Lecture12.12
      Database development review: design review, code inspection, security inspection, post implementation review

    This module will explore the design, deployment and management of virtualization and explore its commercial and potential impact.

    • Lecture13.1
      Web services: introduction to web services, data exchange, WSDL, SOAP, RDF, XML
    • Lecture13.2
      Web applications: websites development, database design, three-tiered architecture, interface design
    • Lecture13.3
      E-marketing techniques: e-marketing strategies, e-marketing channels, social media, SEO
    • Lecture13.4
      Issues relating to e-marketing deployment: legislation, ethics, social acceptance
    • Lecture13.5
      Web-based solutions: web page development, web interface design, accessibility issues, usability issues
    • Lecture13.6
      E-marketing development: identifying suitable SEO strategies, SEO techniques, e-marketing techniques and tools
    • Lecture13.7
      Back-end design: server side development, WAMP, PHP, SQL
    • Lecture13.8
      Multimedia techniques: integrating multimedia to web interfaces, multimedia techniques (e.g. virtual light box, wow slider)
    • Lecture13.9
      Web services: web service specification, publishing web services, using web services
    • Lecture13.10
      Review implemented technologies and their appropriateness to solve business problem
    • Lecture13.11
      Evaluate: evaluating web services, mapping web services to user needs, the role of web services in web application development
    • Lecture13.12
      Justify: reviewing SEO practices, success criteria for SEO techniques, assessing SEO practices and their suitability for specific web applications
    • Lecture13.13
      Reflect: web application development methods, web application deployment, web application maintenance, skills for web application development

    This module explores the principles of networks and network design and implementation and support of network systems.

    • Lecture14.1
      Network protocols: the role of a network protocol, protocol types, network protocol examples
    • Lecture14.2
      Network hardware and software: networking devices, networking applications, network operating systems
    • Lecture14.3
      Wireless networks: wireless network types, wireless network devices, uses of wireless networks
    • Lecture14.4
      Network management: network monitoring, device management, network management systems
    • Lecture14.5
      Network requirements: bandwidth, availability, application connectivity
    • Lecture14.6
      Networking evaluation: evaluation methodologies, assessing network objectives, evaluation results
    • Lecture14.7
      Network design: topology, forecasting networking needs, network traffic
    • Lecture14.8
      Networking solutions: client devices, access points, network unification, network management
    • Lecture14.9
      Network architecture: types of networks, topologies, physical infrastructure
    • Lecture14.10
      Network testing: identifying testing objectives, testing criteria, testing results
    • Lecture14.11
      Network performance: selecting performance criteria, measuring network performance
    • Lecture14.12
      Network security: network auditing, dealing with network threats, security measures, security policy

    This module is concerned with developing an understanding of the strategic role of MIS within the organization and how it impacts on the broader objectives and strategy of the business.

    • Lecture16.1
      Information Systems explained: data versus information, information needs, system functionality
    • Lecture16.2
      Organisational strategy: structure, capabilities, corporate culture, performance criteria, operations
    • Lecture16.3
      Integrating IS: strategy support, data processing, decision support, communication support, resource management
    • Lecture16.4
      The role of IS in organisations: market awareness, organisational responsiveness, supply chain management
    • Lecture16.5
      Strategic management tools and techniques – Porter’s forces, BCG matrix, SWOT analysis, marketing mix, Ansoff matrix, PESTLE analysis, Maslow’s hierarchy, 7S method
    • Lecture16.6
      IS integration – understanding legacy systems, vertical integration, horizontal integration, star integration
    • Lecture16.7
      IS organisational needs – planning organisational level analysis, job analysis, task analysis, needs analysis
    • Lecture16.8
      IS strategy – scope, planning, identifying IT needs, decision making, implementing the strategy
    • Lecture16.9
      IT strategy implementation – stakeholder analysis, mapping current situation, justifying decisions, scheduling the implementation, developing an IT policy
    • Lecture16.10
      IT risks – financial, technical, information related, user related, corporate culture

    This module looks at innovative trends and disruptive advances taking place and examines the new generation of skills and knowledge that will be required to work successfully in the sector.

    • Lecture17.1
      Innovative technologies – current developments: big data exploration, cloud system deployment, ubiquitous computing
    • Lecture17.2
      Technology innovation and society: knowledge society, social media, technology enhanced innovation processes
    • Lecture17.3
      Evaluating technology innovation: methods for evaluating innovation, technology evaluation, impact of technology innovation (success and failure)
    • Lecture17.4
      Dependencies between technology and its environment: technology and environment, technology sustainability, sustainable development
    • Lecture17.5
      Technological innovation and ethics: new ethical dilemmas, privacy, security
    • Lecture17.6
      Technological innovation and legislation: IPR, patents, copyright

    This module will explore the knowledge and skills required to undertake research in this field and the qualitative and quantitative approaches required including use of literature and design of research proposals.

    • Lecture18.1
      Research techniques: desk research, ethnography, focus groups, interviews, online communities, mobile research, surveys
    • Lecture18.2
      Sampling techniques: probability-based, selective, convenience-based, ethnographic methods
    • Lecture18.3
      Ethics and research: ethical standards, ethics principles, ethics approval
    • Lecture18.4
      Data analysis techniques: qualitative methods, quantitative methods, data analysis tools
    • Lecture18.5
      Research proposal structure: focus, relevant literature, method, ethics, decisions, schedule, resources, references
    • Lecture18.6
      Data collection methods: exploratory, descriptive, analytical/explanatory, predictive
    • Lecture18.7
      Research proposal feasibility: scope, topic selection, structure, managing time, managing data collection
    • Lecture18.8
      Data collection: primary data, secondary data
    • Lecture18.9
      Data analysis: scientific rigor, deductive, inductive
    • Lecture18.10
      Reporting: research outline, research foundation, research methodology, research results, research evaluation, research process reflection

    Creating and managing projects has changed over the years with the development of sophisticated IT Software, this Module focuses on how being a project manager in the 80’s differs to being a project manager in today’s world.

    • Lecture19.1
      Project planning methods: project specification, project plan structure, performance criteria
    • Lecture19.2
      Project team structure: project roles, team structure, managing and motivating members
    • Lecture19.3
      Project management tools: brainstorming, fishbone Diagrams, Critical Path Analysis flow diagrams, Gantt Charts
    • Lecture19.4
      Project quality explained: defining quality, quality characteristics, quality assurance, quality control
    • Lecture19.5
      Project plan structure: work breakdown structure, logic network
    • Lecture19.6
      Managing project risks: understanding risks, risk factors, risk assessment risk management strategies
    • Lecture19.7
      Monitoring project progress: measuring progress, schedule plans, dealing with problems, PRINCE2
    • Lecture19.8
      Project evaluation: evaluation plan, interpreting data, communicating results
    • Lecture19.9
      Post completion report: deliverable assessment, maintenance needs, project impact

    This module looks at the role of systems engineering in development of software and various models of data, software and processes using modeling approaches.

    • Lecture20.1
      Systems lifecycle: information systems development, the lifecycle approach, software development lifecycle
    • Lecture20.2
      Approaches in software development: data, processes, people, organisations, project management techniques
    • Lecture20.3
      Software development methods: process oriented, object oriented, rapid development, people oriented, organisational oriented
    • Lecture20.4
      Methodology selection: heavy versus lightweight, waterfall, RUP, Spiral models
    • Lecture20.5
      Agile methods: Scrum, Extreme Programming
    • Lecture20.6
      Evaluating methodologies: identifying evaluation criteria, frameworks for methodology evaluation