Date | Format | Fees | ||
---|---|---|---|---|
13 Jan - 15 Jan, 2025 | Classroom | ₦350,000 | Register | |
20 Mar - 22 Mar, 2025 | Classroom | ₦350,000 | Register | |
19 Jun - 21 Jun, 2025 | Classroom | ₦350,000 | Register | |
11 Sep - 13 Sep, 2025 | Classroom | ₦350,000 | Register | |
13 Jan - 15 Jan, 2025 | Classroom | ₦350,000 | Register |
Event Details
Upon completion of this course, participants will be able to understand:
- The development of information systems.
- The primary responsibilities of the IS department.
- The reasons for outsourcing IS services, the most common and popular outsource alternatives and the outsourcing risks.
- The rights and responsibilities regarding services provided by the IS department.
- The threats to computer security.
- Techniques that should be employed to protect computing devices and data.
- Technical, data, and human safeguards.
- How organizations should respond to security threats and incidents.
COURSE CONTENT
Business Processes, Information Systems, and Information
- The need to understand business processes
- Business process modeling
- Using IS to improve process quality
- What is information?
- Data characteristics required for quality information
Hardware and Software
- Computer hardware
- Operating systems software
- Applications software
- Open-source software as a viable alternative
Database Processing
- The purpose of a database
- What is a database management system (DBMS)?
- Database applications to make databases more useful
- What is a NoSQL DBMS?
The Cloud
- Why is the cloud the future for most organizations?
- Using the cloud
- Cloud service models
- Using cloud services securely
Organisations and Information Systems
- How do IS vary by scope?
- Solving departmental silos through enterprise systems
- Customer relationship management (CRM), enterprise resource planning (ERP), and enterprise application integration (EAI)
- Inter-enterprise IS
Social Media Information Systems
- What is a social media information system (SMIS)?
- SMIS to advance organizational strategy
- Increasing social capital
- Managing the risks of social media
- Where is social media taking us?
Business Intelligence Systems
- How do organizations use business intelligence (BI) systems?
- The three primary activities in the BI process
- Using data warehouses and data marts to acquire data
- Three techniques for processing BI data
- The alternatives for publishing BI
Information Systems Development
- What is systems development?
- The five phases of the systems development lifecycle (SDLC)
- Accomplishing system definition
- The users’ role in the requirement phase
- Designing the five components
- Implementing an IS
- The tasks for system maintenance
- Problems with the SDLC
Information Systems Management
- Functions and organization of the IS department
- How do organizations plan the use of IS?
- Advantages and disadvantages of outsourcing
- User rights and responsibilities
Information Security Management
- The goal of IS security
- How big is the computer security problem?
- Responding to security threats
- Technical safeguards
- Data safeguards
- Human safeguards
- Responding to security incidents
TRAINING METHODOLOGY
The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.
2ND BATCH: 11th - 14th July, 2023
-
Venue
Alpha Partners Professional Training Conference Centre. 200, Muritala Mohammed Way (3rd Floor), Yaba Lagos.
Share this course