Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks, theft, damage, and unauthorized access. It’s an essential aspect of modern digital life, aiming to protect the confidentiality, integrity, and availability of data. With the growing amount of information stored and transferred online, as well as the increased sophistication of cyber threats, cybersecurity has become a critical area of focus for individuals, organizations, and governments.

The course addresses the development of modern(ist) trends in world literature emphasising the historical and socio-political factors. The course defines and discusses significant ideas, ideologies, movements, trends, milieus, social backgrounds, etc., out of which modern literature emerged. The selection of works to be studied will include those from Africa, Asia, Europe and America.
Network Technology Associate teaches essential networking technologies and skills, including TCP/IP, stable network creation, wireless networking, mobile devices and network troubleshooting. You will learn to use various network components and protocols that enable users to share data quickly and easily. You will explore the different types of transmission media, and you will learn how network architecture and topologies provide for efficient and secure communication. In addition, you will learn about the OSI reference model and its relationship to packet creation, and you will compare and contrast the OSI model with the Internet architecture model.

You will study the functions, features and technologies associated with Internet services, such as cloud computing. You will learn about the advantages and disadvantages of Bring Your Own Device (BYOD), the growing trend of employees bringing their personal mobile devices to work. BYOD policies and enforcement strategies will also be covered.

You will learn about the benefits of implementing a Content Management System (CMS). You will also achieve competency in performing basic hardware and operating system maintenance procedures. In addition, you will study mobile computing devices and mobile operating systems.

You will also learn about the importance of routing, and you will explore IP addressing, IP address classes and subnet masks. Finally, you will explore essential network security concepts, Internet-based challenges facing today's users, and methods you can use to secure networks and network transmissions, including authentication, encryption and firewalls.

This course equip student with ability to conduct research process

The main purpose of this course is to facilitate understanding of the basic concepts, skills and practices associated with classroom assessment and evaluation of student learning in schools. The course intends to provide students with advanced assessment and evaluation literacy. Educators will need this expertise to discuss, critique, and develop assessment and evaluation practices for their own classrooms. Given the substantial amount of time and effort devoted to assessment activities, this course will expose students to a range of classroom assessment and evaluation methods. Further, the course will enable educators make informed instructional decisions based on classroom assessment and evaluation information.