Introduction to the Program

A comprehensive and 100% online program, exclusive to TECH, with an international perspective supported by our membership with the Association for Computing Machinery” 

##IMAGE##

In the current context, technological development demands agile, efficient, and scalable solutions that seamlessly integrate hardware and software. In this scenario, Systems Computing becomes particularly relevant as it enables the management of complex infrastructures, optimization of computational resources, and support for critical processes in diverse sectors such as healthcare, education, industry, and security. Thanks to its applications, it is possible to ensure stable, secure, and adaptable digital environments to meet the changing needs of the professional and corporate world. 

In response to these demands, this syllabus will delve into essential aspects such as the physical fundamentals behind Systems Computing, providing a solid foundation to understand the logic behind the functioning of computational systems. Additionally, computer technology and operating systems will be rigorously addressed, as they are fundamental pillars for the design, implementation, and maintenance of advanced technological solutions. This comprehensive approach will not only help understand how devices work but will also explore their evolution and projection in the professional field. 

Through this university program, we will promote the development of skills oriented toward the efficient management and administration of complex computing systems. Furthermore, analytical, technical, and strategic skills will be enhanced, enabling students to tackle technological challenges from a critical and innovative perspective. The adopted approach allows professionals in the field to act confidently in highly demanding environments, generating value from a deep understanding of hardware, software, and their interconnection. 

On the other hand, TECH’s methodology makes the learning process a completely flexible experience, tailored to each individual's pace. In fact, permanent access to content, available every day of the year and from any device with an internet connection, allows progress without time or geographical restrictions. Additionally, the Relearning method, a cutting-edge pedagogical strategy, supports knowledge consolidation.

Furthermore, thanks to TECH's membership in the Association for Computing Machinery (ACM), students will have access to exclusive and up-to-date resources, such as scientific publications, specialized courses, and international conferences.  Additionally, they will have the opportunity to expand their network by connecting with experts in technology, artificial intelligence, data science, and other key disciplines in the sector.  

You will enhance your competencies in managing and optimizing computing systems in advanced professional environments” 

This Master's Degree in Systems Computing contains the most complete and up-to-date university program on the market. Its most notable features are:

  • The development of practical cases presented by experts in Systems Computing 
  • The graphic, schematic, and practical contents with which they are created, provide scientific and practical information on the disciplines that are essential for professional practice 
  • Practical exercises where self-assessment can be used to improve learning 
  • Special emphasis on innovative methodologies in technological development 
  • Theoretical lessons, questions to the expert, debate forums on controversial topics, and individual reflection assignments 
  • Content that is accessible from any fixed or portable device with an internet connection 

You will gain a comprehensive understanding of how operating systems can be configured and managed to improve the stability of computing environments” 

The program includes faculty members from the field of Systems Computing, who bring their work experience to this program, along with renowned specialists from leading societies and prestigious universities. 

The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide an immersive learning experience designed to prepare for real-life situations. 

This program is designed around Problem-Based Learning, whereby the student must try to solve the different professional practice situations that arise throughout the program. For this purpose, the professional will be assisted by an innovative interactive video system created by renowned and experienced experts. 

You will explore the physical fundamentals that support Systems Computing, understanding its theoretical and practical foundation"

##IMAGE##

You will refine your competencies in the functioning of computational systems, optimizing their performance"

Syllabus

The university pathway that exclusively complements this program will offer professionals a technical and up-to-date approach that will enhance essential competencies to tackle the challenges of the digital environment. In fact, from the efficient management of computer networks to the practical application of emerging technologies, a deep understanding of interconnected systems and their impact on various sectors will be fostered. Additionally, the ability to implement security mechanisms in information systems will be strengthened, a key aspect for safeguarding sensitive data in demanding professional contexts.  

##IMAGE##

You will manage robust, scalable, and secure technological infrastructures in a variety of business environments” 

Module 1. Physical Fundamentals of Computing

1.1. Fundamental Forces

1.1.1. Newton’s Second Law
1.1.2. The Fundamental Forces of Nature
1.1.3. Gravitational Force
1.1.4. The Electric Force

1.2. Conservation Laws

1.2.1. What is Mass?
1.2.2. The Electric Charge
1.2.3. The Millikan Experiment
1.2.4. Conservation of Linear Momentum

1.3. Energy

1.3.1. What is Energy?
1.3.2. Measuring Energy
1.3.3. Energy Types
1.3.4. Dependence on the Observer’s Energy
1.3.5. Potential Energy
1.3.6. Derivation of Potential Energy
1.3.7. Energy Conservation
1.3.8. Energy Units

1.4. Electric Field

1.4.1. Static Electricity
1.4.2. Electric Field
1.4.3. Capacity
1.4.4. Potential

1.5. Electrical Circuits

1.5.1. Circulation of Electric Charge
1.5.2. Batteries
1.5.3. Alternating Current

1.6. Magnetism

1.6.1. Introduction and Magnetic Materials
1.6.2. Magnetic Field
1.6.3. Electromagnetic Introduction

1.7. Electromagnetic Spectrum

1.7.1. Maxwell’s Equations
1.7.2. Optics and Electromagnetic Waves
1.7.3. The Michelson and Morley Experiment

1.8. The Atom and Subatomic Particles

1.8.1. The Atom
1.8.2. The Atomic Nucleus
1.8.3. Radioactivity

1.9. Quantum Physics

1.9.1. Color and Heat
1.9.2. Photoelectric Effect
1.9.3. Matter Waves
1.9.4. Nature as Probability

1.10. Relativity

1.10.1. Gravity, Space and Time
1.10.2. Lorentz Transformations
1.10.3. Speed and Time
1.10.4. Energy, Momentum and Mass

Module 2. Computer Technology

2.1. General Information and a Brief History of Computers

2.1.1. Organization and Architecture
2.1.2. Brief History of Computers

2.2. Computer Arithmetic

2.2.1. The Arithmetic-Logic Unit
2.2.2. Numbering Systems
2.2.3. Integer Representation
2.2.4. Arithmetic with Integers
2.2.5. Floating Point Representation
2.2.6. Floating Point Arithmetic

2.3. Classic Concepts of Logic Design

2.3.1. Boolean Algebra
2.3.2. Logic Gates
2.3.3. Logical Simplification
2.3.4. Combinational Circuits
2.3.5. Sequential Circuits
2.3.6. Concept of Sequential Machine
2.3.7. Memory Element
2.3.8. Types of Memory Elements
2.3.9. Synthesis of Sequential Circuits
2.3.10    Synthesis of Sequential Circuits with PLA

2.4. Basic Computer Organization and Operation

2.4.1. Introduction
2.4.2. Components of a Computer
2.4.3. Operation of a Computer
2.4.4. Interconnection Structures
2.4.5. Interconnection with Buses
2.4.6. PCI Bus

2.5. Internal Memory

2.5.1. Introduction to Memory Systems in Computers
2.5.2. Semiconductor Main Memory
2.5.3. Correction of Errors
2.5.4. Advanced DRAM Memory Organization

2.6. Input/Output

2.6.1. External Devices
2.6.2. Input/Output Modules
2.6.3. Scheduled Input/Output
2.6.4. Input/Output via Interrupts
2.6.5. Direct Memory Access
2.6.6. Input/Output Channels and Processors

2.7. Machine Instructions: Features and Functions

2.7.1. Characteristics of Machine Instructions
2.7.2. Types of Operands
2.7.3. Types of Transactions
2.7.4. Assembly Language
2.7.5. Address
2.7.6. Formats of Instructions

2.8. Processor Structure and Operation

2.8.1. Processor Organization
2.8.2. Record Organization
2.8.3. Training Cycle
2.8.4. Instruction Segmentation

2.9. Cache Memory and External Memory

2.9.1. Basic Principles of Cache Memories
2.9.2. Cache Memory Design Elements
2.9.3. Magnetic Disks
2.9.4. RAID
2.9.5. Optical Memory
2.9.6. Magnetic Tape

2.10. Introduction to the Operation of the Control Unit

2.10.1. Microoperations
2.10.2. Processor Control
2.10.3. Wired Implementation

Module 3. Computer Structure

3.1. Fundamentals of Computer Design and Evolution

3.1.1. Definition of Computer Architecture
3.1.2. Evolution and Performance of Architectures
3.1.3. Parallel Architectures and Levels of Parallelism

3.2. Computer Performance Evaluation

3.2.1. Performance Measures
3.2.2. Test Programs (Benchmarks)
3.2.3. Improved Performance
3.2.4. Costs of a Computer

3.3. Leveraging the Memory Hierarchy

3.3.1. Memory Hierarchy
3.3.2. Basic Concepts of the Cache
3.3.3. Cache Evaluation and Improvements
3.3.4. Virtual Memory

3.4. Storage and Other Input/Output Aspects

3.4.1. Reliability, Dependability and Availability
3.4.2. Disk Storage
3.4.3. Flash Storage
3.4.4. Connection and Information Transfer Systems

3.5. Segmented Processors

3.5.1. What are Segmented Processors?
3.5.2. Principles of Segmentation and Performance Enhancement
3.5.3. Segmented Processor Design
3.5.4. Optimization of Functional Channels
3.5.5. Interrupt Handling on a Segmented Processor

3.6. Superscalar Processors

3.6.1. What are Superscalar Processors?
3.6.2. Parallelism between Instructions and Machine Parallelism
3.6.3. Superscalar Instruction Processing
3.6.4. Jump Instruction Processing
3.6.5. Interrupt Handling on a Superscalar Processor

3.7. VLIW Processors

3.7.1. What are VLIW Processors?
3.7.2. Exploiting Parallelism in VLIW Architectures
3.7.3. Compiler Support Resources

3.8. Vector Processors

3.8.1. What are Vector Processors?
3.8.2. Vector Architecture
3.8.3. The Memory System in Vector Processors
3.8.4. Performance Measurements on Vector Processors
3.8.5. Vector Processing Efficiency

3.9. Parallel Computers

3.9.1. Parallel Architectures and Levels of Parallelism
3.9.2. Motivation to the Study of Parallel Computers
3.9.3. Design Space. Classification and General Structure
3.9.4. Performance on Parallel Computers
3.9.5. Classification of Communication Systems in Parallel Computers
3.9.6. General Structure of the Communication System in Parallel Computers
3.9.7. The Network Interface in Parallel Computers
3.9.8. The Interconnection Network in Parallel Computers
3.9.9. Communication System Performance on Parallel Computers

3.10. Interconnection Networks and Multiprocessors

3.10.1. Topology and Types of Interconnection Networks
3.10.2. Switching in Interconnection Networks
3.10.3. Flow Control in Interconnection Networks
3.10.4. Routing in Interconnection Networks
3.10.5. Memory System Coherence on Multiprocessors
3.10.6. Multiprocessor Memory Consistency
3.10.7. Multiprocessor Synchronization

Module 4. Operating Systems

4.1. Introduction to Operating Systems

4.1.1. Concept
4.1.2. Historical Recap
4.1.3. Fundamental Building Blocks of Operating Systems
4.1.4. Objectives and Functions of Operating Systems

4.2. Structure of Operating Systems

4.2.1. Operating System Services
4.2.2. Operating System User Interface
4.2.3. System Calls
4.2.4. Types of System Calls

4.3. Process Planning

4.3.1. Basic Concepts
4.3.2. Planning Criteria
4.3.3. Planning Algorithms

4.4. Processes and Threads

4.4.1. Process Concept
4.4.2. Thread Concept
4.4.3. Process Status
4.4.4. Process Control

4.5. Concurrence. Mutual Exclusion, Synchronization, and Interlocking

4.5.1. Principles of Concurrence
4.5.2. Mutual Exclusion
4.5.3. Traffic Lights
4.5.4. Monitors
4.5.5. Message Passing
4.5.6. Fundamentals of Interlocking
4.5.7. Interlock Prevention
4.5.8. Interlock Avoidance
4.5.9. Interlock Detection and Recovery

4.6. Memory Management

4.6.1. Memory Management Requirements
4.6.2. Process Memory Model
4.6.3. Contiguous Assignment Scheme
4.6.4. Segmentation
4.6.5. Pagination
4.6.6. Segmented Pagination

4.7. Virtual Memory

4.7.1. Virtual Memory Fundamentals
4.7.2. Life Cycle of a Page
4.7.3. Virtual Memory Management Policy
4.7.4. Localization Policy
4.7.5. Extraction Policy
4.7.6. Replacement Policy

4.8. Input/Output System

4.8.1. Input/Output Devices
4.8.2. Input/Output System Organization
4.8.3. Use of Buffers
4.8.4. Magnetic Disk

4.9. File System Interface and Implementation

4.9.1. Archiving Concept
4.9.2. Access Methods
4.9.3. Directory Structure
4.9.4. Structure of a File System
4.9.5. File System Interface and Implementation
4.9.6. Directories System Interface and Implementation
4.9.7. Allocation Methods
4.9.8. Management of Free Space

4.10. Protection

4.10.1. Objectives
4.10.2. Authentication
4.10.3. Authorization
4.10.4. Cryptography

Module 5. Advanced Operating Systems

5.1. Concept of System Operations

5.1.1. Operating System Functions
5.1.2. Process Management
5.1.3. Memory Management
5.1.4. Directory and File Management
5.1.5. The Shell: Interactivity
5.1.6. Security
5.1.7. Design Objectives

5.2. History of Operating Systems

5.2.1. First Generation
5.2.2. Second Generation
5.2.3. Third Generation
5.2.4. Fourth Generation
5.2.5. The OS/2 Case
5.2.6. The History of GNU/Linux
5.2.7. The History of Windows

5.3. Structure of an Operating System

5.3.1. Monolithic Systems
5.3.2. Layered Systems
5.3.3. Virtualization
5.3.4. Exokernel
5.3.5. Client-Server Model
5.3.6. Distributed Systems

5.4. System Calls

5.4.1. System Calls. Concepts
5.4.2. System Calls for Process Management
5.4.3. System Calls for File and Directory Administration
5.4.4. Calls to the Communication System

5.5. Windows and GNU/Linux

5.5.1. Windows Structure
5.5.2. Structure of GNU/Linux

5.6. The GNU/Linux Shell and PowerShell

5.6.1. The Command Interpreter
5.6.2. Using the Command Interpreter
5.6.3. GNU/Linux Commands
5.6.4. Basic PowerShell Syntax
5.6.5. Basic PowerShell Commands

5.7. Shell Programming

5.7.1. Scripts Programming
5.7.2. Syntax

5.8. System Programming in GNU/Linux

5.8.1. C Language under UNIX
5.8.2. Compilation Tools
5.8.3. Error Handling

5.9. System Calls on Files

5.9.1. Basic Calls
5.9.2. Calls on Directories
5.9.3. Advanced Calls

5.10. System Calls on Processes

5.10.1. Basic Calls
5.10.2. Signals
5.10.3. Pipelines

Module 6. Free Software and Open Knowledge

6.1. Introduction to Free Software

6.1.1. History of Free Software
6.1.2. “Freedom” in Software
6.1.3. Licenses for the Use of Software Tools
6.1.4. Intellectual Property of Software
6.1.5. What is the Motivation for Using Free Software?
6.1.6. Free Software Myths
6.1.7. Top500

6.2. Open Knowledge and CC Licenses

6.2.1. Basic Concepts
6.2.2. Creative Commons Licenses
6.2.3. Other Content Licenses
6.2.4. Wikipedia and Other Open Knowledge Projects

6.3. Main Free Software Tools

6.3.1. Operating Systems
6.3.2. Office Applications
6.3.3. Business Management Applications
6.3.4. Web Content Managers
6.3.5. Multimedia Content Creation Tools
6.3.6. Other Applications

6.4. The Company: Free Software and its Costs

6.4.1. Free Software: Yes or No?
6.4.2. Truths and Lies about Free Software
6.4.3. Business Software Based on Free Software
6.4.4. Software Costs
6.4.5. Free Software Models

6.5. The GNU/Linux Operating System

6.5.1. Architecture
6.5.2. Basic Directory Structure
6.5.3. File System Characteristics and Structure
6.5.4. Internal Representation of the Files

6.6. The Android Mobile Operating System

6.6.1. History
6.6.2. Architecture
6.6.3. Android Forks
6.6.4. Introduction to Android Development
6.6.5. Frameworks for Mobile Application Development

6.7. Website Creation with WordPress

6.7.1. WordPress Features and Structure
6.7.2. Creation of Sites on WordPress.com
6.7.3. Installation and Configuration of WordPress on Your Own Server
6.7.4. Installing Plugins and Expansion of WordPress
6.7.5. Creation of WordPress Plugins
6.7.6. WordPress Theme Creation

6.8. Free Software Trends

6.8.1. Cloud Environments
6.8.2. Monitoring Tools
6.8.3. Operating Systems
6.8.4. Big Data and Open Data2.0.
6.8.5. Quantum Computing

6.9. Version Control

6.9.1. Basic Concepts
6.9.2. Git
6.9.3. Cloud and Self-hosted Git Services
6.9.4. Other Version Control Systems

6.10. Custom GNU/Linux Distributions

6.10.1. Main Distributions
6.10.2. Distributions Derived from Debian
6.10.3. Deb Package Creation
6.10.4. Modification of the Distribution
6.10.5. ISO Image Generation

Module 7. Computer Networks

7.1. Computer Networks on the Internet

7.1.1. Networks and Internet
7.1.2. Protocol Architecture

7.2. The Application Layer

7.2.1. Model and Protocols
7.2.2. FTP and SMTP Services
7.2.3. DNS Service
7.2.4. HTTP Operation Model
7.2.5. HTTP Message Formats
7.2.6. Interaction with Advanced Methods

7.3. The Transport Layer

7.3.1. Communication Between Processes
7.3.2. Connection-Oriented Transportation: TCP and SCTP

7.4. The Network Layer

7.4.1. Circuit and Packet Switching
7.4.2. IP Protocol (v4 and v6)
7.4.3. Routing Algorithms

7.5. The Link Layer

7.5.1. Link Layer and Error Detection and Correction Techniques
7.5.2. Multiple Access Links and Protocols
7.5.3. Link Level Addressing

7.6. LAN Networks

7.6.1. Network Topologies
7.6.2. Network and Interconnection Elements

7.7. IP Addressing

7.7.1. IP Addressing and Subnetting
7.7.2. Overview: An HTTP Request

7.8. Wireless and Mobile Networks

7.8.1. 2G, 3G and 4G Mobile Networks and Services
7.8.2. 5G Networks

7.9. Network Security

7.9.1. Fundamentals of Communications Security
7.9.2. Access Control
7.9.3. System Security
7.9.4. Fundamentals of Cryptography
7.9.5. Digital Signature

7.10. Internet Security Protocols

7.10.1. IP Security and Virtual Private Networks (VPN)
7.10.2. Web Security with SSL/TLS

Module 8. Emerging Technologies

8.1. Mobile Technologies

8.1.1. Mobile Devices
8.1.2. Mobile Communications

8.2. Mobile Services

8.2.1. Types of Applications
8.2.2. Decision on the Type of Mobile Application
8.2.3. Mobile Interaction Design

8.3. Location-Based Services

8.3.1. Location-Based Services
8.3.2. Technologies for Mobile Localization
8.3.3. GNSS-based Localization
8.3.4. Accuracy and Accuracy in Localization Technologies
8.3.5. Beacons: Location by Proximity

8.4. User Experience (UX) Design

8.4.1. Introduction to User Experience (UX)
8.4.2. Technologies for Mobile Localization
8.4.3. Methodology for UX Design
8.4.4. Best Practices in the Prototyping Process

8.5. Extended Reality

8.5.1. Extended Reality Concepts
8.5.2. Technologies for Mobile Localization
8.5.3. AR and VR Application and Services

8.6. The Internet of Things (IoT) I

8.6.1. IoT Fundamentals
8.6.2. IoT Devices and Communications

8.7. The Internet of Things (IoT) II

8.7.1. Beyond Cloud Computing
8.7.2. Smart Cities
8.7.3. Digital Twins
8.7.4. IoT Projects

8.8. Blockchain

8.8.1. Blockchain Fundamentals
8.8.2. Blockchain-Based Applications and Services

8.9. Autonomous Driving

8.9.1. Technologies for Autonomous Driving
8.9.2. V2X Communications

8.10. Innovative Technology and Research

8.10.1. Fundamentals of Quantum Computing
8.10.2. Applications of Quantum Computing
8.10.3. Introduction to Research

Module 9. Information Systems Security

9.1. A Global Perspective on Security, Cryptography and Classical Cryptanalysis

9.1.1. Computer Security: Historical Perspective
9.1.2. But what exactly is meant by Security?
9.1.3. History of Cryptography
9.1.4. Substitution Ciphers
9.1.5. Case Study: The Enigma Machine

9.2. Symmetric Cryptography

9.2.1. Introduction and Basic Terminology.
9.2.2. Symmetric Encryption
9.2.3. Modes of Operation
9.2.4. DES
9.2.5. The New AES Standard
9.2.6. Encryption in Flow
9.2.7. Cryptanalysis

9.3. Asymmetric Cryptography

9.3.1. Origins of Public Key Cryptography
9.3.2. Basic Concepts and Operation
9.3.3. The RSA Algorithm
9.3.4. Digital Certificates
9.3.5. Key Storage and Management

9.4. Network Attacks

9.4.1. Network Threats and Attacks
9.4.2. Enumeration
9.4.3. Traffic Interception: Sniffers
9.4.4. Denial of Service Attacks
9.4.5. ARP Poisoning Attacks

9.5. Security Architectures

9.5.1. Traditional Security Architectures
9.5.2. Secure Socket Layer: SSL
9.5.3. SSH Protocol
9.5.4. Virtual Private Networks (VPN)
9.5.5. External Storage Unit Protection Mechanisms
9.5.6. Hardware Protection Mechanisms

9.6. System Protection Techniques and Secure Code Development

9.6.1. Operational Safety
9.6.2. Resources and Controls
9.6.3. Monitoring
9.6.4. Intrusion Detection Systems
9.6.5. Host IDS
9.6.6. Network IDS
9.6.7. Signature-Based IDS
9.6.8. Lure Systems
9.6.9. Basic Security Principles in Code Development
9.6.10. Failure Management
9.6.11. Public Enemy Number 1: Buffer Overflows
9.6.12. Cryptographic Botches

9.7. Botnets and Spam

9.7.1. Origin of the Problem
9.7.2. Spam Process
9.7.3. Sending Spam
9.7.4. Refinement of Mailing Lists
9.7.5. Protection Techniques
9.7.6. Anti-Spam Service Offered by Third-Parties
9.7.7. Study Cases
9.7.8. Exotic Spam

9.8. Web Auditing and Attacks

9.8.1. Information Gathering
9.8.2. Attack Techniques
9.8.3. Tools

9.9. Malware and Malicious Code

9.9.1. What is Malware?
9.9.2. Types of Malware
9.9.3. Virus
9.9.4. Criptovirus
9.9.5. Worms
9.9.6. Adware
9.9.7. Spyware
9.9.8. Hoaxes
9.9.9. Phishing
9.9.10. Trojans
9.9.11. The Economy of Malware
9.9.12. Possible Solutions

9.10. Forensic Analysis

9.10.1. Evidence Collection
9.10.2. Evidence Analysis
9.10.3. Anti-Forensic Techniques
9.10.4. Case Study

Module 10. Systems Integration

10.1. Introduction to Information Systems in the Enterprise

10.1.1. The Role of Information Systems
10.1.2. What is an Information System?
10.1.3. Dimensions of Information Systems
10.1.4. Business Processes and Information Systems
10.1.5. The IS/IT Department

10.2. Opportunities and Needs of Information Systems in the Enterprise

10.2.1. Organizations and Information Systems
10.2.2. Features of Organizations
10.2.3. Impact of Information Systems in the Enterprise
10.2.4. Information Systems to Achieve a Competitive Advantage
10.2.5. Use of Systems in the Administration and Management of the Enterprise

10.3. Basic Concepts of Information Systems and Technologies

10.3.1. Data, Information and Knowledge
10.3.2. Technology and Information Systems
10.3.3. Technology Components
10.3.4. Classification and Types of Information Systems
10.3.5. Service and Business Process Based Architectures
10.3.6. Forms of Systems Integration

10.4. Systems for the Integrated Enterprise Resource Planning

10.4.1. Business Needs
10.4.2. An Integrated Enterprise Resource Planning
10.4.3. Acquisition vs. Development
10.4.4. ERP Implementation
10.4.5. Implications for Management
10.4.6. Leading ERP Vendors

10.5. Supply Chain and Customer Relationship Management Information Systems

10.5.1. Definition of Supply Chain
10.5.2. Effective Supply Chain Management
10.5.3. The Role of Information Systems
10.5.4. Supply Chain Management Solutions
10.5.5. Customer Relationship Management
10.5.6. The Role of Information Systems
10.5.7. Implementation of a CRM System
10.5.8. Critical Success Factors in CRM Implementation
10.5.9. CRM, e-CRM and Other Trends

10.6. ICT Investment Decision-Making and Information Systems Planning

10.6.1. Criteria for ICT Investment Decisions
10.6.2. Linking the Project to the Management and Business Plan
10.6.3. Management Implications
10.6.4. Redesign of Business Processes
10.6.5. Management’s Decision on Implementation Methodologies
10.6.6. Need for Information Systems Planning
10.6.7. Objectives, Participants and Moments
10.6.8. Structure and Development of the Systems Planning
10.6.9. Follow-Up and Updating

10.7. Security Considerations in the Use of ICTs

10.7.1. Risk Analysis
10.7.2. Security in Information Systems
10.7.3. Practical Tips

10.8. Feasibility of ICT Project Implementation and Financial Aspects in Information Systems Projects

10.8.1. Description and Objectives
10.8.2. EVS Participants
10.8.3. Techniques and Procedures
10.8.4. Cost Structure
10.8.5. Financial Projection
10.8.6. Budgets

10.9. Business Intelligence

10.9.1. What Is Business Intelligence?
10.9.2. BI Implementation Strategy
10.9.3. Present and Future in BI

10.10. ISO/IEC 12207

10.10.1. What is “ISO/IEC 12207”?
10.10.2. Analysis of Information Systems
10.10.3. Information System Design
10.10.4. Implementation and Acceptance of the Information System

##IMAGE##

Die von diesen Fachleuten ausgearbeiteten didaktischen Materialien dieses Studiengangs haben vollständig auf Ihre Berufserfahrung anwendbare Inhalte”

Master’s Degree in Systems Computing

Due to its particular characteristics, the field of systems computing frequently undergoes modernization processes driven by new technological and methodological implementations in the sector. This fact requires specialized professionals to maintain constant updates in order to acquire competencies aligned with the development of today’s labor market. Understanding the continuous need for academic updates resulting from the evolution of the field, TECH Global University has created our Master’s Degree in Systems Computing, designed to train professionals in the latest sector developments. Additionally, this postgraduate program places special emphasis on current computing trends, exploring modern concepts such as the use of key open-source software tools, modern developments in computer networks, the network and link layers, IP addressing, and symmetric and asymmetric cryptography applied to cybersecurity.

Study an online postgraduate degree in Systems Computing

Modern computing demands a high level of preparation from specialized professionals, both in terms of addressing operating systems and integrating enterprise information systems. In our Master’s Degree, you will embark on an academic journey designed to strengthen the essential skills and knowledge required for modern computing tasks. This will update the professional’s knowledge in areas such as: operating system deadlock fundamentals, its prevention, and timely avoidance; the role of emerging technologies applied to computing; and understanding various types of malware and their possible solutions.