
Certificate
The world's largest faculty of information technology”
Description
Would you like to become the next Steve Jobs and revolutionize the computer industry with powerful and innovative computer systems? Opt for this Professional Master’s Degree and you will hold the keys to achieving it”

The invention of the Z1 as the first truly functional "modern" computer laid the foundations of an industry that, over the years, acquired a technical, complex, unique and innovative character, absolutely unthinkable for pioneers in this field such as Konrad Zuse or Alan Turing. From the launch of the first Colossus Mark to the successful commercialization of the Macintosh 128 K or the IBM PC with Windows 1.0 a year later, only 4 decades have passed, but these machines have gone from only reading encrypted communications to allowing their users to create documents, manage data and send e-mails.
Thanks to technological development, advances in computing and programming and the evolution of the IoT as the nerve center of collective communication of devices around the world, today, systems have reached a very high level of complexity, generating UX increasingly customized and adapted to the needs of society. No matter which way you look at it, information technology is present in all aspects of human life. For this reason, the role played by the professional in this field is fundamental and in high demand in today's market.
Based on this, TECH and its team of experts have developed a program that gathers the most exhaustive, comprehensive and innovative information in this sector, designed to serve as a guide for the graduate in their specialization. Over the course of 1,500 hours of diverse content, you will delve into the fundamentals of physics adapted to the field of computing, as well as the application of current technology and strategies to the design of software and applications for the different platforms and operating systems available. All this being 100% online and offering 12 months of theoretical and practical specialization with which you will not only adjust your profile to match the most demanding requirements of the industry, but in which you will find the keys to embark on the road to the new IT revolution that is about to arrive.
The perfect program to get you up to speed on the physical fundamentals of computer science and its application in the computing environment"
This Professional Master’s Degree in Systems Computing contains the most complete and up-to-date program on the market. Its most notable features are:
- The development of case studies presented by experts in Computer Engineering
- The graphic, schematic, and practical contents with which they are created, provide practical information on the disciplines that are essential for professional practice
- Practical exercises where self-assessment can be used to improve learning
- A special emphasis on innovative methodologies
- Theoretical lessons, questions to the expert, debate forums on controversial topics, and assignments for individual reflection
- Content that is accessible from any fixed or portable device with an internet connection
If you are looking to acquire the classical concepts of logical software design, this program will provide you with everything you need to handle Boolean algebra and the elements of memory”
The program’s teaching staff includes professionals from the sector who contribute their work experience to this program program, as well as renowned specialists from leading societies and prestigious universities.
The multimedia content, developed with the latest educational technology, will provide the professional with situated and contextual learning, i.e., a simulated environment that will provide immersive learning designed for real situations.
This program is designed around Problem-Based Learning, whereby the professional must try to resolve the different professional practice situations that arise during the academic year. For this purpose, the student will be assisted by an innovative interactive video system created by renowned and experienced experts.
In addition to a high volume of content to develop your knowledge of software, you will also work on computer and systems hardware"

TECH sets no limits: It is a program that you can access from wherever you want and through any device with an internet connection"
Syllabus
The program curriculum has been developed by a team of computer scientists and engineers specializing in the area of Systems Computing. Thanks to this, it has been possible to put together an exhaustive and comprehensive syllabus that gathers the latest and most specific information on computing, programming and software and hardware project management. In addition, it includes hundreds of hours of diverse additional material, from research articles and complementary readings, to detailed videos and self-learning exercises, so that you can not only contextualize the theoretical content, but also delve into it in a personalized, dynamic and multidisciplinary way.

The perfect academic choice to implement the latest emerging technologies in your IT strategies: IoT fundamentals, Blockchain, V2X, AR and VR techniques and many more!"
Module 1. Physical Fundamentals of Computing
1.1. Fundamental Forces
1.1.1. Newton's Second Law
1.1.2. The Fundamental Forces of Nature
1.1.3. Gravitational Force
1.1.4. The Electric Force
1.2. Conservation Laws
1.2.1. What is Mass?
1.2.2. The Electric Charge
1.2.3. The Millikan Experiment
1.2.4. Conservation of Linear Momentum
1.3. Energy
1.3.1. What is Energy?
1.3.2. Measuring Energy
1.3.3. Energy Types
1.3.4. Dependence on the Observer's Energy
1.3.5. Potential Energy
1.3.6. Derivation of Potential Energy
1.3.7. Energy Conservation
1.3.8. Energy Units
1.4. Electric Field
1.4.1. Static Electricity
1.4.2. Electric Field
1.4.3. Capacity
1.4.4. Potential
1.5. Electrical Circuits
1.5.1. Circulation of Electric Charge
1.5.2. Batteries
1.5.3. Alternating Current
1.6. Magnetism
1.6.1. Introduction and Magnetic Materials
1.6.2. Magnetic Field
1.6.3. Electromagnetic Introduction
1.7. Electromagnetic Spectrum
1.7.1. Maxwell's Equations
1.7.2. Optics and Electromagnetic Waves
1.7.3. The Michelson Morley Experiment
1.8. The Atom and Subatomic Particles
1.8.1. The Atom
1.8.2. The Atomic Nucleus
1.8.3. Radioactivity
1.9. Quantum Physics
1.9.1. Color and Heat
1.9.2. Photoelectric Effect
1.9.3. Matter Waves
1.9.4. Nature as Probability
1.10. Relativity
1.10.1. Gravity, Space and Time
1.10.2. Lorentz Transformations
1.10.3. Speed and Time
1.10.4. Energy, Momentum and Mass
Module 2. Computer Technology
2.1. General Information and a Brief History of Computers
2.1.1. Organization and Architecture
2.1.2. Brief History of Computers
2.2. Computer Arithmetic
2.2.1. The Arithmetic-Logic Unit
2.2.2. Numbering Systems
2.2.3. Integer Representation
2.2.4. Arithmetic with Integers
2.2.5. Floating Point Representation
2.2.6. Floating Point Arithmetic
2.3. Classic Concepts of Logic Design
2.3.1. Boolean Algebra
2.3.2. Logic Gates
2.3.3. Logical Simplification
2.3.4. Combinational Circuits
2.3.5. Sequential Circuits
2.3.6. Concept of Sequential Machine
2.3.7. Memory Element
2.3.8. Types of Memory Elements
2.3.9. Synthesis of Sequential Circuits
2.3.10. Synthesis of Sequential Circuits with PLA
2.4. Basic Computer Organization and Operation
2.4.1. Introduction
2.4.2. Components of a Computer
2.4.3. Operation of a Computer
2.4.4. Interconnection Structures
2.4.5. Interconnection with Buses
2.4.6. PCI Bus
2.5. Internal Memory
2.5.1. Introduction to Memory Systems in Computers
2.5.2. Semiconductor Main Memory
2.5.3. Correction of Errors
2.5.4. Advanced DRAM Memory Organization
2.6. Input/Output
2.6.1. External Devices
2.6.2. Input/Output Modules
2.6.3. Scheduled Input/Output
2.6.4. Input/Output via Interrupts
2.6.5. Direct Memory Access
2.6.6. Input/Output Channels and Processors
2.7. Machine Instructions: Features and Functions
2.7.1. Characteristics of Machine Instructions
2.7.2. Types of Operands
2.7.3. Types of Transactions
2.7.4. Assembly Language
2.7.5. Address
2.7.6. Formats of Instructions
2.8. Processor Structure and Operation
2.8.1. Processor Organization
2.8.2. Record Organization
2.8.3. Training Cycle
2.8.4. Instruction Segmentation
2.9. Cache and External Memory
2.9.1. Basic Principles of Cache Memories
2.9.2. Cache Design Elements
2.9.3. Magnetic Disks
2.9.4. RAID
2.9.5. Optical Memory
2.9.6. Magnetic Tape
2.10. Introduction to the Operation of the Control Unit
2.10.1. Microoperations
2.10.2. Processor Control
2.10.3. Wired Implementation
Module 3. The Structure of Computers
3.1. Fundamentals of Computer Design and Evolution
3.1.1. Definition of Computer Architecture
3.1.2. Evolution and Performance of Architectures
3.1.3. Parallel Architectures and Levels of Parallelism
3.2. Computer Performance Evaluation
3.2.1. Performance Measures
3.2.2. Test Programs (Benchmarks)
3.2.3. Improved Performance
3.2.4. Costs of a Computer
3.3. Leveraging the Memory Hierarchy
3.3.1. Memory Hierarchy
3.3.2. Basic Concepts of the Cache
3.3.3. Cache Evaluation and Improvements
3.3.4. Virtual Memory
3.4. Storage and Other Input/Output Aspects
3.4.1. Reliability, Dependability and Availability
3.4.2. Disk Storage
3.4.3. Flash Storage
3.4.4. Connection and Information Transfer Systems
3.5. Segmented Processors
3.5.1. What are Segmented Processors?
3.5.2. Principles of Segmentation and Performance Enhancement
3.5.3. Segmented Processor Design
3.5.4. Optimization of Functional Channels
3.5.5. Interrupt Handling on a Segmented Processor
3.6. Superscalar Processors
3.6.1. What are Superscalar Processors?
3.6.2. Parallelism between Instructions and Machine Parallelism
3.6.3. Superscalar Instruction Processing
3.6.4. Jump Instruction Processing
3.6.5. Handling Interruptions on a Superscalar Processor
3.7. VLIW Processors
3.7.1. What are VLIW Processors?
3.7.2. Exploiting Parallelism in VLIW Architectures
3.7.3. Compiler Support Resources
3.8. Vector Processors
3.8.1. What are Vector Processors?
3.8.2. Vector Architecture
3.8.3. The Memory System in Vector Processors
3.8.4. Performance Measurements on Vector Processors
3.8.5. Vector Processing Efficiency
3.9. Parallel Computers
3.9.1. Parallel Architectures and Levels of Parallelism
3.9.2. Reasons for the Study of Parallel Computers
3.9.3. Design Space. Classification and General Structure
3.9.4. Performance on Parallel Computers
3.9.5. Classification of Communication Systems in Parallel Computers
3.9.6. General Structure of the Communication System in Parallel Computers
3.9.7. The Network Interface in Parallel Computers
3.9.8. The Interconnection Network in Parallel Computers
3.9.9. Communication System Performance on Parallel Computers
3.10. Interconnection Networks and Multiprocessors
3.10.1. Topology and Types of Interconnection Networks
3.10.2. Switching in Interconnection Networks
3.10.3. Flow Control in Interconnection Networks
3.10.4. Routing in Interconnection Networks
3.10.5. Memory System Coherence on Multiprocessors
3.10.6. Multiprocessor Memory Consistency
3.10.7. Multiprocessor Synchronization
Module 4. Operating Systems
4.1. Introduction to Operating Systems
4.1.1. Concept
4.1.2. Historical Recap
4.1.3. Fundamental Building Blocks of Operating Systems
4.1.4. Objectives and Functions of Operating Systems
4.2. Structure of Operating Systems
4.2.1. Operating System Services
4.2.2. Operating System User Interface
4.2.3. System Calls
4.2.4. Types of System Calls
4.3. Process Planning
4.3.1. Basic Concepts
4.3.2. Planning Criteria
4.3.3. Planning Algorithms
4.4. Processes and Threads
4.4.1. Process Concept
4.4.2. Thread Concept
4.4.3. Process Status
4.4.4. Process Control
4.5. Concurrence. Mutual Exclusion, Synchronization, and Interlocking
4.5.1. Principles of Concurrence
4.5.2. Mutual Exclusion
4.5.3. Traffic Lights
4.5.4. Monitors
4.5.5. Message Passing
4.5.6. Fundamentals of Interlocking
4.5.7. Interlock Prevention
4.5.8. Interlock Avoidance
4.5.9. Interlock Detection and Recovery
4.6. Memory Management
4.6.1. Memory Management Requirements
4.6.2. Process Memory Model
4.6.3. Contiguous Assignment Scheme
4.6.4. Segmentation
4.6.5. Pagination
4.6.6. Segmented Pagination
4.7. Virtual Memory
4.7.1. Virtual Memory Fundamentals
4.7.2. Life Cycle of a Page
4.7.3. Virtual Memory Management Policy
4.7.4. Localization Policy
4.7.5. Extraction Policy
4.7.6. Replacement Policy
4.8. Input/Output System
4.8.1. Input/Output Devices
4.8.2. Input/Output System Organization
4.8.3. Use of Buffers
4.8.4. Magnetic Disk
4.9. File System Interface and Implementation
4.9.1. Archiving Concept
4.9.2. Access Methods
4.9.3. Directory Structure
4.9.4. Structure of a File System
4.9.5. File System Interface and Implementation
4.9.6. Directories System Interface and Implementation
4.9.7. Allocation Methods
4.9.8. Management of Free Space
4.10. Protection
4.10.1. Objectives
4.10.2. Authentication
4.10.3. Authorization
4.10.4. Cryptography
Module 5. Advanced Operating System
5.1. Concept of System Operations
5.1.1. Operating System Functions
5.1.2. Process Management
5.1.3. Memory Management
5.1.4. Directory and File Management
5.1.5. The Shell: Interactivity
5.1.6. Security/Safety
5.1.7. Design Objectives
5.2. History of Operating Systems
5.2.1. The First Generation
5.2.2. The Second Generation
5.2.3. Third Generation
5.2.4. Fourth Generation
5.2.5. The OS/2 Case
5.2.6. The History of GNU/Linux
5.2.7. The History of Windows
5.3. Structure of an Operating System
5.3.1. Monolithic Systems
5.3.2. Layered Systems
5.3.3. Virtualisation
5.3.4. Exokernel
5.3.5. Client-Server Model
5.3.6. Distributed Systems
5.4. System Calls
5.4.1. System Calls. Concepts
5.4.2. System Calls for Process Management
5.4.3. System Calls for File and Directory Administration
5.4.4. Calls to the Communication System
5.5. Windows and GNU/Linux
5.5.1. Windows Structure
5.5.2. Structure of GNU/Linux
5.6. The GNU/Linux Shell and PowerShell
5.6.1. The Command Interpreter
5.6.2. Using the Command Interpreter
5.6.3. GNU/Linux Commands
5.6.4. Basic PowerShell Syntax
5.6.5. Basic PowerShell Commands
5.7. Shell Programming
5.7.1. Script Programming
5.7.2. Syntax
5.8. System Programming in GNU/Linux
5.8.1. C Language under UNIX
5.8.2. Compilation Tools
5.8.3. Error Handling
5.9. System Calls on Files
5.9.1. Basic Calls
5.9.2. Calls on Directories
5.9.3. Advanced Calls
5.10. System Calls on Processes
5.10.1. Basic Calls
5.10.2. Signals
5.10.3. Pipelines
Module 6. Free Software and Open Knowledge
6.1. Introduction to Free Software
6.1.1. History of Free Software
6.1.2. "Freedom" in Software
6.1.3. Licenses for the Use of Software Tools
6.1.4. Intellectual Property of Software
6.1.5. What is the Reason for Using Free Software?
6.1.6. Free Software Myths
6.1.7. Top500
6.2. Open Knowledge and CC Licenses
6.2.1. Basic Concepts
6.2.2. Creative Commons Licenses
6.2.3. Other Content Licenses
6.2.4. Wikipedia and Other Open Knowledge Projects
6.3. Main Free Software Tools
6.3.1. Operating Systems
6.3.2. Office Applications
6.3.3. Business Management Applications
6.3.4. Web Content Managers
6.3.5. Multimedia Content Creation Tools
6.3.6. Other Applications
6.4. The Company: Free Software and its Costs
6.4.1. Free Software: Yes or No?
6.4.2. Truths and Lies about Free Software
6.4.3. Business Software Based on Free Software
6.4.4. Software Costs
6.4.5. Free Software Models
6.5. The GNU/Linux Operating System
6.5.1. Architecture
6.5.2. Basic Directory Structure
6.5.3. File System Characteristics and Structure
6.5.4. Internal Representation of the Files
6.6. The Android Mobile Operating System
6.6.1. History
6.6.2. Architecture
6.6.3. Android Forks
6.6.4. Introduction to Android Development
6.6.5. Frameworks for Mobile Application Development
6.7. Website Creation with WordPress
6.7.1. WordPress Features and Structure
6.7.2. Creation of Sites on WordPress.com
6.7.3. Installation and Configuration of WordPress on Your Own Server
6.7.4. Installing Plugins and Extending WordPress
6.7.5. Creation of WordPress Plugins
6.7.6. WordPress Theme Creation
6.8. Free Software Trends
6.8.1. Cloud Environments
6.8.2. Monitoring tools
6.8.3. Operating Systems
6.8.4. Big Data and Open Data 2.0
6.8.5. Quantum Computing
6.9. Version Control
6.9.1. Basic Concepts
6.9.2. Git
6.9.3. Cloud and Self-hosted Git Services
6.9.4. Other Version Control Systems
6.10. Custom GNU/Linux Distributions
6.10.1. Main Distributions
6.10.2. Distributions Derived from Debian
6.10.3. Deb Package Creation
6.10.4. Modification of the Distribution
6.10.5. ISO Image Generation
Module 7. Computer Networks
7.1. Computer Networks on the Internet
7.1.1. Networks and Internet
7.1.2. Protocol Architecture
7.2. The Application Layer
7.2.1. Model and Protocols
7.2.2. FTP and SMTP Services
7.2.3. DNS Service
7.2.4. HTTP Operation Model
7.2.5. HTTP Message Formats
7.2.6. Interaction with Advanced Methods
7.3. The Transport Layer
7.3.1. Communication Between Processes
7.3.2. Connection-oriented Transportation: TCP and SCTP
7.4. The Network Layer
7.4.1. Circuit and Packet Switching
7.4.2. IP Protocol (v4 and v6)
7.4.3. Routing Algorithms
7.5. The Link Layer
7.5.1. Link Layer, Error Detection and Correction Techniques
7.5.2. Multiple Access Links and Protocols
7.5.3. Link Level Addressing
7.6. LAN Networks
7.6.1. Network Topologies
7.6.2. Network and Interconnection Elements
7.7. IP Addressing
7.7.1. IP Addressing and Subnetting
7.7.2. Overview: An HTTP Request
7.8. Wireless and Mobile Networks
7.8.1. 2G, 3G and 4G Mobile Networks and Services
7.8.2. 5G Networks
7.9. Network Security
7.9.1. Fundamentals of Communications Security
7.9.2. Access Control
7.9.3. System Security
7.9.4. Fundamentals of Cryptography
7.9.5. Digital Signature
7.10. Internet Security Protocols
7.10.1. IP Security and Virtual Private Networks (VPN)
7.10.2. Web Security with SSL/TLS
Module 8. Emerging Technologies
8.1. Mobile Technologies
8.1.1. Mobile Devices
8.1.2. Mobile Communications
8.2. Mobile Services
8.2.1. Types of Applications
8.2.2. Decision on the Type of Mobile Application
8.2.3. Mobile Interaction Design
8.3. Location-based Services
8.3.3. Location-Based Services
8.3.4. Technologies for Mobile Localization
8.3.5. GNSS-Based Localization
8.3.6. Accuracy and Accuracy in Localization Technologies
8.3.7. Beacons: Location by Proximity
8.4. User Experience (UX) Design
8.4.1. Introduction to User Experience (UX)
8.4.2. Technologies for Mobile Localization
8.4.3. Methodology for UX Design
8.4.4. Best Practices in the Prototyping Process
8.5. Extended Reality
8.5.1. Extended Reality Concepts
8.5.2. Technologies for Mobile Localization
8.5.3. AR and VR Application and Services
8.6. The Internet of Things (IoT) I
8.6.1. IoT Fundamentals
8.6.2. IoT Devices and Communications
8.7. The Internet of Things (IoT) II
8.7.1. Beyond Cloud Computing
8.7.2. (Smart Cities)
8.7.3. Digital Twins
8.7.4. IoT Projects
8.8. Blockchain
8.8.1. Blockchain Fundamentals
8.8.2. Blockchain-based Applications and Services
8.9. Autonomous Driving
8.9.1. Technologies for Autonomous Driving
8.9.2. V2X Communications
8.10. Innovative Technology and Research
8.10.1. Fundamentals of Quantum Computing
8.10.2. Applications of Quantum Computing
8.10.3. Introduction to Research
Module 9. Information Systems Security
9.1. A Global Perspective on Security, Cryptography and Classical Crypto-analysis
9.1.1. Computer Security: Historical Perspective
9.1.2. But What Exactly is Meant by Security?
9.1.3. History of Cryptography
9.1.4. Substitution Ciphers
9.1.5. Case Study: The Enigma Machine
9.2. Symmetric Cryptography
9.2.1. Introduction and Basic Terminology
9.2.2. Symmetric Encryption
9.2.3. Modes of Operation
9.2.4. DES
9.2.5. The New AES Standard
9.2.6. Encryption in Flow
9.2.7. Cryptanalysis
9.3. Asymmetric Cryptography
9.3.1. Origins of Public Key Cryptography
9.3.2. Basic Concepts and Operation
9.3.3. The RSA Algorithm
9.3.4. Digital Certificates
9.3.5. Key Storage and Management
9.4. Network Attacks
9.4.1. Network Threats and Attacks
9.4.2. Enumeration
9.4.3. Traffic Interception: Sniffers
9.4.4. Denial of Service Attacks
9.4.5. ARP Poisoning Attacks
9.5. Security Architectures
9.5.1. Traditional Security Architectures
9.5.2. Secure Socket Layer: SSL
9.5.3. SSH Protocol
9.5.4. Virtual Private Networks (VPNs)
9.5.5. External Storage Unit Protection Mechanisms
9.5.6. Hardware Protection Mechanisms
9.6. System Protection Techniques and Secure Code Development
9.6.1. Operational Safety
9.6.2. Resources and Controls
9.6.3. Monitoring
9.6.4. Intrusion Detection Systems
9.6.5. Host IDS
9.6.6. Network IDS
9.6.7. Signature-Based IDS
9.6.8. Lure Systems
9.6.9. Basic Security Principles in Code Development
9.6.10. Failure Management
9.6.11. Public Enemy Number 1: Buffer Overflows
9.6.12. Cryptographic Botches
9.7. Botnets and Spam
9.7.1. Origin of the Problem
9.7.2. Spam Process
9.7.3. Sending Spam
9.7.4. Refinement of Mailing Lists
9.7.5. Protection Techniques
9.7.6. Anti-Spam Service offered by Third-Parties
9.7.7. Study Cases
9.7.8. Exotic Spam
9.8. Web Auditing and Attacks
9.8.1. Information Gathering
9.8.2. Attack Techniques
9.8.3. Tools
9.9. Malware and Malicious Code
9.9.1. What is Malware?
9.9.2. Types of Malware
9.9.3. Virus
9.9.4. Cryptovirus
9.9.5. Worms
9.9.6. Adware
9.9.7. Spyware
9.9.8. Hoaxes
9.9.9. Phishing
9.9.10. Trojans
9.9.11. The Economy of Malware
9.9.12. Possible Solutions
9.10. Forensic Analysis
9.10.1. Evidence Collection
9.10.2. Evidence Analysis
9.10.3. Anti-Forensic Techniques
9.10.4. Case Study
Module 10. Integration Systems
10.1. Introduction to Information Systems in the Company
10.1.1. The Role of Information Systems
10.1.2. What is an Information System?
10.1.3. Dimensions of Information Systems
10.1.4. Business Processes and Information Systems
10.1.5. The IS/IT Department
10.2. Opportunities and Needs of Information Systems in the Company
10.2.1. Organizations and Information Systems
10.2.2. Features of Organisations
10.2.3. Impact of Information Systems in the Company
10.2.4. Information Systems to Achieve a Competitive Advantage
10.2.5. Use of Systems in the Administration and Management of the Company
10.3. Basic Concepts of Information Systems and Technologies
10.3.1. Data, Information and Knowledge
10.3.2. Technology and Information Systems
10.3.3. Technology Components
10.3.4. Classification and Types of Information Systems
10.3.5. Service and Business Process Based Architectures
10.3.6. Forms of Systems Integration
10.4. Systems for the Integrated Management of Company Resources
10.4.1. Business Needs
10.4.2. An integrated Information System for the Company
10.4.3. Acquisition vs. Development
10.4.4. ERP Implementation
10.4.5. Implications for Management
10.4.6. Leading ERP Vendors
10.5. Supply Chain and Customer Relationship Management Information Systems
10.5.1. Definition of Supply Chain
10.5.2. Effective Supply Chain Management
10.5.3. The Role of Information Systems
10.5.4. Supply Chain Management Solutions
10.5.5. Customer Relationship Management
10.5.6. The Role of Information Systems
10.5.7. Implementation of a CRM System
10.5.8. Critical Success Factors in CRM Implementation
10.5.9. CRM, e-CRM and Other Trends
10.6. ICT Investment Decision-Making and Information Systems Planning
10.6.1. Criteria for ICT Investment Decisions
10.6.2. Linking the Project to the Management and Business Plan
10.6.3. Management Implications
10.6.4. Redesign of Business Processes
10.6.5. Management's Decision on Implementation Methodologies
10.6.6. Need for Information Systems Planning
10.6.7. Objectives, Participants and Moments
10.6.8. Structure and Development of the Systems Planning
10.6.9. Follow-up and Updating
10.7. Security Considerations in the Use of ICTs
10.7.1. Risk Analysis
10.7.2. Security in Information Systems
10.7.3. Practical Advice
10.8. Feasibility of ICT Project Implementation and Financial Aspects in Information Systems Projects
10.8.1. Description and Objectives
10.8.2. EVS Participants
10.8.3. Techniques and Procedures
10.8.4. Cost Structure
10.8.5. Financial Projection
10.8.6. Budgets
10.9. Business Intelligence
10.9.1. What is Business Intelligence?
10.9.2. BI Implementation Strategy
10.9.3. Present and Future in BI
10.10. ISO/IEC 12207
10.10.1. What is "ISO/IEC 12207"?
10.10.2. Analysis of Information Systems
10.10.3. Information System Design
10.10.4. Implementation and Acceptance of the Information System

A unique specialization program that will allow you to acquire advanced training in this field"