|Name||Quality, Risk and Security Technologies|
|Status||Compulsory/Courses of Limited Choice|
|Level and type||Post-graduate Studies, Academic|
|Field of study||Computer Science|
|Faculty||Department of Applied Computer Science|
|Academic staff||Uldis Sukovskis, Renāte Strazdiņa|
|Credit points||4.0 (6.0 ECTS)|
A modern enterprise's operations are closely related to the application of information and communications technology. For the most part, enterprises cannot remain competitive and viable without resorting to ICT. However, selecting the most appropriate technologies for a specific company requires an understanding of ICT. Some of the most crucial prerequisites for successful deployment of ICT in an enterprise is the quality of technologies chosen, understanding of the risks associated with such technologies and security of the selected technologies. The main topic of the course is an overview of the existing quality, risk and security technologies from the following viewpoints: 1) Process; 2) Activities; 3) Standards; 4) Methods applied; and 5) Best practice examples. To ensure that the aim of the course is successfully attained, theoretical studies are complemented with practical deployment and analysis of the technologies discussed. During the practical part of the course, narratives of quality, risk and security management processes are created, existing methods and standards are applied to real-life enterprises' situation examples and existing technologies are applied in practice..
Goals and objectives
of the course in terms
of competences and skills
|Upon completion of the study course the student can discuss and support his / her views on the basic principles, and limitations thereof, of IT quality, risk and security management; the student is aware of IT quality, risk and security management processes and applicable standards. The student can deploy appropriate tools to designing a quality and / or risk and / or security process in an enterprise (in a certain environment), perform a risk assessment and design improvements.|
Can discuss and support his / her views on the basic principles, and limitations thereof, of IT quality, risk and security management; The student is aware of IT quality, risk and security management - Exam with both theoretical and practical part. The practical part is related to suggestions regarding the improvement areas in an enterprise described in the case study.
Can support his/her view on necessity of implementation of the IT quality, risk, and security management process and the most effective way depending on organization goals and structure. - Developed IT quality, risk and security process for the particular case study.
Can deploy appropriate tools to designing a quality and / or risk and / or security process in an enterprise (in a certain environment). - Individually performed practical exercises
Can perform a risk assessment and design improvements. - Individually performed practical exercises
|Course prerequisites||Information system life cycle, knowledge about ICT infrastructure, knowledge about project management.|