

.jpg)
This is a two year course which leads on to higher education, a degree apprenticeship, a level 4 apprenticeship or into employment.
During the first year you will study:
Unit 1: Communication and Employability skills for IT Practitioners
Unit 2: Computer Systems
Unit 6: Software Design and Development
Unit 7: Organisation systems security
Unit 9: Networks
Unit 28: Website Production
Unit 36: Computer games platforms and Technologies
Unit 10: Communication Technologies
Unit 8: e-commerce
After successfully completing the first year you will study:
Unit 3: Information Systems
Unit 5: Managing Computer networks
Unit 19: Computer Systems Architecture
Unit 12: IT Technical support
Unit 24: Controlling Systems Using IT
Unit 32: Networked Systems security
Unit 13: IT Troubleshooting and repair
Unit 25: Maintaining Computer Systems
Unit 29: Installing and Upgrading Software
This course consists of practical and theoretical sessions culminating in either assignments or internal examinations depending on the unit. Employer involvement is an essential part of the course so you will have external speakers who are actively involved in the industry.
At the end of the first year you will get:
• IT 90 Credit Level 3 Diploma EDEXCEL
• Units working towards content related to CISCO Internet of Everything Certificate.
At the end of the course you will also have achieved;
• IT Networking and System Support Level 3 Extended Diploma EDEXCEL
• Units working towards content related to CISCO Introduction to Cyber Security Certificate.
All units are assessed by assignments internally set and marked by the College.
You can get a place on the course by completing an application form or applying on line for an interview. Applicants are invited for an interview with a member of the School of Computing.
4 GCSEs at grade 4 / grade C including English Language and Maths, or a Pass or higher in a Level 2 OCR Diploma or BTEC Extended Certificate and grade 4 / grade C GCSEs in English Language and Maths .
This is a two year course which leads on to higher education, a level 4 apprenticeship, a degree apprenticeship or into employment.
Stratford-upon-Avon College
Sept-2022
Various
TBC
N/A For 16 to 18 Year Olds
IPABY061SCF1
Full Time
Workers in this unit group provide advice on the effective utilisation of IT and design IT systems in order to meet the business objectives or to enhance the business effectiveness of the organisation.
IT specialist managers plan, organise, manage and coordinate the provision of specialist IT services and functions in an organisation.
IT user support technicians are responsible for providing technical support, advice and guidance for internal/external users of IT systems and applications, either directly or by telephone, e-mail or other network interaction.
IT engineers install, maintain and repair the physical components of computer systems and equipment.
Telecommunications engineers install, maintain and repair public and private telephone systems and maintain, test and repair telecommunications cables.
Programmers and software development professionals design, develop, test, implement and maintain software systems in order to meet the specifications and business objectives of the information system; they also design and develop specialist software e.g. for computer games.
Jobholders in this unit group design, develop and maintain websites to meet a client's specified requirements.
IT operations technicians are responsible for the day-to-day running of IT systems and networks including the preparation of back-up systems, and for performing regular checks to ensure the smooth functioning of such systems.
IT engineers install, maintain and repair the physical components of computer systems and equipment.
Jobholders in this unit group manage, coordinate and technically supervise specific IT projects and programmes of a specific duration and/or budget.
Cyber Security Professionals identify common weaknesses in IT networks, use digital resources to gather information and evidence, use computer forensics to identify attackers and their methods, analyse threats to major security systems and monitor new threats and assess their impact.