This course aims to provide students with the technological basis for understanding information systems presenting the main themes, including hardware, software, data, and networks as well as the key tools and techniques for security and control of information.
Hardware, software, data, e networks
Information security and control
Upon completion of this course the student should be able to:
• Identify key information and communication technologies available today, as well as their evolution in the short and medium term
• Recognize the advantages and disadvantages of the various technologies of data storage
• Discriminate the various data communication mechanisms, including access to the Internet and wireless networks
• Recognize the importance of information security and key technologies currently available in this area
The program covers the following topics:
• Technological Infrastructures
• Trends in software
• Trends in hardware
• Managing files and data
• Wired and Wireless Networks
• Internet today
• Information Security
• Security Technologies
Marc Lankhorst. Enterprise Architecture at Work: Modelling, Communication and Analysis, 4th edition (ISBN 978-3662571699) Springer, 2017
E-learning
Evaluation is made on individual basis and it involves the coexistence of two modes: continuous assessment (60%) and final evaluation (40%). Further information is detailed in the Learning Agreement of the course unit.