Earn & Learn to an International Degree (Philippines)
6 Months Full Time Bootcamp with 18 Months Part Time Full Time Instructor-led Live & Mentor-led Blended Learning Pearson BTEC Level 5 HND Diploma in Computing (Applications Development) (RQF)
What do I Get?
Who should attend & prerequisites
- Individuals who want to embark on a career in Digital Software Development.
- Learners should have at least ‘A' Level or 'A' level equivalent qualifications
- Language Proficiency: IELTS 5.5 or its equivalent
- Students without a 'A' Level or equivalent qualification can enrol to Pearson Level 3 90-credit Diploma in IT offered by Lithan to acquire A-level equivalent qualification
- Minimum attendance of 75% for all Sessions in each of the units
- Should achieve minimum Pass Grade in all the 15 units of the program to get a Pearson HND Diploma Certificate.
- Should achieve minimum Pass Grade in 8 units of the program to get a Pearson HNC Certificate.
Blended Learning Journey
Assignments / Labs
Flipped Class Sessions
- LO1. Define basic algorithms to carry out an operation and outline the process of programming an application.
- LO2. Explain the characteristics of procedural, object-orientated and event-driven programming, conduct an analysis of a suitable Integrated Development Environment (IDE).
- LO3. Implement basic algorithms in code using an IDE.
- LO4. Determine the debugging process and explain the importance of a coding standard.
P1 Provide a definition of what an algorithm is and outline the process in building an application.
P2 Give explanations of what procedural, object orientated and event driven paradigms are; their characteristics and the relationship between them.
P3 Write a program that implements an algorithm using an IDE.
P4 Explain the debugging process and explain the debugging facilities available in the IDE.
P5 Outline the coding standard you have used in your code.
M1 Determine the steps taken from writing code to execution
M2 Analyse the common features that a developer has access to in an IDE
M3 Use the IDE to manage the development process of the program.
M4 Evaluate how the debugging process can be used to help develop more secure, robust applications
D1 Examine the implementation of an algorithm in a suitable language. Evaluate the relationship between the written algorithm and the code variant.
D2 Critically evaluate the source code of an application which implements the programming paradigms, in terms of the code structure and characteristics.
D3 Evaluate the use of an IDE for development of applications contrasted with not using an IDE.
D4 Critically evaluate why a coding standard is necessary in a team as well as for the individual.
- LO1. Examine networking principles and their protocols.
- LO2. Explain networking devices and operations.
- LO3. Design efficient networked systems.
- LO4. Implement and diagnose networked systems.
P1 Discuss the benefits and constraints of different network types and standards.
P2 Explain the impact of network topology, communication and bandwidth requirements.
P3 Discuss the operating principles of networking devices and server types.
P4 Discuss the interdependence of workstation hardware with relevant networking software.
P5 Design a networked system to meet a given specification.
P6 Test and evaluate the design to meet the requirements and analyse user feedback.
P7 Implement a networked system based on a prepared design.
P8 Document and analyse test results against expected results.
M1 Compare common networking principles and how protocols enable the effectiveness of networked systems.
M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation
M3 Install and configure network services and applications on your choice
M4 Recommend potential enhancements for the networked systems.
D1 Considering a given scenario, identify the topology protocol selected for the efficient utilisation of a networking system.
D2 Design a maintenance schedule to support the networked system.
D3 Use critical reflection to evaluate own work and justify valid conclusions
- LO1 Demonstrate a range of interpersonal and transferable communication skills to a target audience.
- LO2 Apply critical reasoning and thinking to a range of problem-solving scenarios.
- LO3 Discuss the importance and dynamics of working within a team and the impact of team working in different environments.
- LO4 Examine the need for Continuing Professional Development (CPD) and its role within the workplace and for higher level learning.
P1 Demonstrate, using different communication styles and formats, that you can effectively design and deliver a training event for a given target audience.
P2 Demonstrate that you have used effective time management skills in planning an event.
P3 Demonstrate the use of different problem-solving techniques in the design and delivery of an event.
P4 Demonstrate that critical reasoning has been applied to a given solution.
M1 Design a professional schedule to support the planning of an event, to include contingencies and justifications of time allocated.
M2 Research the use of different problem-solving techniques used in the design and delivery of an event.
M3 Justify the use and application of a range of solution methodologies.
D1 Evaluate the effectiveness and application of interpersonal skills during the design and delivery of a training event.
D2 Critique the process of applying critical reasoning to a given task/activity or event.
D3 Provide a critical evaluation of your own role and contribution to a group scenario.
D4 Evaluate a range of evidence criteria that is used as a measure for effective CPD.
Database Design & Development
- LO1. Use an appropriate design tool to design a relational database system for a substantial problem.
- LO2. Develop a fully functional relational database system, based on an existing system design.
- LO3. Test the system against user and system requirements.
- LO4. Produce technical and user documentation
P1 Design a relational database system using appropriate design tools and techniques, containing at least four interrelated tables, with clear statements of user and system requirements.
P2 Develop the database system with evidence of user interface, output and data validations, and querying across multiple tables.
P3 Implement a query language into the relational database system.
P4 Test the system against user and system requirements.
P5 Produce technical and user documentation.
M1 Produce a comprehensive design for a fully functional system which includes interface and output designs, data validations and data normalisation.
M2 Implement a fully functional database system which includes system security and database maintenance.
M3 Assess whether meaningful data has been extracted through the use of query tools to produce appropriate management information.
M4 Assess the effectiveness of the testing, including an explanation of the choice of test data used.
M5 Produce technical and user documentation for a fully functional system, including diagrams showing movement of data through the system, and flowcharts describing how the system works.
D1 Assess the effectiveness of the design in relation to user and system requirements.
D2 Evaluate the effectiveness of the database solution in relation to user and system requirements, and suggest improvements.
D3 Assess any future improvements that may be required to ensure the continued effectiveness of the database system.
- LO1 Assess risks to IT security.
- LO2 Describe IT security solutions.
- LO3 Review mechanisms to control organisational IT security.
- LO4 Manage organisational security.
P1 Identify types of security risks to organisations.
P2 Describe organisational security procedures.
P3 Identify the potential impact to IT security of incorrect configuration of firewall policies and thirdparty VPNs.
P4 Show, using an example for each, how implementing a DMZ, static IP and NAT in a network can improve Network Security.
P5 Discuss risk assessment procedures.
P6 Explain data protection processes and regulations as applicable to an organisation.
P7 Design and implement a security policy for an organisation.
P8 List the main components of an organisational disaster recovery plan, justifying the reasons for inclusion.
M1 Propose a method to assess and treat IT security risks.
M2 Discuss three benefits to implement network monitoring systems with supporting reasons.
M3 Summarise the ISO 31000 risk management methodology and its application in IT security.
M4 Discuss possible impacts to organisational security resulting from an IT security audit.
M5 Discuss the roles of stakeholders in the organisation to implement security audit recommendations.
D1 Investigate how a ‘trusted network’ may be part of an IT security solution.
D2 Consider how IT security can be aligned with organisational policy, detailing the security impact of any misalignment.
D3 Evaluate the suitability of the tools used in an organisational policy.
Managing a Successful Computing Project
- LO1 Establish project aims, objectives and timeframes based on the chosen theme.
- LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project.
- LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis.
- LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organisational performance.
P1 Devise project aims and objectives for a chosen scenario.
P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication, risk and resources.
P3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion.
P4 Carry out small-scale research by applying qualitative and quantitative research methods appropriate for meeting project aims and objectives.
P5 Analyse research and data using appropriate tools and techniques.
P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions. P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and performance.
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for monitoring and completing the aims and objectives of the project.
M2 Evaluate the accuracy and reliability of different research methods applied.
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations. M4 Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance.
D1 Critically evaluate the project management process and appropriate research methodologies applied.
D2 Critically evaluate and reflect on the project outcomes, the decision making process and changes or developments of the initial project management plan to support justification of recommendations and learning during the project.
Software Development Lifecycles
- LO1 Describe different software development lifecycles.
- LO2 Explain the importance of a feasibility study.
- LO3 Undertake a software development lifecycle.
- LO4 Discuss the suitability of software behavioural design techniques.
P1 Describe two iterative and two sequential software lifecycle models.
P2 Explain how risk is managed in the Spiral lifecycle model.
P3 Explain the purpose of a feasibility report.
P4 Describe how technical solutions can be compared.
P5 Undertake a software investigation to meet a business need.
P6 Use appropriate software analysis tools/techniques to carry out a software investigation and create supporting documentation.
P7 Explain how user and software requirements have been addressed.
M1 Describe, with an example, why a particular lifecycle model is selected for a development environment.
M2 Discuss the components of a feasibility report.
M3 Analyse how software requirements can be traced throughout the software lifecycle.
M4 Discuss two approaches to improving software quality.
M5 Suggest two software behavioural specification methods and illustrate their use with an example.
M6 Differentiate between a finite state machine (FSM) and an extended-FSM, providing an application for both.
D1 Assess the merits of applying the Waterfall lifecycle model to a large software development project.
D2 Assess the impact of different feasibility criteria on a software investigation.
D3 Critically evaluate how the use of the function design paradigm in the software development lifecycle can improve software quality. D4 Present justifications of how data driven software can improve the reliability and effectiveness of software.
Website Design & Development
- LO1 Explain server technologies and management services associated with hosting and managing websites.
- LO2 Categorise website technologies, tools and software used to develop websites.
- LO3 Utilise website technologies, tools and techniques with good design principles to create a multipage website.
- LO4 Create and use a Test Plan to review the performance and design of a multipage website.
P1 Identify the purpose and types of DNS, including explanations on how domain names are organised and managed.
P2 Explain the purpose and relationships between communication protocols, server hardware, operating systems and web server software with regards to designing, publishing and accessing a website.
P3 Discuss the capabilities and relationships between front-end and back-end website technologies and explain how these relate to presentation and application layers.
P4 Discuss the differences between online website creation tools and custom built sites with regards to design flexibility, performance, functionality, User, Experience (UX) and User Interface (UI).
M1 Evaluate the impact of common web development technologies and frameworks with regards to website design, functionality and management.
M2 Review the influence of search engines on website performance and provide evidence-based support for improving a site’s index value and rank through search engine optimisation.
D1 Justify the tools and techniques chosen to realise a custom built website.
D2 Critically evaluate the design and development process against your design document and analyse any technical challenges.
D3 Critically evaluate the results of your Test Plan and include a review of the overall success of your multipage website; use this evaluation to explain any areas of success and provide justified recommendations for areas that require improvement.
Computing Research Project
- LO1 Examine appropriate research methodologies and approaches as part of the research process.
- LO2 Conduct and analyse research relevant to a computing research project.
- LO3 Communicate the outcomes of a research project to identified stakeholders.
- LO4 Reflect on the application of research methodologies and concepts.
P1 Produce a research proposal that clearly defines a research question or hypothesis supported by a literature review.
P2 Examine appropriate research methods and approaches to primary and secondary research.
P3 Conduct primary and secondary research using appropriate methods for a business research project that consider costs, access and ethical issues.
P4 Apply appropriate analytical tools, analyse research findings and data.
P5 Communicate research outcomes in an appropriate manner for the intended audience.
P6 Reflect on the effectiveness of research methods applied for meeting objectives of the business research project.
P7 Consider alternative research methodologies and lessons learnt in view of the outcomes.
M1 Evaluate different research approaches and methodology and make justifications for the choice of methods selected based on philosophical/theoretical frameworks.
M2 Discuss merits, limitations and pitfalls of approaches to data collection and analysis.
M3 Coherently and logically communicate outcomes to the intended audience demonstrating how outcomes meet set research objectives.
M4 Provide critical reflection and insight that results in recommended actions for improvements and future research considerations.
D1 Critically evaluate research methodologies and processes in application to a business research project to justify chosen research methods and analysis.
D2 Communicate critical analysis of the outcomes and make valid, justified recommendations.
D3 Demonstrate reflection and engagement in the resource process leading to recommended actions for future improvement.
- LO1 Discuss business processes and the mechanisms used to support business decision-making.
- LO2 Compare the tools and technologies associated with business intelligence functionality.
- LO3 Demonstrate the use of business intelligence tools and technologies.
- LO4 Discuss the impact of business intelligence tools and technologies for effective decision-making purposes and the legal/regulatory context in which they are used.
P1 Examine, using examples, the terms ‘Business Process’ and ‘Supporting Processes’.
P2 Compare the types of support available for business decision-making at varying levels within an organisation.
P3 Determine, with examples, what business intelligence is and the tools and techniques associated with it.
P4 Design a business intelligence tool, application or interface that can perform a specific task to support problem-solving or decision-making at an advanced level.
P5 Discuss how business intelligence tools can contribute to effective decision-making.
P6 Explore the legal issues involved in the secure exploitation of business intelligence tools.
M1 Differentiate between unstructured and semistructured data within an organisation.
M2 Justify, with specific examples, the key features of business intelligence functionality.
M3 Customise the design to ensure that it is userfriendly and has a functional interface.
M4 Conduct research to identify specific examples of organisations that have used business intelligence tools to enhance or improve operations.
D1 Evaluate the benefits and drawbacks of using application software as a mechanism for business processing.
D2 Compare and contrast a range of information systems and technologies that can be used to support organisations at operational, tactical and strategic levels.
D3 Provide a critical review of the design in terms of how it meets a specific user or business requirement and identify what customisation has been integrated into the design.
D4 Evaluate how organisations could use business intelligence to extend their target audience and make them more competitive within the market, taking security legislation into consideration.
- LO1. Explore forms of prototypes appropriate for various functionality and end user testing requirements.
- LO2. Plan a prototype for specific target end users and planned tests.
- LO3. Develop multiple iterations of the prototype using appropriate tools.
- LO4. Evaluate user feedback and test results from multiple iterations of the prototype and end user testing.
P1 Recognise specific forms of prototyping functionality and end user testing requirements.
P2 Evaluate standard tools available for use in prototyping.
P3 Review different end user categorisations, classifications and behaviour modelling techniques.
P4 Explore a specific end user and an appropriate prototyping methodology to test with this user type.
P5 Explore appropriate tools to develop multiple prototypes.
P6 Perform end user experiments and examine feedback
P7 Analyse end use feedback from multiple iterations of your prototype.
M1 Review specific forms of prototyping and the advantages and disadvantages of end user testing requirements for appropriateness to different testing outcomes.
M2 Apply end user classification and behaviour modelling to select an appropriate prototyping methodology.
M3 Suggest a plan to use appropriate prototyping methodology and tools to conduct end user testing
M4 Employ an appropriate set of tools to develop your plan into a prototype.
M5 Using end user feedback build a new iteration of your prototype modified using the most important feedback and enhancements. M6 Undertake a critical review and compare your final prototype and your test results with your original plan. Distinction Requirements:
D1 Evaluate the impact of common prototyping methodology within the software development lifecycle.
D2 Create multiple iterations of your prototype and modify each iteration with enhancements gathered from user feedback and experimentation.
D3 Critique the overall success of your prototype and discuss your insight using prototyping.
Application Program Interfaces
- LO1. Examine what an API is, the need for APIs and types of APIs.
- LO2. Apply the knowledge of API research to design an application that incorporates relevant APIs for a given scenario or a substantial student chosen application.
- LO3. Implement an application in a suitable development environment.
- LO4 Document the testing of the application, review and reflect on the APIs used.
P1 Examine the relationship between an API and a software development kit (SDK).
P2 Analyse an existing application that could be extended with a suitable API.
P3 Build on an existing application framework to implement an API.
P4 Design and complete a ‘white box’ test of the application, recording the results.
M1 Asses a range of APIs for a particular platform that covers a range of uses.
M2 Design an application that will utilise an API for a given purpose.
M3 Develop an application that utilises an API.
M4 Conduct ‘black box’ tests of your application, recording the results.
M5 Update the application accordingly with the results.
D1 Evaluate potential security issues surrounding APIs
D2 Create a design for a chosen substantial application that will utilise a range of APIs, justifying choices.
D3 Construct an application utilising multiple APIs, following the designs in LO2.
D4 Critically evaluate the APIs used within your application. Provide a data security report of your application.
- LO1. Produce a Software Design Document by analysing a business-related problem and deduce an appropriate solution including a set of initial requirements.
- LO2. Use design and development methodologies with tools and techniques associated with the creation of a business application.
- LO3. Work individually and as part of a team to plan and produce a functional business application with support documentation.
- LO4. Evaluate the performance of a business application against its Software Design Document and initial requirements.
P1 Explore a business-related problem and produce a well-defined Problem Definition Statement supported by a set of user and system requirements.
P2 Determine any areas of risk related to the successful completion of your application.
P3 Research the use of software development tools and techniques and identify any that have been selected for the development of this application.
P4 Create a formal presentation that effectively reviews your business application, problem definition statement, proposed solution and development strategy. Use this presentation as part of a peer-review and document any feedback given.
P5 Develop a functional business application based on a specified business problem.
P6 Review the performance of your business application against the Problem Definition Statement and initial requirements.
M1 Analyse a business-related problem using appropriate methods and produce a well-structured Software Design Document that defines a proposed solution and includes relevant details on requirements, system analysis, system design, coding, testing and implementation.
M2 Compare the differences between the various software development tools and techniques researched and justify your preferred selection as well as your preferred software development methodology
M3 Interpret your peer review feedback and identify opportunities not previously considered.
M4 Develop a functional business application based on a specific Software Design Document with supportive evidence of using the preferred tools, techniques and methodologies.
M5 Analyse the factors that influence the performance of a business application and use them to undertake a critical review of the design, development and testing stages of your application. Conclude your review by reflectively discussing your previously identified risks.
D1 Justify the tools and techniques chosen to realise a custom built website. Justify your preferred selection of tools and techniques in deducing an appropriate solution to a business related problem.
D2 Evaluate any new insights, ideas or potential improvements to your system and justify the reasons why you have chosen to include (or not to include) them as part of this business application.
D3 Critically evaluate the strengths and weaknesses of your business application and fully justify opportunities for improvement and further development.
Database Management Systems
- LO1. Analyse different types of database management systems.
- LO2. Design a database management system using a relational model to meet client requirements.
- LO3. Develop a database management system using a suitable platform.
- LO4. Demonstrate the system administration and management tools available on the chosen platform
P1 Compare and contrast the different types of database models.
P2 Produce a design for a relational database management system to meet client requirements.
P3 Develop a fully functional system which meets client and system requirements, using an open source language (with an application software e.g. MySQL with front end Microsoft Access).
P4 Test the system for functionality and performance.
P5 Demonstrate the tools available in the system to monitor and optimise system performance, and examine the audit logs.
P6 Demonstrate the tools available in the system to manage security and authorisations.
M1 Assess how relational database models and the process of normalisation can provide reliable and efficient data structures.
M2 Analyse how the design will optimise system performance.
M3 Implement effective features in the solution to handle concurrency, security, user authorisations and data recovery.
M4 Assess the effectiveness of the system administration and management tools available on the platform identifying any shortcomings of the tools.
D1 Critically evaluate different database management systems available in relation to open source and vendor-specific platforms, justifying the criteria used in the evaluation.
D2 Critically evaluate the effectiveness of the system design and development against client and system requirements.
D3 Assess any future improvements that may be required to ensure the continued effectiveness of the database system.
- LO1. Examine the key components related to the object-orientated programming paradigm, analysing design pattern types.
- LO2. Design a series of UML class diagrams.
- LO3. Implement code applying design patterns.
- LO4 Investigate scenarios with respect to design patterns.
P1 Examine the characteristics of the object-orientated paradigm as well as the various class relationships.
P2 Design and build class diagrams using a UML tool.
P3 Build an application derived from UML class diagrams.
P4 Discuss a range of design patterns with relevant examples of creational, structural and behavioural pattern types.
M1 Determine a design pattern from each of the creational, structural and behavioural pattern types.
M2 Define class diagrams for specific design patterns using a UML tool.
M3 Develop code that implements a design pattern for a given purpose.
M4 Reconcile the most appropriate design pattern from a range with a series of given scenarios.
D1 Analyse the relationship between the object-orientated paradigm and design patterns.
D2 Define/refine class diagrams derived from a given code scenario using a UML tool.
D3 Evaluate the use of design patterns for the given purpose specified in M3.
D4 Critically evaluate a range of design patterns against the range of given scenarios with justification of your choices.