Need Assistance? 01384 442752 (UK)

Advanced Certificate in E Commerce VIT014

Duration (approx) 900 hours
Qualification Advanced Certificate
Develop your knowledge, awareness and capacity to work in e-commerce

It's easy to enrol...

Select a payment plan:  

Select a learning method  


Develop your knowledge, awareness and capacity to work in e-commerce


Compulsory Modules

These modules provide foundation knowledge for the Advanced Certificate in E-commerce:
  Industry Project BIP000
  Cyber Security VIT103
  E Commerce BIT100
  Html (Writing a Website) VIT102
  Graphic Design BIT205
  Information Security BIT203
  Internet Marketing BIT204

Elective Modules

In addition to the above modules, students study any 2 of the following modules:
  Bookkeeping Foundations (Bookkeeping I) BBS103
  Freelance Writing BWR102
  Marketing Foundations VBS109
  Marketing Psychology BPS107
  Publishing I BWR107
  Research Project I BGN102
  Sales Management BBS102
  Visual Basic.Net BIT101
  Advertising and Promotions BBS202
  Digital Photography BPH202
  Entrepreneurship BBS204
  Javascript BIT202
  Photoshop CS - Beginner To Medium Level VIT202
  Marketing Systems BBS303

Course Duration:  900 hours


Learn to Develop Secure, Effective E Commerce

This course lays the foundation for you to understand how e commerce can be applied in any business, how you can protect against cyber attacks and protect your intellectual property.

Learning to Create and Manage a Web Site is Important

....but having a functional web site is only part of what is needed.

When organizations are trying to secure their assets, knowledge equates to power. As businesses constantly increase their dependence on information technology -- including placing/migrating data to the cloud, IoT (internet of things) devices, mobile devices, social platforms, and others – their exposure to cyber risks continues to rise significantly.

However, just like an annual health check, a vulnerability management program can help organizations identify weaknesses in their cyber systems before these turn into problems. 

Performing a Vulnerability Assessment

The majority of all cyber attacks are designed to exploit known weaknesses and vulnerabilities. And with thousands and thousands of new vulnerabilities discovered every year, it is important for organizations to exercise constant vigilance to evaluate IT security posture and discover weaknesses, as well as to respond appropriately. A robust vulnerability assessment program is the key to responding to this more dangerous threat environment. This is because a vulnerability assessment is a formal process that identifies and quantifies the security weaknesses including the application software, hardware and networks. 

A vulnerability assessment for an organization should produce a clear report containing a list of the components that require attention in the organization’s environment – and where on the list of priorities these components lie. Systems administrators in organizations’ IT departments are constantly updating, patching and applying software patches to their critical systems, however managing software updates and patches is quite a challenging task for IT departments because patches are known to occasionally cause disruption to other software and in some instances, systems requiring patches cannot be taken offline. For this reason, a good vulnerability assessment will provide the organization with a list of prioritized vulnerabilities sorted by system or software (or others) and can be used by the organization’s IT department and used as a to-do list to improve the organization’s security posture. 

It is important for any organization, even if it is not a high priority target, to devise a plan of defence against today’s advanced cyberattacks whereby attackers program the attacks to actively search for vulnerabilities in systems and networks and automatically start their attack process as soon as these are found. It is also important to know that scanning for vulnerability assessments is one thing, and analysing/prioritizing vulnerabilities by including them in an overall “risk management program” is another. 

A typical vulnerability assessment often involves the 5 steps below:

  1. Identifying which assets need to be protected;
  2. Evaluating threats against those assets;
  3. Undertaking vulnerability appraisal to understand how susceptible the current protection method is;
  4. Assessing risks (using the likelihood and impact of any potential weakness exploitation);
  5. Mitigating risks.

Statistical data about published data breaches worldwide shows the majority of attacks were targeting known vulnerabilities in cyber systems. The problems lie in identifying the vulnerabilities and responding effectively to them, which is what ultimately leads to cyber intrusions and damage to cyber systems.

Courses can be started anytime from anywhere in the world!