Topic outline

  • General




  • Topic 1. Basic definition and components of «IT-infrastructure»

    Learning Objectives

    To learn about definition and examples of IT-infrastructure global information infrastructure, information infrastructure of the state, distance learning, networking mass media; lifecycle of IT-infrastructure:

    • creation, use, modernization; data storage
    • organization and networks; storage
    • devices of data storage systems, reliability
    • of data storage; Infrastructure of data
    • processing center (DPC), basic servers
    • platforms of DPC, computational
    • infrastructure of DPC, network
    • infrastructure of DPC, engineering
    • infrastructure of DPC; composition and
    • designation of IS software, standard and
    • specialized software, trends of IS software development.


    Learning Outcomes

    To know the basic notions, designations and components of IT- infrastructure to know the basic types of IT-infrastructure solutions and to understand the methods of their optimal selection
  • Topic 2. Standards, politics, basic laws and legislation acts for corresponding infrastructure solutions

    Learning Objectives

    To learn about competition between the norms of Civil Code of Ukraine and special laws in IS, peculiarities of realization and protection of intellectual properly in electronic form,  disposal of properly rights on data bases, forms of rewards for usage of the object of intellectual properly; IS audit and assurance standards, ISO management system standards,  security standards, Control Objectives for Information and Related Technologies (CobiT) standards.

    Topic structure with lecture presentation for subtopics:
    1.2.1. Intellectual property.
    1.2.2. Taxation of the activity of IT companies.
    1.2.3. Standards in the sphere of IS.

    Learning Outcomes

    • to understand the information politics and to know the fundamental laws and legislation acts for relevant infrastructure solutions
    • to be able to apply international and national standards in the process of creation and usage of IT- infrastructure
  • Topic 3. Infrastructure vendors

    To learn the interaction of information infrastructure and vendors of IS, types of contracts and agreements, content of agreements:

    • Spin contract, Fixed Price / Fixed Scope, Time and Materials, Time and Materials with fixed scope and limited expenses,  Time and Materials with Variable Scope and limited expenses, Bonuses and penalties, Fixed income, Joint-ventures;
    • advantages and disadvantages of infrastructure outsourcing;
    • Service Level Agreement (SLA);
    • management of IT-infrastructure;
    • basic notions and definitions of virtualization, advantages and disadvantages of virtualization. Types of virtualization, virtualization of platforms and virtualization of resources, means of virtualization;
    • cloud services.

  • Topic 4. Infrastructure risks

    Learning Objectives

    To learn about essence of monitoring in the system of IS control, requirements to to understand the basic methods of IT- infrastructure IS monitoring system, systems of IS monitoring support; infrastructure risks:

    • technological, financial, technical, integration risks;
    • methods of information risks assessment;
    • the influence of Information security to Infrastructure risks;
    • monitor infrastructure status from multiple perspectives and take appropriate action in case of irregularities;
    • design and document appropriate processes for risk analysis and management.


    Topic structure with lecture presentation for subtopics:
    2.2.1. Notions and sources of information risks.
    2.2.2. Systems of IS monitoring and control.
    2.2.3. The influence of Information security to Infrastructure risks.
    2.2.4. Unified communication.

    Learning Outcomes

    to understand the basic methods of IT- infrastructure monitoring and control to understand the sources of infrastructure risks and methods of their reduction

  • Topic 5. Monitoring of New Technologies

    Learning Objectives

    To learn the requirements to IT monitoring system, means of IT monitoring support.

    Topic structure with lecture presentation for subtopics:
    2.3.1. Essence and means of new information technologies monitoring.

    Learning Outcomes

    To understand the necessity and the ways of new information technologies monitoring

  • Assessment methods, criteria and regime

    Progress and learning is assessed not only at the end but throughout the entire course. Evidence of an ability to think through and critically analyze challenges will be highly rewarded in the assessment.

    Students' grades will be determined by individual Assignments, based on description of the key idea, normative regulation and steps necessary to build innovation pipeline and supply it with ground-breaking ideas.

    In the overall assessment, distance learning courses at МООC platforms (Coursera, Prometheus, MIT etc.) for individual topics.

    • The relative weight of Assignment Brief for main kind of activities will be set at 100%. It will be marked on the basis of:  Analytical works and projects 40%; Theory learning (by results of exam) – 35%; Laboratory work 25%. The part of theory learning outcomes could be replaced by received certificates at МООC platforms
    The relative weight of Assignment Brief for analytical works will be set at 100%. It will be marked on the basis of:  The aim of the report clearly formulated 20%; Coherence of the arguments and reflection 10%;  Reflection based entirely on the description of facts and events    40%;  Utilization of adequate terminology to describe the project management    20%;  Evidence of activities undertaken

    • Recommended or required reading

      Main:

      1. Bernard, Scott A.; Introduction to Enterprise Architecture; Publisher: authorHOUSE™; 2005

      2. James O'Reilly Network Storage //  Elsevier / Morgan Kaufmann. - 2016, 280 p.

      3. Todd Lammle, Todd Montgomery CCNA Data Center: Introducing Cisco Data Center Technologies Study Guide // Publisher: Wiley/Sybex, 2016, 288 p.

      4.      Rick van der Lans Data Virtualization for Business Intelligence Systems //  Elsevier / Morgan Kaufmann.-2012, 296 p.

      5. Gillam, Lee Cloud Computing: Principles, Systems and Applications / Nick Antonopoulos, Lee Gillam — L.: Springer, 2010. — 379 p. — (Computer Communications and Networks). — ISBN 9781849962407

      6. Harris Michael D. S., Herron David, Iwanicki Stasia. The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results. CRC Press, 2008

      7. Laudon K.C., Laudon J.P. (2015). Management Information Systems: Managing the Digital Firm. Global Edition (14th ed.). Harlow: Pearson Education.

      8. Keshari, S., & Kumar, N. (2013). IT Infrastructure and Management. I.K. International Publishing House Pvt. Limited.

      Additional:

      1.      Alter, Steven, "Work System Theory: Overview of Core Concepts, Extensions, and Challenges for the Future" (2013). Business Analytics and Information Systems. Paper 35.

      2.      Adner, R., & Kapoor, R. (2016). Right Tech, Wrong Time. Harvard business review, 94(11), 60-67.

      3.      Олейник А. И., Сизов А. В. ИТ-инфраструктура [Текст]: учеб.-метод. пособие / А. И. Олейник, А. В. Сизов; Нац .исслед. ун-т «Высшая школа экономики». — М.: Изд. дом Высшей школы экономики, 2012. — 134 с.

      4.      Cisco, Cisco Data Center Infrastructure 2.5 Design Guide, Cisco Press, 2010.

      5.      Mark Williams - A Quick Start Guide to Cloud Computing: Moving Your Business Into the Cloud. //  Kogan Page , 2010 , 152 pp

      1. Зайнуллин С.Б. Корпоративная безопасность: Учебное пособие. - М., 2016. - 124 с.
      2. Кожушко Р.Ю. Інтелектуальна власність: навчальний посібник/ Р.Ю.Кожушко, М.В.Колосніченко, І.П.Остапчук та ін. – К.: КНУТД, 2014. – 108 с.

      8.      COBIT Quickstart

      9.      COBIT  4.1 Excerpt

      10.  COBIT Security Baseline

      11.  COBIT Control Practices

      12.  COBIT Control Objectives

      13.  COBIT Mapping: Mapping of ISO/IEC 20000 with COBIT 4.1 (e-book)

      14.  COBIT Mapping: Mapping of CMMI for Development V1.2 with COBIT 4.1 (e-book)

      15.  COBIT Mapping: Mapping of CMMI for Development V1.2 With COBIT 4.0 (e-book)

      16.  COBIT Mapping: Mapping FFIEC with COBIT 4.1 (e-book)

      17.  COBIT Mapping: Mapping ITIL V3 With COBIT 4.1 (e-book)

      18.  COBIT Mapping: Mapping PMBOK to COBIT 4.0 (e-book)

      19. ISO/IEC 15288:2008 System and software engineering - System life cycle processes.
      20. ISO/IEC 42010 IEEE Std 1471-2000 System and software engineering - Recommended practice for architectural description of software-intensive systems.
      21. ISO/IEC 90003:2004 Software engineering - Guidelines for the application of ISO 9001:2000 to computer software.
      22. ISO/IEC TR 90005:2008 Software engineering - Guidelines for the application of ISO 9001:2000 to system life cycle processes.
      23. ISO/IEC 9126-1÷4:2001÷2006 Software engineering - Product quality - Part 1÷4
      24. ISO/IEC 25051:2006 Software engineering - Software product Quality Requirements and Evaluation (SQuaRE) -Requirements for quality of Commercial Off-The-Shelf (COTS) software product and instructions for testing.
      25. IEEE 829-2008 Standard for Software and System Test Documentation.
      26. ISO/IEC 14598-1÷6:1999÷2001 Information technology - Part 1÷6.
      27. Бармен Скотт. Разработка правил информационной безопасности. М.: Вильямс, 2002. — 208 с. — ISBN 5-8459-0323-8ISBN 1-57870-264-X
      Internet based materials:
      1.      Managed Infrastructure Lifecycle Solution Overview // Fujitsu Technology Solutions, 2014 https://www.fujitsu.com/au/Images/ffs-managed-infrastructure-lifecycle-solution_tcm98-913189.pdf
      2.      Standards for the installation of communications infrastructure at CHARLES STURT UNIVERSITY //  Release 8.7 – February 2015 http://www.csu.edu.au/__data/assets/pdf_file/0006/1314699/Communications-Standards.pdf

      3.  Рекомендации по управлению ИТ инфраструктуры на основе ITIL и моделей ITSM [Элек-тронный ресурс]. URL: http://www.topsbi.ru/?trID=128 (Дата обращения 19.02.13).

      4.      Рекомендации по контролю работоспособности ИТ-инфраструктуры от IBM [Электронный ресурс]. URL: http://www.cybersecurity.ru/programm/34942.html (Дата обращения 21.02.13).

      5. Links & references on standards and other documents are at https://web.archive.org/web/20120330142527/http://is-standard.com:80/