Bridge Program for Non-IT Background Participants

The 12-week Bridge Program for IT Governance and Security Audit is designed to provide foundational IT knowledge and essential cybersecurity concepts to participants from non-IT backgrounds, equipping them with the technical grounding needed to excel in the Post Graduate Program in IT Governance and Security Audit. By bridging the gap between their existing academic qualifications and the demands of IT governance, security, and compliance, this program ensures that learners can confidently engage with the rigorous coursework of the two-year postgraduate program. The preparatory training will focus on developing fundamental computing, networking, cybersecurity awareness, risk management principles, and governance frameworks to facilitate a smooth transition into the specialized IT governance and audit domains.

This preparatory program is intended to empower professionals from non-IT disciplines—such as commerce, science, arts, law, or management—with the technical acumen, industry-specific knowledge, and analytical skills required for a successful career in IT governance and security auditing. By ensuring a progressive learning path, the program intends to reduce learning difficulties in the postgraduate program while fostering confidence in dealing with technical terminology, cybersecurity frameworks, IT risk management, and digital forensic methodologies. It also seeks to promote a security-conscious mindset, encouraging learners to think critically about governance, compliance, and organizational security in an increasingly digital world.

Training Program Objectives

The Bridge Program for IT Governance and Security Audit aims to equip participants with the fundamental technical knowledge and core IT governance principles required for a smooth transition into the Post Graduate Program in IT Governance and Security Audit. The key objectives of this 12-week preparatory program are:

  1. Understand Computer Hardware and Maintenance – Develop foundational knowledge of computer components, system architecture, troubleshooting, and maintenance best practices.
  2. Learn Fundamentals of Networking – Cover essential networking concepts, including TCP/IP, LAN, WAN, sub netting, DNS, DHCP, firewalls, and network security.
  3. Gain Basic Server Administration Skills – Understand Windows and Linux server environments, user and access management, system configuration, and remote administration.
  4. Develop Linux Administration Skills – Learn command-line operations, file system management, shell scripting, user roles, and system security fundamentals.
  5. Introduction to Cloud Computing – Understand cloud service models (IaaS, PaaS, SaaS), cloud security, virtualization, and cloud governance frameworks.
  6. Develop Cybersecurity Awareness – Learn about common cyber threats, vulnerabilities, security frameworks, and best practices for IT security management.
  7. Explore IT Governance Frameworks – Introduction to industry-standard governance models such as COBIT, ITIL, ISO 27001, NIST, and GDPR.
  8. Learn IT Risk Management – Understand the principles of risk assessment, mitigation strategies, compliance, and regulatory requirements.
  9. Enhance Digital Literacy – Develop hands-on proficiency with enterprise IT tools, cloud-based applications, and cybersecurity utilities.
  10. Gain Basic Scripting and Automation Knowledge – Introduction to scripting with Python, PowerShell, or Bash for automation in security and administration tasks.
  11. Introduction to Security Incident Handling – Learn fundamental incident response techniques, log analysis, and intrusion detection methods.
  12. Develop IT Audit and Compliance Skills – Understand audit processes, IT controls, security assessments, and compliance frameworks.
  13. Build Analytical and Problem-Solving Skills – Foster critical thinking required for identifying security risks, analyzing IT governance structures, and implementing solutions.
  14. Encourage Ethical IT Practices – Instill strong ethical values in data governance, IT risk assessment, and cybersecurity.
  15. Provide Hands-On Experience – Engage in practical labs, real-world case studies, and interactive simulations to reinforce learning.
  16. Enable a Smooth Transition to the Postgraduate Program – Ensure that participants acquire the essential technical and governance knowledge necessary to excel in IT governance, security auditing, and compliance roles.

This structured Bridge Program will empower non-IT professionals with the technical foundation required to succeed in the Post Graduate Program in IT Governance and Security Audit and build a strong career in cybersecurity, IT governance, and risk management.

Who Should Join This Course?

The Bridge Program for IT Governance and Security Audit is designed for individuals from non-IT backgrounds who aspire to transition into the field of IT governance, cybersecurity, and security auditing. This program is ideal for:

  1. Graduates from Non-IT Disciplines:
    • Commerce, Finance, or Business Administration graduates seeking to enter IT governance, cybersecurity auditing, and risk management roles.
    • Science, Arts, or Law graduates looking to build a career in IT compliance, digital forensics, or cybersecurity policy development.
  1. Professionals Transitioning into IT Governance & Security:
    • Finance and Accounting Professionals – Those involved in risk analysis, auditing, or compliance who want to develop expertise in IT governance and security frameworks.
    • Legal and Compliance Officers – Professionals dealing with data protection laws, IT compliance, and corporate governance regulations.
    • Operations & Business Managers – Managers looking to integrate IT security and governance strategies within corporate structures.
  1. Government and Public Sector Employees:
    • Professionals in public administration, law enforcement, or regulatory agencies dealing with data protection, cyber laws, and governance policies.
    • Officers in government departments responsible for IT compliance, security auditing, and digital transformation initiatives.
  1. Entrepreneurs & Business Owners:
    • Startup founders and business owners seeking awareness of cybersecurity risks, IT compliance, and governance strategies for secure business operations.
  1. Fresh Graduates Aspiring for Careers in IT Governance & Security:
    • Individuals looking to pursue the Post Graduate Program in IT Governance and Security Audit but lack prior IT knowledge.
    • Students from commerce, finance, management, legal, and science backgrounds interested in IT risk management, cybersecurity policies, or IT auditing roles.
  1. HR and Training Professionals in IT & Security Fields:
    • HR personnel responsible for IT policy enforcement, cybersecurity training, and compliance management within organizations.
  1. Banking & Financial Services Professionals:
    • Individuals working in financial risk assessment, fraud prevention, and cybersecurity compliance who want to enhance their knowledge of IT governance frameworks like ISO 27001, NIST, and COBIT.
  1. Professionals Preparing for Certifications in IT Governance & Security:
    • Those looking to pursue certifications like CISA (Certified Information Systems Auditor), CRISC (Certified in Risk and Information Systems Control), CISSP (Certified Information Systems Security Professional), or ISO 27001 Lead Auditor but lack fundamental IT knowledge.

Who Should NOT Join?

  • Individuals with a formal IT degree or strong technical background in computer science, IT, cybersecurity, or networking.
  • Those seeking a deep technical cybersecurity course rather than IT governance and security audit training.

This Bridge Program ensures that non-IT professionals and graduates gain the necessary technical foundations to smoothly transition into advanced studies and careers in IT governance, security, and risk management.

Curriculum Outline

This 12-week preparatory program is designed to equip non-IT graduates with fundamental technical skills and essential cybersecurity knowledge before they enroll in the Post Graduate Program in IT Governance and Security Audit. The program is structured into six courses, each focusing on a key domain necessary for understanding IT governance, security, and compliance.

Program Curriculum Overview

Course 1: Computer Hardware, Operating Systems & Maintenance (Weeks 1-2)

Objective: Provide foundational knowledge of computer systems, hardware components, operating systems, and troubleshooting techniques.

  • Introduction to Computer Hardware (Processors, RAM, Storage, Peripherals)
  • System Architecture & Components (BIOS, UEFI, Bus Architecture, Motherboards)
  • Storage Devices & File Systems (HDD, SSD, RAID, NTFS, FAT, EXT)
  • Operating System Fundamentals (Windows, Linux, macOS Overview)
  • Software Installation & System Configuration
  • Hardware Troubleshooting & System Maintenance
  • Virtualization Basics & Hypervisors (VMware, VirtualBox, Hyper-V)