BSc (Hons) Digital and Technology Solutions Professional
Creating digital and technology solutions that enable businesses to develop new products and services and increase productivity.
Choice of Specialism: IT Consultant, Business Analyst, Data Analyst, Cyber Security Specialist, Network Engineer, Software Engineer.
Typical Duration: The duration is typically 33 months, plus an End-Point Assessment.
Overview of the Apprenticeship
Core Skills
Apprenticeship Breakdown
Specialisms
Register Your Interest
Role Profile
A Digital and Technology Solutions Professional provides technology enabled solutions to internal and/or external customers, in a range of areas including software, business and systems analysis, cyber security, data analysis and network infrastructure.
They implement technology solutions that enable businesses to develop new products and services and to increase an organisations productivity using digital technologies. They are confident, competent and capable independent Technology Solutions Professionals able to operate in a range of related roles.
The occupation is based upon a core set of outcomes that will be supplemented by one, and only one, of six specialism areas detailed below that cover the roles identified by employers.
Core Skills
This is a Degree Apprenticeship, not just a Degree. Whilst achieving your BSc (Hons) Degree, and becoming and Digital and Technology Solutions Professional, you must prove at least the following Core Skills…
Information Systems
is able to critically analyse a business domain in order to identify the role of information systems, highlight issues and identify opportunities for improvement through evaluating information systems in relation to their intended purpose and effectiveness.
Data
identifies organisational information requirements and can model data solutions using conceptual data modelling techniques. Is able to implement a database solution using an industry standard database management system (DBMS). Can perform database administration tasks and is cognisant of the key concepts of data quality and data security. Is able to manage data effectively and undertake data analysis.
Cyber Security
can undertake a security risk assessment for a simple IT system and propose resolution advice. Can identify, analyse and evaluate security threats and hazards to planned and installed information systems or services (e.g. Cloud services).
Business Organisation
can apply organisational theory, change management, marketing, strategic practice, human resource management and IT service management to technology solutions development. Develops well- reasoned investment proposals and provides business insights.
Systems Development
analyses business and technical requirements to select and specify appropriate technology solutions. Designs, implements, tests, and debugs software to meet requirements using contemporary methods including agile development. Manages the development and assurance of software artefacts applying secure development practises to ensure system resilience. Configures and deploys solutions to end users.
IT Project Management
follows a systematic methodology for initiating, planning, executing, controlling, and closing technology solutions projects. Applies industry standard processes, methods, techniques and tools to execute projects. Is able to manage a project (typically less than six months, no inter-dependency with other projects and no strategic impact) including identifying and resolving deviations and the management of problems and escalation processes.
Computer and Network Infrastructure
can plan, design and manage computer networks with an overall focus on the services and capabilities that network infrastructure solutions enable in an organisational context. Identifies network security risks and their resolution.
Specialism
all core skills and knowledge listed here must be combined with the specialist skills and knowledge to be able to operate effectively in any one (only) of the following defined roles:
- Software Engineer
- Business IS Analyst
- Data Analyst
- IT Consultant
- Network Engineer
- Cyber Security Specialist
Core Technical Knowledge
Knows and understands:
- How business exploits technology solutions for competitive advantage.
- The value of technology investments and how to formulate a business case for a new technology solution, including estimation of both costs and benefits.
- Contemporary techniques for design, developing, testing, correcting, deploying and documenting software systems from specifications, using agreed standards and tools.
- How teams work effectively to produce technology solutions.
- The role of data management systems in managing organisational data and information.
- Common vulnerabilities in computer networks including unsecure coding and unprotected networks.
- The various roles, functions and activities related to technology solutions within an organisation.
- How strategic decisions are made concerning acquiring technology solutions resources and capabilities including the ability to evaluate the different sourcing options.
- How to deliver a technology solutions project accurately consistent with business needs.
- The issues of quality, cost and time for projects, including contractual obligations and resource constraints.
Core Behavioural Skills
Professional, interpersonal and business skills | Attributes and behaviours |
|
|
Degree Qualification
The BSc (Hons) Degree as a:
- Digital and Technology solutions professional (with specialism)
is validated, quality-assured, module-assessed, certified, awarded and end-point assessed by The University of Wolverhampton.
The apprenticeship programme and its degree consists of three 120 credit, modular “Phases”:
- Phase 1: The Foundation Phase
- with a 40 credit ePortfolio, a 20 credit specialist module and 3 x Knowledge modules requiring academic performance at levels 4 to 6
- Phase 2: The Diversification Phase
- with a 40 credit ePortfolio and 4 x Knowledge modules requiring academic performance at levels 5 to 6
- Phase 3: The Solutions Professional Phase
- with a 40 credit ePortfolio, 1 x Knowledge module and project presentation and discussion modules requiring academic performance at level 6
With deference to advice provided by TDM Coach and employer mentor, work-based apprentices are free to work on all modules on all phases concurrently, but:
- Phase 2 modules cannot be assessed and credited until at least 100 Phase 1 credits have been awarded AND work experience in this job role has exceeded 12 months.
- Phase 3 modules cannot be assessed and credited until at least 100 Phase 2 credits have been awarded AND work experience in this job role has exceeded 24 months.
Professional Development: National Educational Priorities
Level 2 Functional Skills Qualification in both English and Maths will need to be achieved by all TDM learners.
All TDM coaches also proudly support other National Educational Priorities, such as:
- British Values: Democracy, The Rule of Law, Tolerance & Mutual Respect, Individual Liberty.
- Health & Safety in the Workplace
- Employee Rights and Responsibilities
- Equality & Diversity
- Safeguarding (including prevention against radicalisation)
Individual Learning Plan
To achieve and exceed the National Apprenticeship Standard, 6 hours a week of salaried hours must be spent in learning away from the workstation.
Your Individual Learning Plan will be delivered by both “field expert” Tech Coaches and “gently uncompromising” Professional Development Coaches. According to the particular needs of each employer / learner / topic, TDM coaches will responsively plan and deliver options such as:
- one-to-one coaching tutorials (online or in the workplace) which guide ePortfolio and employer reference building
- task-setting and guidance through personally selected learning activities to be completed away from workstation including (eg): eLearning, print materials, journal articles, practice labs and tutorials, etc.
- “tutored” online group learning events
- classroom size <=15 learners (in Birmingham or Worcester)
- classroom size <=8 learners (in Birmingham or Worcester)
- ad-hoc extra support from a Professional Development Coach who will support the apprentice to develop more employable attitudes and behaviours.
Typical Entry Requirements
Individual employers will set the selection criteria, but this is likely to include:
- three ‘A’ levels, including maths,
- OR a level 3-4 Digital Industries Apprenticeship or eg BTEC
- although some employers will accept other relevant qualifications or experience.
Specialism: Software Engineer
The primary role of a software engineer is to be able to design, build and test high-quality software solutions. The software engineer role is broader and with higher levels of responsibility than a software developer as they need to apply engineering principles to all stages of the software development process, from requirements, analysis and design, development and data requirements whilst ensuring security robustness is built in. They will typically be working as part of a larger collaborative team and will have responsibility for significant elements of software projects.
Skills
- Create effective and secure software solutions using contemporary software development languages to deliver the full range of functional and non-functional requirements using relevant development methodologies.
- Undertake analysis and design to create artefacts, such as use cases to produce robust software designs.
- Produce high quality code with sound syntax in at least one language following best practices and standards.
- Perform code reviews, debugging and refactoring to improve code quality and efficiency.
- Test code to ensure that the functional and non-functional requirements have been met.
- Deliver software solutions using industry standard build processes, and tools for configuration management, version control and software build, release and deployment into enterprise environments.
Technical Knowledge
Knows and understands:
- How to operate at all stages of the software development lifecycle.
- How teams work effectively to develop software solutions embracing agile and other development approaches.
- How to apply software analysis and design approaches.
- How to interpret and implement a design, compliant with functional, non-functional and security requirements.
- How to perform functional and unit testing.
- How to use and apply the range of software tools used in Software engineering.
Specialism: IT Consultant
An IT consultant requires a broad set of skills in business analysis, solutions development, network infrastructure, data, cyber security etc. They use their consulting skills in order to advise clients on how to best utilise technology to meet their business objectives, overcome problems and increase productivity. They provide strategic guidance to clients with regard to technology and facilitate changing business processes through enhancements to technology solutions. They provide technical assistance, and are often responsible for providing training.
Skills
Be able to:
- Perform technical process improvement tasks in a range of environments to solve business problems.
- Present optimised solutions to improve business process and workflows through improved technology.
- Recommend options based upon risks, costs vs benefits, and impact on other business processes.
- Participate in walk-throughs for IT, to identify and document key risks within a client’s organisation.
- Support training of end-users in preparation for system activation.
- Evaluate the success of a new system, process, initiative, etc.
Technical Knowledge
Knows and understands:
- How consulting ties into project management, business analysis and business management.
- The barriers to solving problems or maximizing opportunities.
- How to present recommendations and influence action.
- The different structured process approaches for digital technology consulting.
- How to frame/define business problems objectively before solving them.
- How to discover hidden requirements using probing techniques to establish trust, using open and closed questions effectively, and avoiding leading questions.
Specialism: Business Analyst
A business analyst is responsible for assessing the business impact of change, capturing, analysing and documenting requirements and supporting the communication and delivery of requirements with relevant stakeholders. They create detailed analysis of systems and make recommendations for improvement. They produce specifications of user requirements that enable software engineers to develop the right software solutions. They require a broad foundation of skills and knowledge to be able to be effective as their work incorporates all aspects of digital technology systems.
Skills
Be able to:
- Develop and apply modelling and analysis techniques to describe business problem scenarios and to help select solutions using a range of industry standard analysis techniques.
- Elicit and prioritise business requirements for a digital technology system using ‘industry best practice’ methods.
- Develop a clear, complete, unambiguous and testable requirements specification, including functional, non- functional, data, user interface and security requirements.
- Model the ‘as is’ and future state for a business process using industry standard approaches and notation.
- Evaluate selected models against business objectives and system requirements.
- Use ‘industry’ standard tools to facilitate the analysis, documentation and traceability of requirements
Technical Knowledge
Knows and understands:
- The use of requirements elicitation techniques and their relevance to given situations.
- The principles of requirements engineering and the importance of managing requirements.
- How to conduct a range of business/organisational analyses.
- The use of tools to support modelling and requirements engineering.
- How the selected models inter-relate with each other.
- How the products of analysis feed into the design and development of a system.
Specialism: Cyber Security Specialist
A cyber security analyst is responsible for the implementation, maintenance and support of the security controls that protect an organisation’s systems and data assets from threats and hazards. They ensure that security technologies and practices are operating in accordance with the organisation’s policies and standards to provide continued protection. They require a broad understanding of network infrastructure, software and data to identify where threat and hazard can occur. They are responsible for performing periodic vulnerability assessments to evaluate the organisation’s ongoing security posture and will provide visibility to management of the main risks and control status on an ongoing basis. They respond to security incidents and implement resolution activities across the organisation.
Skills
Be able to:
- Analyse and evaluate security threats and vulnerabilities to planned and installed information systems or services and identify how these can be mitigated against.
- Perform security risk assessments for a range of information systems and propose solutions.
- Develop a security case against recognised security threats, and recommend mitigation, security controls and appropriate processes.
- Define and justify a user access policy for an information system given knowledge of the system architecture, security requirements and threat/risk environment. This should be in terms of what they can do, resources they can access, and operations they are allowed to perform.
- Perform a business impact analysis in response to a security incident and follow a disaster recovery plan to meet elements of a given business continuity policy.
- Conduct a range of cyber security audit activities to demonstrate security control effectiveness
Technical Knowledge
Knows and understands:
- The types of security (confidentiality, authentication; non-repudiation; service integrity) and security big picture (network security; host OS security; physical security).
- The main types of common attack techniques, including phishing, social engineering, malware, network interception, blended techniques, denial of service and theft.
- How to recognise and assess risk including performing a risk assessment.
- How to apply penetration testing effectively and how it contributes to assurance.
- The different approaches to risk treatment and management in practice.
- What the ‘cyber security culture’ in an organisation is, and how it may contribute to security risk.
Specialism: Data Analyst
The primary role of a data analyst is to collect, organise and study data to provide new business insight. They are responsible for providing up-to-date, accurate and relevant data analysis for the organisation. They are typically involved with managing, cleansing, abstracting and aggregating data across the network infrastructure. They have a good understanding of data structures, software development procedures and the range of analytical tools used to undertake a wide range of standard and custom analytical studies, providing data solutions to a range of business issues. They document and report the results of data analysis activities making recommendations to improve business performance. They need a broad grounding in technology solutions to be effective in their role.
Skills
Be able to:
- Import, cleanse, transform, and validate data with the purpose of understanding or making conclusions from the data for business decision making purposes.
- Present data visualisation using charts, graphs, tables, and more sophisticated visualisation tools.
- Perform routine statistical analyses and ad-hoc queries.
- Use a range of analytical techniques such as data mining, time series forecasting and modelling techniques to identify and predict trends and patterns in data.
- Report on conclusions gained from analysing data using a range of statistical software tools.
- Summarise and present results to a range of stakeholders making recommendations.
Technical Knowledge
Knows and understands:
- The quality issues that can arise with data and how to avoid and/or resolve these.
- The processes involved in carrying out data analysis projects.
- How to use and apply industry standard tools and methods for data analysis.
- The range of data protection and legal issues.
- The fundamentals of data structures, database system design, implementation and maintenance.
- The organisation’s data architecture.
Specialism: Network Engineer
The primary role of a network engineer is to design, install, maintain and support communication networks within an organisation or between organisations. They need to maintain high levels of network performance performance and availability for their users, such as staff, clients, customers and suppliers. They will understand network configuration, cloud, network administration and monitoring tools, and be able to give technical advice and guidance. As part of their role they need to be proficient in technology solutions as they will analyse system requirements to ensure the network and its services operate to desired levels. They will need to understand the data traffic and transmission across the network and they have a major role to play in ensuring network security.
Skills
Be able to:
- Plan, design, build and test a simple network to a requirement specification that includes hubs, switches, routers and wireless user devices, applying appropriate security products and processes.
- Identify the key characteristics of a new network service and develop estimates of the expected traffic intensity and traffic load that the network must support.
- Determine the minimum network capacity of planned networks to meet network requirements.
- Design, build, test, configure and optimise a distributed network (more than 1 sub- net), including switches, routers and firewalls to meet given requirements.
- Analyse network performance and troubleshoot typical problems in networks.
- Identify and evaluate network security risks and incorporate appropriate security products and processes into network designs to increase security, resilience and dependability.
Technical Knowledge
Knows and understands:
- The fundamental building blocks (e.g. routers, switches, hubs, storage, transmission) and typical architectures (e.g. server/client, hub/spoke) of computers, networks and the Internet.
- The main features of routing and Internet network protocols in use, their purpose and relationship to each other, including the physical and data link layer (e.g. https, HTTP, SMTP, SNMP, TCP, IP, etc.).
- The main factors that affect network performance (e.g. the relationship between bandwidth, number of users, nature of traffic, contention).
- Failure modes in protocols (e.g. why a protocol may ‘hang’ and the effect of data communication errors).
- The ways to improve performance (e.g. application of traffic shaping, changes to architecture to avoid bottlenecks, network policy that prohibit streaming protocols).
- The issues that may arise in the day to day operation of networks and how to resolve them.
Want to know more?
TDM want to guide and drive your individual, employer-responsive learning journey.
Can't find what you're looking for?
Let us help you