4IR Courses
ICM’s 4IR courses are designed to equip learners with the skills and knowledge necessary for today’s rapidly evolving job market. By focusing on emerging technologies and trends, students gain expertise that is directly applicable to their careers
Data Science Practitioner nqf 5
NQF 5 SAQA ID 101508 Credits: 1485
Data Science Practitioners take custody of data and make the data available in a structured form for the Data Scientist to use. They support the data life cycle by collecting, transforming, and analysing data and communicating results to solve elementary business problems. They transform data into robust, comprehensive data sets, aligned with the problem identified in the statement of work and ready for storage.
Artificial intelligence Software Developer NQF 5
NQF 5 SAQA ID 101508 Credits: 282
Artificial Intelligence Software Developers build Artificial Intelligence (AI) functionality into software applications through integrating and implementing AI algorithms and logic into the deliverables of an Information Technology (IT) project. Developers teach the machine to solve problems the way a human would through the use of programming.
Software Developer NQF 5
NQF 5 SAQA ID118707 Credits 220
A Software Developer analyses a set of requirements, translates these into a working software solution using a programming language. They test, implement and maintain software applications to meet client specifications as well as functional and technical requirements.
Cloud Administrator NQF 4
NQF 4 SAQA ID 118699 Credits: 149
A Cloud Administrator monitors, maintains, and troubleshoots networks of cloud platforms and computing resources thus ensuring the seamless delivery of all cloud services and maintains protocols to secure cloud environments against unauthorised access, threats, and other risks.
CYBERSECURITY ANALYST NQF 5
NQF 4 SAQA ID 118986 Credits: 173
Cybersecurity Analysts apply the practice of protecting assets such as networks, computer systems and information assets from malicious attacks and threats. They assess and mitigate risks and potential intrusions and identify risks and vulnerabilities. They study existing techniques for managing security issues and maintaining the security of information and systems in the working environment, ensuring legal compliance.