Photo Gallery | Resources | Miscellaneous

Correspond Links











  • Courses List


Undergraduate & Professional Series

  Certificate/Professional Certificate
  Professional Post Graduate Diploma
  Articulation Transfer Program
  Special Course



Diploma in E-Commerce

Information Technology Management

Provides an introduction to the field of Information Technology Management and the functions and responsibilities of the information technology manager. It will provides an overview of how Information Technology is impacting today's business environment. The course also introduces students to advanced business tools that are useful in organizations.


Essentials of E-Commerce Technology

In this course, you will examine the history of the Internet and its influence on E-Commerce; and the validity of E-Commerce and why it is increasingly being integrated into the business model. You will also explore the fundamental business concepts as they relate to E-Commerce, such as customer relationship management; e-procurement; security and staffing issues; planning; metric identification techniques for measuring the success of E-Commerce initiatives; marketing strategies on the World Wide Web; and information on E-Commerce software, hardware, and service providers.


Multimedia Application of Webpage Design

These courses will help you developing a professional Webpage, E-System, and online database system in a much more effectiveness and efficiency. You will also explore in many advanced software and multimedia application for helping you building professional webpage. It will involve 3D Design, Application Design, Database design and etc.


Supply Chain Analysis

Study the components of the entire supply chain. Emphasis on collaboration and planning related to major functional areas required to organize the flow of products from inception through delivery to satisfy final customer needs. Information and communication technology as an enabler of supply chain management strategies is also discussed .


Principles of Business Law

The study of the legal system, the law of contracts and property, agency and employment, consumer credit protection, bankruptcy, the Uniform Commercial Code, negotiable instruments and sales .



This course will investigate the way in which these new media - the web, e-kiosks, WebROM, Web-IVR - are changing marketing. It will explore the revolution in balance of power that the new media bring about and demonstrate how interactive marketing technologies take power from the marketer and the media and place it firmly in the hands of the consumer. This course deals with many aspects of online marketing and advertising for traditional and Internet based businesses. The class will examine several different online marketing methods and compare them to traditional methods The implications of this are profound for marketers as it fundamentally alters the ways in which we communicate with the consumer. It will involve strategies and models for marketing communications on the Net and explore the new methods of integrated marketing necessary for the new media.


E-Economics Analysis and Design

This courses provides an in-depth study of various analysis techniques needed to build a computer-based information system. Analysis, Problems, and Policies. Emphasis will be placed on problems and policies of current interest as they relate to resource use and the distribution of income and output. Students will receive an introduction to the theory of supply and demand in both product and factor markets in order to examine selected topics drawn from such areas as industrial organization and antitrust policy, labor economics, international trade, economic development, agriculture, urban problems, poverty and discrimination, public sector economics, and environmental problems.



In this course you will explore the security technique fundamentals involved in minimizing E-Business security risks. This course introduces you to concepts such as securing Web clients, servers, and communications. It also investigates the use of firewalls and digital certificates, and concludes with a look at legal issues including how to respond when security has been breached.