Password Protected
Nope
Yep, that's right!
Career Guidance Knowledge information and communication technologies (icts) K061 - information and communication technologies (icts) K0611 - computer use Internet of Things
Description
The general principles, categories, requirements, limitations and vulnerabilities of smart connected devices (most of them with intended internet connectivity).
Occupations requiring this skill
This section is generated automatically.
Skill demand overview
- Essential in 7 occupations
- Optional in 7 occupations
- Total: 14 occupations
- Most common in: ISCO major group 2 (Professionals)
Essential for
- ICT security administratorICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption. Other titles The…
- Mobile application developerMobile app developers implement applications software for mobile devices, based on the designs provided, using general or specific development tools for device operating systems. E…
- Embedded systems software developerEmbedded systems software developers program, implement, document and maintain software to be run on an embedded system. Excludes people performing managerial activities. Other tit…
- Corporate training managerCorporate training managers coordinate all the training activities and development programmes in a company. They also design and develop new training modules and supervise all the …
- Environmental engineerEnvironmental engineers integrate environmental and sustainable measures in developing projects of various natures. They seek to preserve natural resources and natural sites. They …
- Industrial mobile devices software developerIndustrial mobile devices software developers implement applications software for specific, professional industrial mobile (handheld) devices, based on the industry needs, using ge…
- Environmental technicianEnvironmental technicians investigate sources of pollution and aid in the development of pollution prevention and environment protection plans. They take samples of soil, water or …
Optional for
- Ethical hackerEthical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
- Digital games developerA Digital Games Developer is a software professional who designs, builds, and maintains interactive video games across various platforms such as mobile devices, consoles, and PCs. …
- ICT security technicianICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awarenes…
- ICT system developerICT system developers maintain, audit and improve organisational support systems. They use existing or new technologies to meet particular needs. They test both hardware and softwa…
- ICT application developerICT application developers implement the ICT (software) applications based on the designs provided using application domain specific languages, tools, platforms and experience. Oth…
- ICT network engineerICT network engineers implement, maintain and support computer networks. They also perform network modelling, analysis, and planning. They may also design network and computer secu…
- Software developerSoftware developers designs and builds computer programs that power mobile devices, desktop computers, and even cars. They not only identify user needs but also create new applicat…
Related skills
- Python (computer programming)
- ML (computer programming)
- Java (computer programming)
- Assembly (computer programming)
- AJAX
- C#
- ICT security legislation
- Haskell
- Scala
- Prolog (computer programming)
- C++
- R
Last updated on February 19, 2026
