Standards

This hub brings together authoritative standards, frameworks, and official guidance used across VTI programmes. It supports secure systems design, governance, risk management, and applied projects. Programme-specific recommendations appear first, followed by a shared “Core Standards” section.


Jump to: By ProgrammeCore StandardsData & Official PublicationsHow to Use Standards


By Programme

Select your programme to view the most relevant standards and frameworks used in coursework, labs, and capstones.

BSc Information & Communication Technology

Secure systems, governance, and applied ICT implementation.

View programme guide →

BSc Technology Management

Technology governance, risk, and policy-aligned decision-making.

View programme guide →

ASc Computer Systems Technology

Systems, networking, operations, and security fundamentals.

View programme guide →

ASc Software Programming

Secure coding and web application security practice.

View programme guide →

Advanced Diploma – Cyber Security Analyst

Threat modelling, detection frameworks, and security controls.

View programme guide →

Diplomas & Certificates

Practical standards for safe practice in labs and workplace readiness.

Browse programme guides →


Core Standards & Frameworks

These are widely used, authoritative references across ICT, software engineering, and cybersecurity. They are suitable for citing as official guidance in assignments, security plans, and systems design documentation.

  • NIST Cybersecurity Framework (CSF) – Common language for cybersecurity risk management and controls.
  • OWASP Top 10 – Priority risks and mitigations for secure web application development.
  • MITRE ATT&CK – Threat actor techniques and tactics for defensive planning and detection mapping.

Data & Official Publications

Use these sources when projects require official statistics, national/regional context, or evidence for ICT planning and technology management work.


How to Use Standards in Coursework

  • Use standards as evidence: Cite frameworks (e.g., NIST CSF) to justify controls, policies, and design decisions.
  • Use security lists as checklists: Apply OWASP Top 10 to assess web applications, reports, and code reviews.
  • Use threat frameworks for defence: Map risks and controls using MITRE ATT&CK for security labs and capstones.
  • Use official data for context: Support arguments with Jamaica/Caribbean datasets and policy publications where relevant.

Need scholarly sources to support standards-based work? Use Find Research or consult your programme guide.