View all Courses
Computing with Cybersecurity and Digital Forensics
Bachelor of Science
Course Details
CAO Code | AU262 |
---|---|
Level | 7 |
Duration | 3 Years |
CAO Points | 261 (2024) |
Method of Delivery | On-campus |
Campus Locations | Donegal – Letterkenny |
Mode of Delivery | Full Time |
Work placement | Yes |
Course Overview
Our Bachelor of Science in Computing with Cybersecurity and Digital Forensics equips you with the skills, methods and techniques that apply in Cybersecurity and Digital Forensics. It’s an exciting field at the forefront of technology security.
We live in an age where the security of digital data has never been more important. From governments to large corporations, it’s a topic of utmost importance and relevance.
This three-year course positions you as an expert in this rapidly growing field of computing. The course covers Cybersecurity, which is concerned with protecting systems against breaches, to Digital Forensics which is about detecting intruders, and analysing any breaches that might occur to build a case for a prosecution.
It’s a fascinating field, and as its importance grows so too do the opportunities to enjoy a long and rewarding career.
Course Details
Year 1
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
Introduction to ProgrammingTo equip the learner with a knowledge of the fundamentals of computer programming. Learning Outcomes 1. Implement programs using variables and objects. |
10 | Mandatory |
1 |
Mathematics for Computing IThe mathematical skills required for other computing modules are introduced in this module. This includes an examination of the way numbers are dealt with internally on a computer. The module will consider how different domains of data relate to each other and consider methods of visually representing such data. Learning Outcomes 1. Apply the equations of straight line and circle to geometric problems. |
05 | Mandatory |
1 |
Computer Architecture and Operating Systems 1To introduce the learner to the fundamentals of computer architecture as it provides a platform for an operating system and the execution of programs. Learning Outcomes 1. Identify and describe the basic components of a computer system and their relationship to each other. |
05 | Mandatory |
1 |
Personal and Professional DevelopmentThis module focuses on developing a reflective approach to learning at third level and to supporting learners in developing their interpersonal communications in a professional context. Students will engage in activities that will encourage them to work cooperatively in teams and take responsibility for their own learning needs and personal development. Learning Outcomes 1. Evidence the learning skills needed for the transition to third level education. |
05 | Mandatory |
1 |
Web FundamentalsThis module will introduce the learner to the fundamental concepts of web design and development. The learner will use HTML and CSS to develop standards-compliant web sites. Learners will learn about web design best practices and develop an awareness of responsive web design and its significance for modern web development. Learning Outcomes 1. Implement standards-compliant web pages using HTML and CSS. |
05 | Mandatory |
2 |
Introduction to Object Orientated ProgrammingTo teach learners the fundamentals of Object-Oriented Programming. Learning Outcomes 1. Apply OO concepts of class, object, method s . |
10 | Mandatory |
2 |
Database SystemsThis module will allow the learner to examine the different database architectures and their environment and will teach them how to design and implement a relational database. In addition, the learner will manipulate and design a database using database languages. This module provides a practical led approach to fully understand the database design process and the extraction of data from the database using SQL. Learning Outcomes 1. Give an appraisal of the database environment. |
05 | Mandatory |
2 |
Computer Architecture and Operating Systems 2To introduce the learner to the four fundamental functions of the modern operating system and how the four functions relate to the execution of user programs and also the underlying hardware. Learning Outcomes 1. Recognise and describe the four fundamental functions of a modern operating system as a platform for the execution of user programs process management; memory management; file-systems; and device management. |
05 | Mandatory |
2 |
Introduction to Ethical HackingThis module will introduce the main concepts in ethical hacking. The learner will also examine risk assessment and develop countermeasure to mitigate such risks. The learner will become familiar with the process of ethical hacking and gain a familiarity with the tools required. The module will also introduce learners to deep packet analysis with the aim of developing the network analysis skills required for ethical hackers. Learning Outcomes 1. Evaluate and conduct risk assessment and suggest appropriate counter measures. |
05 | Mandatory |
2 |
Introduction to Digital Forensics and EvidenceThe module introduces the concepts of evidence and digital artefacts in the Irish, British, EU and American legal context. These concepts are actuated in digital forensics, the search for and extraction of digital artefacts from computers and computer systems. This module focuses mainly on Windows forensics. There is a theoretical foundation within this module supplemented with practical work to aid the learner. Learning Outcomes 1. Describe the various computer crimes and comprehend their relevance |
05 | Mandatory |
Year 2
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
Object Oriented Programming IIThe module will further enhance the learner's skills in designing and developing object-oriented programs. Learning Outcomes 1. Introduce object-oriented design and the concepts of encapsulation, abstraction, inheritance, and polymorphism. |
10 | Mandatory |
1 |
Mathematics for Computing IIStudents will develop expertise in applying calculus to curve description and its application to problem solving. The course will also include statistical analysis of data. The module is geared to providing students with the mathematical skills relevant for research and dissertation later in the course. Learning Outcomes 1. Apply calculus methods for optimisation and rate of change |
05 | Mandatory |
1 |
Network FundamentalsTo introduce the learner to network standards and technologies in order to design and modify data networks. Learning Outcomes 1. Analyse and Evaluate the OSI model and the TCP/IP suite. |
05 | Mandatory |
1 |
Advanced Ethical HackingThis module will further develop the concepts of ethical hacking. The learner will review the concepts of reconnaissance, scanning and exploitation. The learner will develop skills and knowledge in hacking frameworks. The learner will critically evaluate hacking processes, frameworks and mitigation measures. Learning Outcomes 1. Install, configure, test and troubleshoot ethical hacking frameworks and hackable services. |
05 | Mandatory |
1 |
Advanced Digital Forensics IThe module extends learning on the concepts, methodologies and procedures of digital forensics, inclusive of exposure to file systems, data carving, timeline generation, windows 10 forensics and live forensics using both windows and linux platforms. Learning Outcomes 1. To distinguish the principle characteristics of at least one file system |
05 | Mandatory |
2 |
Scripting PythonThis subject will introduce the learners scripting. Learners will design and implement object oriented programs for use in the administration of server systems. Learning Outcomes 1. Create scripts implementing data structures as appropriate to the business use case |
05 | Mandatory |
2 |
Algorithms & Data StructuresThis module aims to develop an understanding of algorithms and data structures commonly required by computer applications. Learning Outcomes 1. Describe, analyse, and apply stack, queue, list, tree, hash, and graph data structures. |
05 | Mandatory |
2 |
Database ProgrammingThe module will explore both the theorical and practical implementation of objects and structures relevant to relational and non-relational database systems. Transaction management, database administration, and query optimisation, will be examined and applied. Learning Outcomes 1. Develop database objects and structures applicable to relational and non- relational database s . |
05 | Mandatory |
2 |
Network ServicesThis module will provide the learner with the underlying knowledge to plan, implement and maintain networked services. The learner will investigate securing services and layer 2 devices. Learning Outcomes 1. Configure and maintain services for the support of a LAN . |
05 | Mandatory |
2 |
Web App SecurityThis module will examine the security of web application architectures and identify vulnerabilities. The learner will review relevant security methodologies and protocols used in web applications. The learner will go on to examine the security and vulnerabilities of web platforms and develop best practice in the area. Learning Outcomes 1. Critically evaluate Web Application architectures and vulnerabilities. |
05 | Mandatory |
2 |
Advanced Digital Forensics IIThe aim of the module is to confer students with an appreciation of critical aspects of digital forensics, including virtual machine, network, memory, mobile, cloud and database forensics. The module will in addition provide an appreciation of the ethics involved in digital forensics practice. Learning Outcomes 1. Develop an appreciation of the realities imposed by password protection and encryption . |
05 | Mandatory |
Year 3
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
AutomationThis subject will introduce the learners scripting. Learners will design and implement object oriented programs for use in the administration of server systems. Learning Outcomes 1. Carry out a comparative analysis of the various automation tools and languages |
05 | Mandatory |
1 |
Object Oriented Analysis and DesignObject oriented analysis and design is concerned with the preparation and management of the requirements specification for a software system. An industry standard modelling technique supported by CASE technology will then be employed to represent these requirements. Learning Outcomes 1. Compare alternative approaches to the systems development life cycle. |
05 | Mandatory |
1 |
Academic and Technical Writing SkillsThe objective of this module is to provide the student writer with a detailed exposure to the general process of academic writing and to then relate this general process to the specific process of writing an academic report in the computing domain. Learning Outcomes 1. Develop a research specification which includes a research question and corresponding thesis, |
05 | Mandatory |
1 |
Integrated InfrastructureTo introduce the learner to advanced network device configuration and dynamic routing protocols. This module will build on previous knowledge and develop themes in the secure provision of local and wide area routing and switching, Internet connectivity. Learning Outcomes 1. Iden tify and implement VLSM . |
05 | Mandatory |
1 |
Secure Systems AdministrationThis module will provide the learner with the underlying knowledge to plan, implement and maintain a server or virtual server with an emphasis on security issues. Learning Outcomes 1. Select and configure a server environment for specific application purposes. |
05 | Mandatory |
1 |
Law of EvidenceThis module aims to provide a general introduction to the key principles and rules of the Law of Evidence and to enable the student to relate and apply the Laws of Evidence to and in the contextual setting of the Forensics and digital information environment and the court environment. Learning Outcomes 1. Describe a variety of categories, rules and principles of the Law of Evidence. |
05 | Mandatory |
2 |
Secure ProgrammingThe student will learn both the theoretical concepts underpinning vulnerabilities and also how to implement remediation strategies in a modern object oriented programming language. Learning Outcomes 1. Evaluate the issues involved in designing, developing and implementing a secure application. |
05 | Mandatory |
2 |
Project ManagementThis module is designed to teach the essential skills students need to make effective contributions and to have an immediate impact on the accomplishment of projects in which they are involved. Students will learn techniques required to plan, manage and control projects Learning Outcomes 1. Compare and contrast different approaches to project management. |
05 | Mandatory |
2 |
Data AnalyticsThis module will examine data analysis strategies and methods and the importance of data and business intelligence to an organisation. It will introduce the use of a statistical programming language and the evaluation of methods required to pre-process, condition and extract data prior to evaluation. Furthermore, the learner will develop an understanding of how to select and implement data analytic techniques, generate insight and interpret data visualisations. Learning Outcomes 1. Identify suitable data sources for an assigned use case and evaluate pertinence of captured data. |
05 | Mandatory |
2 |
Team ProjectThe module will provide students with experience that closely approximates a real-world commercial project. Students will analyse, design, develop, implement and test an application. The module will also enable students to develop confidence in being able to work and contribute as part of a team. Learning Outcomes 1. Select and specify a project . |
05 | Mandatory |
2 |
Secure Network ServicesThis module will build on previous learning to provide the learner with the capability to plan, implement and maintain network services with an emphasis on secure implementation. Learning Outcomes 1. Select and configure a network environment with security being a primary consideration . |
05 | Mandatory |
2 |
Maths for CryptographyThis module is designed to introduce the students to the basic concepts surrounding private key cryptography and looks at some of the well-known but antiquated methods and shows how they can be described in a mathematical way. Algebraic structure of sets of numbers will be stressed from the outset, culminating in a consideration of the concepts of groups rings and fields. To that end numerical techniques and calculations will be studied through the course of the module. The core ideas of prime and relatively prime pairs will get much attention. Learning Outcomes 1. Recognise different classes of numbers such as the natural numbers, integers, rationals and real numbers and will be able to summarise the main drawbacks of representing these numbers in a computer. |
05 | Mandatory |
Progression
On successful completion of this programme, learners may transfer to the following programmes at ATU Donegal:
Bachelor of Science (Honours) in Computing with Cybersecurity and Digital Forensics
Download a prospectus
Entry Requirements
Leaving Certificate Entry Requirement | 5 subjects at O6/H7 |
QQI/FET Major Award Required | Any |
Additional QQI/FET/ Requirements | None |
Testimonial
College is a big change in anyone’s life. However, returning to college as a mature student was hugely daunting. Having worked since leaving school I was about to embark on something other people did at 18 years old or so I thought! In September 2009 I began as a student on the Computer Security & Digital Forensics course. I was nervous and excited and really didn’t know what to expect. I should not have worried though. The student population has changed greatly in recent years and there were people of every age and background in my classes. Everyone meshed together well, helping each other out and helping find new ways of doing and learning. There was no problems in being a mature student. The course offered plenty of challenges and opportunities for learning and covers some really fascinating subjects, many of which I use in my job today. The college itself has a great staff base and facilities. The lecturers are approachable and fair and many go over and above when it comes to facilitating the learning and growth of their students. There was never a hesitation when asked for advice and they showed great interest in all their students. They are a great asset to the college. The support staff are great and are always there to help. The facilities offered by the college are second to none. They don’t just cater for the educational wellbeing of the students, they have created a centre where all student needs are met.
Sharon McGee
Fees
Total Fees EU: €3000
This annual student contribution charge is subject to change by Government. Additional tuition fees may apply. Click on the link below for more information on fees, grants and scholarships.
Total Fees Non-EU: €12000
Subject to approval by ATU Governing Body (February 2025)
Further information on feesCareers
Career Pathways
The main employers are:
Enterprises with large networks
Financial Services Companies
IT Security Companies
Payment card industry
Graduate Careers
Graduate careers typically include:
Communications Specialist
Compliance and Risk Manager
Computer Programmer
Cryptographer
Cyber Intelligence Specialist
Cybersecurity Applications Developer
Data Security Specialist
Digital Forensics Investigator
Ethical Hacker
Information Security Office
Internet Support
Intrusion Detection Analyst
Network Engineer
Project Manager
Security Operations Manager
Specialist, Governance
Further Information
Contact Information
Computing