Computing with Cybersecurity and Digital Forensics
Bachelor of Science (Honours)
Sonraí an Chúrsa
Course Code | LY_ICSDF_B |
---|---|
Céim | 8 |
Fad ama | 1 Year |
Creidmheasanna | 60 |
Modh Seachadta | On-campus |
Suímh campais | Donegal – Letterkenny |
Modh Seachadta | Lánaimseartha |
Forbhreathnú Cúrsa
The Bachelor of Science (Honours) in Computing with Cybersecurity and Digital Forensics is a level 8 programme designed to build on the knowledge you gained on the level 7 BSc in Computing with Cybersecurity and Digital Forensics. It will broaden the scope and depth of your knowledge and provide you with the skills necessary to carry out a range of both technical and managerial roles.
Whether you’d like to manage large computer systems, manage strategic security planning and implementation, or be a computer forensics specialist, this course will prepare you for an exciting career in IT. You’ll equally have the ability to develop secure internet applications, protect digital copyright and more.
The skills you learn will translate into the real workplace environment. Skills including the ability to apply and integrate conceptual and theoretical information. An understanding of emerging technologies and the factors driving these developments. Plus the ability to review existing technologies, implement system modelling techniques, design and implement computer systems having applied critical decision making skills based on your specialist knowledge and understanding of computer security and digital forensics.
Sonraí an Chúrsa
Bliain 1
Seimeastar | Sonraí an Mhodúil | Creidmheasanna | Éigeantach / Roghnach |
---|---|---|---|
1 |
Image Processing for Digital ForensicsImage processing theory and practice has for years provided students with an intuitive testing bed for programming. Their visual intuition feeds naturally into the theory and then extends itself to programming where the program methods produce intuitive output. As such this makes image processing a valuable tool; for strengthening programming skills as well as introducing students to subtle ideas from image processing theory which may be utilised later in areas such as steganographic, or biometric applications. Torthaí Foghlama 1. Develop pixel-based image transforms for a range of uses. |
05 | Mandatory |
1 |
Software EngineeringSoftware engineering is an engineering discipline which is concerned with all aspects of software production, it is concerned with theories, methods and tools for professional software development . This module builds on what learners have already covered in previous modules and teaches the discipline of software engineering. Learners will evaluate the engineering methods, processes, techniques and measurements which are part of software engineering. Torthaí Foghlama 1. Compare and contrast software process models and select a suitable software process model for use on a software project. |
05 | Mandatory |
1 |
Research in Computing with Emerging TechnologiesThis module will give students practice in academic research with the freedom to express their personal interests in the field of computing. Students will have an opportunity to critically analyse and synthesise pertinent literature regarding their area of exploration. Students will gain an appreciation of iterative development, critique and an ability to devise a plan for practical development. Torthaí Foghlama 1. Appraise and evaluate emerging trends from information sources and present findings. |
10 | Mandatory |
1 |
Secure Wireless & Software Defined NetworkingThis module will provide the learner the knowledge about how software defined networking is changing the way communication networks are managed, maintained and secured. This course will also provide knowledge about wireless network architecture, design, protocols, and security. Torthaí Foghlama 1. Design, analyse and implement wireless LAN communication, protocols, and architecture. |
05 | Mandatory |
1 |
Governance, Risk & ComplianceTo provide the student with skills and knowledge to understand and appreciate the governance, risk management procedures and mandatory compliance requirements necessary for the successful administration and coordination of an organization. Torthaí Foghlama 1. Critically appraise the available best practices for IT governance. |
05 | Mandatory |
2 |
Cryptography and Cryptographic ProtocolsThis module features a rigorous introduction to modern cryptography, with an emphasis on the fundamentalcryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, digital currency models, and basic protocols and their computational complexity requirements. Torthaí Foghlama 1. Describe and classify cryptographic protocols |
05 | Mandatory |
2 |
Legal, Ethical and Social Issues in ComputingStudents should become sensitized to the ethical and social implications of the growing use of computers and will develop an understanding of the legal issues inherent in the discipline of computing. Torthaí Foghlama 1. Evaluate the utility of philosophical ethical theories in solving computer related ethical issues. |
05 | Mandatory |
2 |
Project DevelopmentThis module will offer the student the opportunity to present the synthesis of their computing skills through a personally chosen and independently developed software artefact and supplementary document. Project Development will encourage independent investigation, design skills, revision and reflection on a specific area of computer science relevant to the student's course of study. The software artefact should be a direct response to a research investigation carried out in the Research in Computing with Emerging Technologies module. In the submission of an accompanying document, it is expected the student will evidence the employment of an appropriate software design methodology, critical thinking and problem solving with regard to issues raised during development. The excellent student will synthesise material from modules they have taken over their course of study and bring this knowledge to bear on their chosen topic. Torthaí Foghlama 1. Evidence independent technical investigation . |
10 | Mandatory |
2 |
Steganography / Biometric ImagingSteganography and Biometric Imaging is a study of imaging in a range of security related fields: steganography, watermarking and biometric security. It involves the study of the design and evaluation of relevant methods. Through this work the student will develop in depth knowledge of digital media and computer security . Torthaí Foghlama 1. Analyse and critique steganographic methods using an array of criteria |
10 | Mandatory |
Download a prospectus
Riachtanais Iontrála
Successful completion of the level 7 Bachelor of Science in Computing with Cybersecurity and Digital Forensics or an equivalent level 7 qualification with 180 ECTS credits and appropriate learning outcomes.
Further Information
Eolas Teagmhála
Head of Department
Jade Lyons
Email: computing.donegal@atu.ie
Telephone: +353 (0)74 9186304
Computing