View all Courses
Network Cybersecurity
Bachelor of Science
Course Details
Course Code | GA_KNCGC_B07 |
---|---|
Level | 7 |
Duration | 2 years |
Credits | 60 |
Method of Delivery | Online |
Campus Locations | Mayo |
Mode of Delivery | Full Time, Part Time |
Course Overview
This ordinary add-on degree aims to upskill IT practitioners in current tools and techniques to protect information at rest, in transit or processed for an organisation in line with industry best practices and in compliance with appropriate standards.IT and data security is omnipresent and every organisation implements security measures at the network and operating system level to protect data from unauthorised access, disclosure, modification, or destruction.
It involves the planning, configuring and ongoing management of compliant network equipment and software to provide confidentiality, integrity, and availability to protect the network and data against malicious external and internal threat
Course Details
Year 1
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
The Next Step – Transitioning to WorkThe Next Step – Careers Module develops the learner professionally and personally and equips them with the skills and knowledge to enable them to plan for and achieve their lifelong career goals. The module is aligned to ATU's Employability Statement and Framework which highlights the Institutes commitment to working with employers, ensuring that graduates are prepared for a constantly changing world of work. The Next Step combines a digital learning suite of resources and traditional live discussions that are informed by enterprise. A suite of online workshops facilitate and guide students actions and reflections, as they develop and fine tune a career portfolio. Learners will gain knowledge and skills in relation to the recruitment and selection process, and gain skills relevant to commencing in the workplace. The online careers module provides students with a programme of career, personal and professional development that is grounded in a theoretical model, CareerEDGE (Darce, Pool, and Sewell 2007). The model of employability has become embedded in the Careers module and forms the architecture around which students' personal, career and professional development is based and delivered. This module can be delivered as a blended or online module. Learning Outcomes 1. Apply active self reflection and research skills to create a sustainable career development plan. |
05 | Mandatory |
Year |
LAN CybersecurityThis module will allow students to ‘harden’ an organisation’s network infrastructure. It involves configuring network infrastructure to monitor and filter network traffic (ingress and egress) and raise alerts if outside established baselines. It examines protocols and services used to secure LAN/WAN (local area network/wide area network) access. Students will actively compromise networks and implement solutions to negate these compromises. The module also examines the methods used by malware to probe, compromise and propagate network infrastructure and the protocols and applications that can be used to mitigate against such attacks. Learning Outcomes 1. Analyse and identify modern security threats and develop security policies and Access Control Liststo prevent such attacks. 2. Configure, test and deploy Intrusion Detection Systemand Intrusion Prevention Systembased Network Security solutions. 3. Configure, test and troubleshoot various network security configurations such as Virtual Private Networks, Secure Sockets Layer, AAA andFirewalls. 4. Security harden devices to prevent threats or attacks to networked systems. 5. Identify security protocols required for security solutions in both Local and Wide Area Network environments. 6. Analyze and deploy cryptographic algorithms to provide security solutions. |
10 | Mandatory |
Year |
Network Operating Systems SecurityThis module introduces the learner to modern operating systems concepts and technologies. Students will learn about the Linux and Windows operating systems. They will examine the tools and services that can be used to monitor network traffic and detect malicious activity. Using forensic analysis techniques students will learn to test the robustness of an organisation's computing infrastructure and to take the necessary steps to protect it from attack. Learning Outcomes 1. Install and configure the Linux/Windows Operating Systems 2. Identify, assess and mitigate operating system threats 3. Utilise the UNIX and Powershell command sets to create shell scripts 4. Utilise forensic tools to monitor and analyse the operating system for malicious activity 5. Define operating system and security policies around reducing the threat surface |
10 | Mandatory |
Year |
Network Routing and SwitchingThis module aims to introduce the learner to modern computer networking concepts and technologies. The learner should understand current IP addressing schemes and be familiar with designing, installing and troubleshooting local area networks (LAN) and wide area networks (WAN). Learning Outcomes 1. Understand and implement IPv4, IPv6, variable length subnet mask(VLSM) and subnetting. 2. Differentiate between Static and Dynamic routing protocols and concepts. 3. Configure and maintain networks using LAN and WAN devices. 4. Troubleshoot LAN and WAN communication problems. 5. Understand and implement routing protocol and concepts. 6. Demonstrate ability to plan and design congestion free networks. |
05 | Mandatory |
Year 2
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
Cybersecurity Standards, Risk and ComplianceThis module introduces students to concepts of Information technology governance, and the major governance policies which organisations use to manage their IT operations efficiently, safely and with a high degree of security. Frameworks such as COBIT, and ITIL are briefly explained and the elements of these frameworks relating to cybersecurity risk management. International cybersecurity standards, NIST-CSF, and HITRUST-CSF are explained. The module then examines cybersecurity risk categories, quantitative and qualitative risk assessment techniques, and management and operational risk mitigations. Finally, generic industry and public service organisations are examined: manufacturing, financial services, healthcare, government; from the point of view of cybersecurity compliance regulations. Learning Outcomes 1. Outline and describeInformation Technology governance rulesand policies which ensure effective, controlled and secure operation of an organisation’s IT infrastructure and data. 2. Utilise qualitative and quantitative methods to assess cybersecurity risks in an organisation. 3. Examine a Risk Management Framework (RMF) which implements organisation-wide cybersecurity policies, controls and mitigations to reduce the impact malicious attacks on enterprise infrastructure and data. 4. Explain international cybersecurity standardsand illustratethe context in which these are used to defend against cybersecurity threats. 5. Demonstrate an understanding of the specific regulatory and cybersecurity compliance requirements in industry specific environments: Financial Services, Healthcare, Manufacturing industry, Military and Government organisations. |
05 | Mandatory |
1 |
Database ManagementThis module aims to explore the management and administration of a large, multi-user database management system. This module is designed for large systems with multiple concurrent users and will focus on management tools and using SQL to control the database. The module will examine the architecture of Database systems exploring background processes, access control, data dictionary, transaction logs and parameter files. The module will also examine how to administer a database system with a focus on developing a security plan for users accounts, passwords, roles and permissions. Learning Outcomes 1. Install and configure a multi-user database. 2. Describe the memory structures, processes and transaction management of a database management system. 3. Create users and manage security privileges using Structured Query Language (SQL). 4. Create and manage database objects and storage structures using Structured Query Language (SQL). 5. Describe the databases recovery structures, processes and procedures. |
05 | Mandatory |
1 |
Information Technology Project ManagementThis module aims to introduce learners to the fundamentals of IT project management with reference to the Project Management Book of Knowledge (PMBOK) and Project in Controlled Environments (PRINCE2) and the application of a Project Management tool. They will experience a project team environment by creating a project proposal, and associated plan. Learning Outcomes 1. Relate PRINCE2 processes to an IT Project. 3. Develop the relevant project management deliverables. 4. Describe and apply several project management tools and metrics for each project management phase. 5. Describe and apply project risk management. 6. Assess and appreciate the human side of project management. |
05 | Mandatory |
2 |
Cloud Information SecurityThis module explores the security issues relating to cloud data security as well as best practices, tools and approaches to ensure that the cloud infrastructure and data is protected. The module will explore cloud computing architectures and evaluate the security benefits of cloud computing. The module will investigate risk-based authentication strategies for cloud applications and explore ways to devise strategies for testing disaster recovery and business continuity processes and activities within cloud based environments. Learning Outcomes 1. Identify and explain the elements involved in the provision of data security in a cloud environment. 2. Explore security fundamentals and evaluate cloud architectures to protect data in a cloud environment. 3. Evaluate tools and protocols for identity management and access control in a cloud environment. 4. Assess and identify the challenges associated with protecting data in a cloud environment. |
05 | Mandatory |
2 |
Information Technology Operations ManagementThis module aims to introduce learners to the fundamentals of IT operations management with reference to Service Operations within the Information Technology Infrastructure Library (ITIL). The learner will have the opportunity to develop their understanding and application of the best practices within the industry while developing communication, organisation and problem management skills. Learning Outcomes 1. Use the ITIL Service Operations terminology. 2. Apply,document and present ITIL Service Operations best practices and supporting tools. 3. Evaluate and apply ITIL Service Operations tools. 4. Demonstrate professional communication, organisation and problem-management skills. |
05 | Mandatory |
2 |
Cybersecurity Practical ProjectThis module provides an opportunity for the learner to apply their cybersecurity theoretical, practical and administrations skills, competences and knowledge into practice, applied to a relevant real work situation. Thus allowing the leaner to develop functioning knowledge by participating and reflecting on the process of defining, planning, monitoring, managing, implementing and evaluating a real cybersecurity related practical project. Learning Outcomes 1. Demonstrate creativity and innovation in theanalysis and problem solving skills in defining a project proposal. 2. Carry out a narrative literature review of technical articles and appropriate academic literature. 3. Develop a project plan to implement the proposed methodology. 4. Implement a project from a proposal plan through to completion stage. 5. Report, present, demonstrate and communicate the end-result including reflections and conclusions effectively. |
05 | Mandatory |
Recommended Study Hours per week
Examination and Assessment
On-Campus Attendance Requirement
Download a prospectus
Entry Requirements
If you have any queries on this please email Learn.galwaymayo@atu.ie
Recognition of Prior Learning may be used to gain access to this programme in accordance with ATUs Recognition of Prior Learning policy. For more information on the RPL process, please visit https://www.myexperience.ie/about/how-rpl-works/
Further Information
Who Should Apply?
Anyone looking to upskill in the area of Cybersecurity and Data Protection.
Contact Information
Mark Frain
Computer Science & Applied Physics