View all Courses
Data Cybersecurity
Certificate
Course Details
Course Code | GA_KDCGC_N07 |
---|---|
Level | 7 |
Duration | 1 year |
Credits | 30 |
Method of Delivery | Online |
Campus Locations | Mayo |
Mode of Delivery | Part Time |
Course Overview
IT and data security are universal in every organisation. The protection of an organisations data is a concern for management, administration and technical staff.
This 30 credit certificate aims to upskill IT practitioners in the current data cybersecurity practices in line with standards, risks and compliance best practices in the implementation and operation of a secure environment for an organisation and to implement security measures at the network and operating system level to protect data from unauthorised access, disclosure, modification, or destruction.
It introduces the learner to current tools and techniques to protect information at rest, in transit or processed for an organisation in line with industry best practices and in compliance with appropriate standards.
- This programme will be delivered in a part-time online mode.
- Teaching materials will be available online, and exercises and projects will focus on software and technologies that are available to students.
- Students will require access to a computer and the Internet, which are available on-campus but will have to be provided by students themselves when learning online.
- At the start of all modules lecturers will schedule a webinar/lecture detailing how to communicate with lecturer and other students (email and forums). It will be highlighted that some assessment activities will require collaboration on the virtual learning environment (VLE) or other social networks.
- Lecturers will interact with students in person and on the VLE forum. Lecturers will lead by example by posting comments on their comments and facilitate discussion by posting links to relevant and interesting material.
- Timely feedback will be given on assessment submissions. Lecturers will encourage discussion around their solutions versus others.
- Live (and recorded) webinars will be posted as links and will be continuously referred to during module.
Course Details
Year 1
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
Cybersecurity Standards, Risk and ComplianceThis module introduces students to concepts of Information technology governance, and the major governance policies which organisations use to manage their IT operations efficiently, safely and with a high degree of security. Frameworks such as COBIT, and ITIL are briefly explained and the elements of these frameworks relating to cybersecurity risk management. International cybersecurity standards, NIST-CSF, and HITRUST-CSF are explained. The module then examines cybersecurity risk categories, quantitative and qualitative risk assessment techniques, and management and operational risk mitigations. Finally, generic industry and public service organisations are examined: manufacturing, financial services, healthcare, government; from the point of view of cybersecurity compliance regulations. Learning Outcomes 1. Outline and describeInformation Technology governance rulesand policies which ensure effective, controlled and secure operation of an organisation’s IT infrastructure and data. 2. Utilise qualitative and quantitative methods to assess cybersecurity risks in an organisation. 3. Examine a Risk Management Framework (RMF) which implements organisation-wide cybersecurity policies, controls and mitigations to reduce the impact malicious attacks on enterprise infrastructure and data. 4. Explain international cybersecurity standardsand illustratethe context in which these are used to defend against cybersecurity threats. 5. Demonstrate an understanding of the specific regulatory and cybersecurity compliance requirements in industry specific environments: Financial Services, Healthcare, Manufacturing industry, Military and Government organisations. |
05 | Mandatory |
1 |
Database ManagementThis module aims to explore the management and administration of a large, multi-user database management system. This module is designed for large systems with multiple concurrent users and will focus on management tools and using SQL to control the database. The module will examine the architecture of Database systems exploring background processes, access control, data dictionary, transaction logs and parameter files. The module will also examine how to administer a database system with a focus on developing a security plan for users accounts, passwords, roles and permissions. Learning Outcomes 1. Install and configure a multi-user database. 2. Describe the memory structures, processes and transaction management of a database management system. 3. Create users and manage security privileges using Structured Query Language (SQL). 4. Create and manage database objects and storage structures using Structured Query Language (SQL). 5. Describe the databases recovery structures, processes and procedures. |
05 | Mandatory |
1 |
Information Technology Project ManagementThis module aims to introduce learners to the fundamentals of IT project management with reference to the Project Management Book of Knowledge (PMBOK) and Project in Controlled Environments (PRINCE2) and the application of a Project Management tool. They will experience a project team environment by creating a project proposal, and associated plan. Learning Outcomes 1. Relate PRINCE2 processes to an IT Project. 3. Develop the relevant project management deliverables. 4. Describe and apply several project management tools and metrics for each project management phase. 5. Describe and apply project risk management. 6. Assess and appreciate the human side of project management. |
05 | Mandatory |
2 |
Cloud Information SecurityThis module explores the security issues relating to cloud data security as well as best practices, tools and approaches to ensure that the cloud infrastructure and data is protected. The module will explore cloud computing architectures and evaluate the security benefits of cloud computing. The module will investigate risk-based authentication strategies for cloud applications and explore ways to devise strategies for testing disaster recovery and business continuity processes and activities within cloud based environments. Learning Outcomes 1. Identify and explain the elements involved in the provision of data security in a cloud environment. 2. Explore security fundamentals and evaluate cloud architectures to protect data in a cloud environment. 3. Evaluate tools and protocols for identity management and access control in a cloud environment. 4. Assess and identify the challenges associated with protecting data in a cloud environment. |
05 | Mandatory |
2 |
Information Technology Operations ManagementThis module aims to introduce learners to the fundamentals of IT operations management with reference to Service Operations within the Information Technology Infrastructure Library (ITIL). The learner will have the opportunity to develop their understanding and application of the best practices within the industry while developing communication, organisation and problem management skills. Learning Outcomes 1. Use the ITIL Service Operations terminology. 2. Apply,document and present ITIL Service Operations best practices and supporting tools. 3. Evaluate and apply ITIL Service Operations tools. 4. Demonstrate professional communication, organisation and problem-management skills. |
05 | Mandatory |
2 |
Cybersecurity Practical ProjectThis module provides an opportunity for the learner to apply their cybersecurity theoretical, practical and administrations skills, competences and knowledge into practice, applied to a relevant real work situation. Thus allowing the leaner to develop functioning knowledge by participating and reflecting on the process of defining, planning, monitoring, managing, implementing and evaluating a real cybersecurity related practical project. Learning Outcomes 1. Demonstrate creativity and innovation in theanalysis and problem solving skills in defining a project proposal. 2. Carry out a narrative literature review of technical articles and appropriate academic literature. 3. Develop a project plan to implement the proposed methodology. 4. Implement a project from a proposal plan through to completion stage. 5. Report, present, demonstrate and communicate the end-result including reflections and conclusions effectively. |
05 | Mandatory |
Recommended Study Hours per week
Examination and Assessment
On-Campus Attendance Requirement
Download a prospectus
Entry Requirements
The minimum entry requirement is a level 6 (Higher education) major award in a cognate area or equivalent.
Recognition of Prior Learning (RPL) can be used as a means to gain entry to the programme, or gain exemptions in accordance with Code of Practice No. 6 (Policy and Procedures for the Recognition of Prior Learning). Prior learning can be certified or experiential and will be assessed in accordance with the code. Contact UsMark FrainProgramme ChairEmail: mark.frain@atu.ie
Further Information
Who Should Apply?
This programme is suitable for those looking to upskill and start a career in Cybersecurity.
Contact Information
Computer Science & Applied Physics