View all Courses
Computing in Cybersecurity
Bachelor of Science (Honours)
Course Details
Course Code | LY_ICYBD_B |
---|---|
Level | 8 |
Duration | 2 years |
Credits | 60 |
Method of Delivery | Blended |
Campus Locations | Donegal – Letterkenny |
Mode of Delivery | Part Time |

Course Overview
This course is a Level 8 BSc Hons in Computing in Cybersecurity. The objective of the course is to guide learners who have good general experience in and knowledge of technical computing and augment their skills and knowledge in readiness to begin a career in Cybersecurity.
The course is made up of 6 modules. Students need to have a computing background but do not need to have a Cybersecurity background.
Course Details
Year 1
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
Secure Communications InfrasturctureTo provide the student with a contemporary understanding of infrastructure (cabling, networks, servers and services, security devices) both from the theoretical perspective and as an applied discipline. This module will analyse vulnerabilities in infrastructure and consider best practices and strategies to remediate them. Learning Outcomes 1. Design and audit the necessary ICT infrastructure appropriate to best practice and business requirements. |
10 | Mandatory |
1 |
Cryptography & Cryptographic ImplementationsTo provide the student with a contemporary understanding of cryptography and the fundamental building blocks required for secure cryptographic systems. The module will analyse the implementation vulnerabilities associated with cryptographic protocols and consider best practices and strategies to remediate them. Learning Outcomes 1. Critically evaluate the principles and practice of cryptography |
10 | Mandatory |
1 |
Digital Forensics & EvidenceThe module extends learning on the concepts, methodologies and procedures of digital forensics, inclusive of exposure to file systems, data carving, timeline generation, windows 10 forensics and live forensics using both windows and Linux platforms. Learning Outcomes 1. To distinguish the principle characteristics of divergent file systems |
10 | Mandatory |
2 |
Information Security ManagementTo provide the student with a practitioner's understanding of information security from the view of various stakeholders, roles and process that interact with data at rest or data in transit. This module will cover the core competencies and lead the learner to investigate further new areas as they arise. Learning Outcomes 1. Audit the necessary Information Systems appropriate to particular business requirements. |
10 | Mandatory |
2 |
Ethical Hacking & Threat ManagementThis module will develop the concepts of ethical hacking. The learner will examine the concepts of reconnaissance, scanning and exploitation. The learner will critically evaluate hacking processes, frameworks and mitigation measures. The learner will also examine the security and vulnerabilities of different platforms and develop the best practice in these areas. The module will provide the student with skills and knowledge of vulnerabilities, web application attacks and threat intelligence. Learning Outcomes 1. Identify and evaluate the main stages in Ethical Hacking. |
10 | Mandatory |
2 |
ProjectWhere, through no fault of their own, the student fails to obtain a placement this alternative project module will be offered. This module aims to provide operational experience of best practice in the design, implementation, and management of Security Systems and practices to learners through research and practical experience in topics which relate to trending topics or typical industry tasks. The objective is to maximise their employability and future career prospects, this module enables students to become exposed to research and communications as found in a professional working environment. Learning Outcomes 1. Explored the varied technical environments applied to the management of Security systems and practices . |
10 | Mandatory |
Examination and Assessment
On-Campus Attendance Requirement
Download a prospectus
Entry Requirements
The course will be available to applicants who meet the following criteria:
Level 7 qualification in computing.
Level 6 qualification in computing with three years appropriate work experience.
Candidates who do not have a degree but have significant relevant experience may also be eligible for consideration via Recognition of Prior Learning (RPL) which includes a combination of education, training and work experience.
Fees
Total Fees EU: €3000
Fees for this programme may be covered under the SUSI fee scheme for eligible candidates.
Further information on feesCareers
This course can provide opportunities for students wishing to have a career in Cybersecurity.
Further Information
Who Should Apply?
This award is suitable for learners who have a good general knowledge of computing but who would like to gain valuable skills in the area of Cybersecurity.
Application Closing Date
Start Date
Contact Information
Computing