There is an increasing recognition of the importance of Blockchain and Distributed Ledger Technologies (DLTs) for companies in Ireland and internationally. The reason for this is that Blockchain/ DLTs are at the cutting edge of a vast range of new applications in quality control, contract management, digital currencies and transparency in governance.
Blockchain is also a universal infrastructure that can store or transfer information anywhere, regardless of country.
Blockchain can also integrate smoothly with existing processes and systems in any sector and industry. “The use of blockchain promises to bring significant efficiency to global supply chains, financial transactions (including cryptocurrencies, Token economy, and ICOs), asset ledgers, legal regulations (e.g. smart contracts), and decentralized networking.” – University of Barcelona
This MSc programme will be of particular interest to students who wish to understand how Blockchain and Distributed Ledger Technologies with their underlying characteristics of Provenance, Immutability, Consensus and Finality can be used in healthcare, supply chain management, energy, trade systems, banking and finance, cybersecurity, intellectual property, digital verification and identity management and government services. By learning about blockchain graduates will become a key part of increasingly multi skilled teams that are responsible for planning and managing the implementation of next-generation IT systems in almost all aspects of business and society.
Course Details
Year 1
Semester
Module Details
Credits
Mandatory / Elective
1
Blockchain Technology
This module will provide the student with a significant level of understanding of the theoretical and development capability of Blockchain Technologies, incorporating an analysis of some innovative use cases.
Learning Outcomes
1. Critically evaluate Blockchain technologies, their core components, protocols, and use cases 2. Implement a Blockchain using Blockchain as a Service (B aa S) 3. Critically evaluate the interaction of Blockchain technology and cryptocurrencies. 4. Examine Bootstrapping network effects through Blockchain technology and crypto – economics 5. Evaluate the use of Non-Fungible Tokens (NFTs) and implement tokenisation as an authentication mechanism. 6. Investigate and critique the future of Blockchain technology, AI, and digital privacy
10
Mandatory
1
Cryptography and Cryptographic Implementations
This module will provide the student with a significant level of comprehension and development capability of cryptography and secure cryptographic systems. The module will analyse the implementation vulnerabilities associated with cryptographic protocols and consider best practices and strategies to remediate them.
Learning Outcomes
1. Critically evaluate the principles and practice of cryptography 2. Evaluate the modes of operation and operational requirements in a business context. 3. Critically analyse the principles of hashing and its use in blockchain, message authentication and integrity verification. 4. E valuate the application of confidentiality, integrity, authentication, access and non-repudiation in the construction of secure systems. 5. Appraise and critically analyse the implementation of cryptography in every day cryptographic application.
10
Mandatory
1
Decentralised Applications (D'Apps) Development and Smart Contracts
This module is will provide the student with a significant level of comprehension and development capability within decentralised applications development and design, including theoretical concepts and implementation of smart contracts.
Learning Outcomes
1. Review and evaluate distributed systems implementation and enterprise solutions 2. Critically analyse and discuss decentralised applications design, development and performance requirements. 3. Evaluate decentralised frameworks, discussing implementation strategies and network infrastructure. 4. Appraise and critique existing decentralised applications, identifying security vulnerabilities and formulating effective design solutions. 5. Design, develop and test decentralised applications utilising secure programming and industry best-practise. 6. Analyse and evaluate smart contracts, concisely communicating security vulnerabilities and implementation requirements. 7. Design, develop, test and deploy smart contracts, demonstrating succinct comprehension of selected design and implementation strategies, including appropriate deployment domain.
10
Mandatory
2
Distributed Ledger Technology, Cryptocurrencies and Non Fungible Tokens
The student will develop a comprehensive understanding of Distributed ledger Technology characteristics and components including critical analysis of consensus algorithms. Students will appraise, review and critically and reflexively formulate issues involved with Cryptocurrencies and Non-Fungible Tokens (NFTs) including analysis of governance, immutability and transparency associated with the technology's implementation across numerous sectors.
Learning Outcomes
1. Critically appraise distributed ledger technology implementations and characteristics. 2. Analyse and evaluate consensus algorithms to evaluate distributed ledger technologies and cryptocurrencies. 3. Produce original texts to communicate concepts surrounding governance, immutability and transparency concisely and effectively with written work demonstrating comprehension and coherent structure. 4. Appraise, review and critically and reflexively formulate issues involved in cryptocurrencies and non-fungible tokens with considerations for social, economic and industry solutions. 5. Develop, investigate, evaluate and defend distributed ledger technology use-cases supporting the implementation of decentralised protocols and tokenisation. 6. Design, develop, test and deploy a non-fungible token protocol. 7. Evaluate and discuss tokenisation strategies, including the development of next-generation security-conscious solutions.
10
Mandatory
2
Cybersecurity and Blockchains
To make students aware of the risks and vulnerabilities using hacking, penetration, and on-chain forensic tools and frameworks, including developing comprehensive knowledge of mitigating actions. The learner will analyse and evaluate the security of current applications and systems, incorporating an analysis of innovative Blockchain use case solutions.
Learning Outcomes
1. Evaluate and investigate the need for security in all applications using tools and frameworks. 2. Implement risk assessment based on transaction data requirements and evaluate appropriate countermeasures . 3. Analyse present day GDPR issues and critically evaluate Blockchain solutions used to demonstrate Regulatory Compliance. 4. Evaluate and critically analyse the vulnerabilities in system architectures and develop appropriate Blockchain and programmer-based countermeasures. 5. Investigate how business continuity and disaster plans can benefit from the application of Blockchain technology in cybersecurity attacks. 6. Investigate ledger immutability and its application in cybersecurity.
10
Mandatory
2
Information Security Management
To provide the student with a practitioner's understanding of information security from the view of various stakeholders, roles and process that interact with data at rest or data in transit. This module will cover the core competencies and lead the learner to investigate further new areas as they arise.
Learning Outcomes
1. Synthesise, evaluate and critically analyse current best practice frameworks and methodologies for the implementation of security protocols for information systems. 2. Produce a scalable risk management plan including an appropriate risk response strategy based on risk analysis 3. Compose and perform a risk analysis to identify , categorise and prioritize risk for communication to stakeholders and to enable directed response and monitoring for emerging risks 4. Audit the necessary Information Systems appropriate to particular business requirements. 5. Devise a strategy for the implementation of security protocols from the early stages of the SDLC to enhance the overall Application Lifecycle Management (ALM) 6. Investigate and defend strategies using appropriate academic and industry sources.
10
Mandatory
3
Dissertation
This module involves working on a research dissertation over an extended period. Working under the guidance of an academic supervisor, the module allows the student to develop theoretical and applied skills in using contemporary computing science techniques both from a theoretical perspective and as an applied discipline. The dissertation represents the capstone work on a topic related to their chosen programme of study.
Learning Outcomes
1. Develop appropriate data collection instruments for mixed methods research and to evaluateeach for their appropriateness to the research question; 2. Engage in a sustained piece of individual, academic research on a chosen topic within the field(s) specifically relevant to the course; 3. Read widely and critically reflect on a number of pieces of written research in an appropriate and thorough manner; 4. Evaluate varying methodological approaches and to adopt the necessary approaches suitableto the topic being researched; 5. Produce a dissertation that evaluates and synthesises quantitative (statistical) approaches such as empirical tests on a hypothesis; 6. Produce a dissertation that evaluates and synthesises qualitative research methods such as the literature review and dissertation proposal and displays evidence of independent research skills.
30
Mandatory
Recommended Study Hours per week
Students can expect to allow between 10 and 20 hours for study per week.
An Honours Degree with first or second-class honours or an equivalent qualification in Computing, Science, Engineering, Business, Finance, Mathematics or any associated discipline.
Candidates who do not have an Honours degree but have significant relevant experience may also be eligible for consideration via Recognition of Prior Learning (RPL).
Fees
Total Fees EU: €6300
Total Fees Non-EU: €14000
Subject to approval by ATU Governing Body (February 2025).
Graduate careers typically include roles such as Blockchain Engineer, Cybersecurity Specialist, Financial Manager, Legal and Contract Manager, and Supply Chain Manager.
The main employers are in industries like digital identity, energy, government services, travel, intellectual property, cybersecurity, retail, manufacturing, supply chain management, as well as trade, insurance, banking, and finance.
Further Information
Application Closing Date
Tuesday, January 7th, 2025.
Start Date
January 2025
Who Should Apply?
This programme will be of particular interest to students who wish to understand how Blockchain and Distributed Ledger Technologies with their underlying characteristics of Provenance, Immutability, Consensus and Finality can be used in healthcare, supply chain management, energy, trade systems, banking and finance, cybersecurity, intellectual property, digital verification and identity management and government services. By learning about blockchain graduates will become a key part of increasingly multi-skilled teams that are responsible for planning and managing the implementation of next-generation IT systems in almost all aspects of business and society.
Contact Information
Faculty of Engineering & Technology Department of Computing