View all Courses
Computing in Cybersecurity
Master of Science
Course Details
Course Code | LY_ICYBS_M |
---|---|
Level | 9 |
Duration | 1/2 years |
Credits | 90 |
Method of Delivery | Online or On-campus |
Campus Locations | Donegal – Letterkenny |
Mode of Delivery | Full Time, Part Time |
Course Overview
Course Details
Year 1
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
Secure InfrastructureTo provide the student with a solid understanding of infrastructure (cabling, networks, servers and services, security devices) both from the theoretical perspective and as an applied discipline. This module will analyse vulnerabilities in infrastructure and consider strategies to remediate them. Learning Outcomes 1. D esign and audit the necessary ICT infrastructure appropriate to particular business requirements. |
10 | Mandatory |
1 |
Cryptography & Forensic AnalysisTo provide the student with a solid understanding of the role cryptography, authentication and key exchange play in the security of computer systems. The module will also address the issues of wireless security, block chain and the applications of block chain technology. In addition, students will gain familiarity with post attack forensic analysis. Learning Outcomes 1. Synthesise cryptography, authentication and key exchange to form a coherent understanding of the role of cryptography in wired and wireless systems |
10 | Mandatory |
1 |
Information Security Management 1To provide the student with a practitioner's understanding of information security from the view of various stakeholders, roles and process that interact with data at rest or data in transit. This module will cover the core competencies and lead the learner to investigate further new areas as they arise. Learning Outcomes 1. A udit the necessary Information Systems appropriate to particular business requirements. |
10 | Elective |
1 |
Threat Management IThe learner will develop ethical hacking skills in foot printing, scanning, hacking and develop a wide range of effective cross platform countermeasures Learning Outcomes 1. Evaluate, assess and mitigate information security threats and develop appropriate policies and guidelines. |
10 | Elective |
2 |
Software ComplianceTo provide the student with a significant level of comprehension both of the theoretical concepts underpinning vulnerabilities and also how to implement remediation strategies in modern object oriented programming languages. Learning Outcomes 1. Critically analyse relevant topics in advanced secure programming. |
10 | Elective |
2 |
Information Security Management 2To provide the student with a solid background to information security management in projects and services from the governance level. As part of this module learners are encouraged to contribute to the leadership of their group by displaying critical thinking, analytical skills and judgement particularly when reviewing the impact of their decisions within the wider context. Learning Outcomes 1. Critically assess the governance of IT security, e valuat ing the wider business and strategic environments within which the project resides . |
10 | Elective |
2 |
Threat Management IIThe learner will also examine the security and vulnerabilities of web platforms and develop best practice in the area. The module will provide the student with skills and knowledge of vulnerabilities, web application attacks and threat intelligence. Learning Outcomes 1. Evaluate and test exploit code on remote machines using an anti-forensic framework. |
10 | Elective |
2 |
Web Application Security and Software StandardsTo provide the student with a significant level of comprehension both Web Application security and relevant software compliance standards. Learning Outcomes 1. Critically analyse selected topics in Web Application and software security. |
10 | Elective |
3 |
DissertationThis module involves working on a research dissertation over an extended period. Working under the guidance of an academic supervisor, the module allows the student to develop theoretical and applied skills in using contemporary computing science techniques both from a theoretical perspective and as an applied discipline. The dissertation represents the capstone work on a topic related to their chosen programme of study. Learning Outcomes 1. Develop appropriate data collection instruments for mixed methods research and to evaluate each for their appropriateness to the research question; |
30 | Mandatory |
Recommended Study Hours per week
Examination and Assessment
On-Campus Attendance Requirement
Progression
Download a prospectus
Entry Requirements
Fees
Total Fees EU: €6300
Total Fees Non-EU: €14000
Subject to approval by ATU Governing Body (February 2025).
Further information on feesCareers
Further Information
Who Should Apply?
Contact Information
Department of Computing
Computing