Computing in Cybersecurity
Master of Science
Sonraí an Chúrsa
Course Code | LY_ICYBS_M |
---|---|
Céim | 9 |
Fad ama | 1/2 years |
Creidmheasanna | 90 |
Modh Seachadta | Online or On-campus |
Suímh campais | Donegal – Letterkenny |
Modh Seachadta | Lánaimseartha, Páirtaimseartha |
Forbhreathnú Cúrsa
Sonraí an Chúrsa
Bliain 1
Seimeastar | Sonraí an Mhodúil | Creidmheasanna | Éigeantach / Roghnach |
---|---|---|---|
1 |
Secure InfrastructureTo provide the student with a solid understanding of infrastructure (cabling, networks, servers and services, security devices) both from the theoretical perspective and as an applied discipline. This module will analyse vulnerabilities in infrastructure and consider strategies to remediate them. Torthaí Foghlama 1. D esign and audit the necessary ICT infrastructure appropriate to particular business requirements. |
10 | Mandatory |
1 |
Cryptography & Forensic AnalysisTo provide the student with a solid understanding of the role cryptography, authentication and key exchange play in the security of computer systems. The module will also address the issues of wireless security, block chain and the applications of block chain technology. In addition, students will gain familiarity with post attack forensic analysis. Torthaí Foghlama 1. Synthesise cryptography, authentication and key exchange to form a coherent understanding of the role of cryptography in wired and wireless systems |
10 | Mandatory |
1 |
Information Security Management 1To provide the student with a practitioner's understanding of information security from the view of various stakeholders, roles and process that interact with data at rest or data in transit. This module will cover the core competencies and lead the learner to investigate further new areas as they arise. Torthaí Foghlama 1. A udit the necessary Information Systems appropriate to particular business requirements. |
10 | Elective |
1 |
Threat Management IThe learner will develop ethical hacking skills in foot printing, scanning, hacking and develop a wide range of effective cross platform countermeasures Torthaí Foghlama 1. Evaluate, assess and mitigate information security threats and develop appropriate policies and guidelines. |
10 | Elective |
2 |
Software ComplianceTo provide the student with a significant level of comprehension both of the theoretical concepts underpinning vulnerabilities and also how to implement remediation strategies in modern object oriented programming languages. Torthaí Foghlama 1. Critically analyse relevant topics in advanced secure programming. |
10 | Elective |
2 |
Information Security Management 2To provide the student with a solid background to information security management in projects and services from the governance level. As part of this module learners are encouraged to contribute to the leadership of their group by displaying critical thinking, analytical skills and judgement particularly when reviewing the impact of their decisions within the wider context. Torthaí Foghlama 1. Critically assess the governance of IT security, e valuat ing the wider business and strategic environments within which the project resides . |
10 | Elective |
2 |
Threat Management IIThe learner will also examine the security and vulnerabilities of web platforms and develop best practice in the area. The module will provide the student with skills and knowledge of vulnerabilities, web application attacks and threat intelligence. Torthaí Foghlama 1. Evaluate and test exploit code on remote machines using an anti-forensic framework. |
10 | Elective |
2 |
Web Application Security and Software StandardsTo provide the student with a significant level of comprehension both Web Application security and relevant software compliance standards. Torthaí Foghlama 1. Critically analyse selected topics in Web Application and software security. |
10 | Elective |
3 |
DissertationThis module involves working on a research dissertation over an extended period. Working under the guidance of an academic supervisor, the module allows the student to develop theoretical and applied skills in using contemporary computing science techniques both from a theoretical perspective and as an applied discipline. The dissertation represents the capstone work on a topic related to their chosen programme of study. Torthaí Foghlama 1. Develop appropriate data collection instruments for mixed methods research and to evaluate each for their appropriateness to the research question; |
30 | Mandatory |
Uaireanta Staidéir Molta in aghaidh na seachtaine
Scrúdú agus Measúnú
Riachtanas Tinrimh ar an gCampas
Dul chun cinn
Download a prospectus
Riachtanais Iontrála
Táillí
Total Fees EU: €6300
Total Fees Non-EU: €14000
Subject to approval by ATU Governing Body (February 2025).
Tuilleadh eolais faoi tháillíGairmeacha
Further Information
Cé Ba Chóir Iarratas a Dhéanamh?
Eolas Teagmhála
Department of Computing
Computing