View all Courses
Cybersecurity Operations
Master of Science
Course Details
Course Code | GA_KCYGC_V09 |
---|---|
Level | 9 |
Duration | 2 years |
Credits | 90 |
Method of Delivery | Blended |
Campus Locations | Mayo |
Mode of Delivery | Part Time |
Course Overview
The objective of the Masters in Cybersecurity Operations is to educate IT practitioners in responding to cyber-attack incidents. It examines the tools to identify threat actors. Models and frameworks are followed to manage the response. Data analytics can use tools such as machine learning to identify anomalies in organisational IT traffic.
Cybersecurity Operations involves implementing secure architecture to defend against vulnerable systems. It can be considered the stage when risk and compliance has failed.
This Masters provides a pathway for IT professionals to upskill in the area of cybersecurity operations. Developed in partnership with HPE, a learner can pursue a major L9 award through 4 x 10 credit taught modules and completing a 50-credit thesis.
Why Study this course?
- Organisations implement security measures to mitigate against data loss. Risk and compliance controls implemented within an organisation often fail to protect the organisation. In such an event, cybersecurity operations attempt to respond to the incident and defend the compromised vulnerability.
- As well as the theoretical component of malicious compromises and vulnerable attack vectors, successful applicants will work on practical solutions to ensure secure IT infrastructure. Data analytics are a key component of providing secure operations and successful applicants will also use relevant programming platforms to visualise threat data, aiding incident response.
- This programme is developed in partnership with Hewlett Packard Enterprises (HPE) in Galway. The HPE Cyber Defense Center (CDC) offers world-class capabilities in operations, engineering, intelligence, and cybersecurity incident management.
The taught modules are delivered in year one of the Masters and prepares the learner for independent, delt-directed thesis research in the domain of cybersecurity operations .
Incident Detection & Response (10 Credits)
When Risk & Compliance fails, an organization must respond to cyber incidents. All IT practitioners and security operations personnel need to have the skills to systematically neutralize a threat. These steps include identifying a threat, employing quarantine measures and implementing robust measures to mitigate against future compromises. Engineering models and frameworks such as Mitre ATT&CK are explored as a means of analysing organisational data, identifying mitigating threats.
When Risk & Compliance fails, an organization must respond to cyber incidents. All IT practitioners and security operations personnel need to have the skills to systematically neutralize a threat. These steps include identifying a threat, employing quarantine measures and implementing robust measures to mitigate against future compromises. Engineering models and frameworks such as Mitre ATT&CK are explored as a means of analysing organisational data, identifying mitigating threats.
Programming for Data Analytics (10 Credits)
Incident detection identifies threat actors operating within an organization’s IT infrastructure. Using data analytic tools and machine learning, IT security personnel can forensically examine and identify anomalous activity, potentially being a malicious threat. Coding is an integral part of designing bespoke analytical tools and this module explores the programming languages necessary for data interpretation and visualisation.
Incident detection identifies threat actors operating within an organization’s IT infrastructure. Using data analytic tools and machine learning, IT security personnel can forensically examine and identify anomalous activity, potentially being a malicious threat. Coding is an integral part of designing bespoke analytical tools and this module explores the programming languages necessary for data interpretation and visualisation.
Secure Operations (10 Credits)
An organization endeavours to secure its IT architecture against threats. Vulnerability management ensures elements of this architecture are configured and secured correctly. Implementing robust defences is the best method to mitigate against these threats. Preparedness for an incident is as important as incident response.
An organization endeavours to secure its IT architecture against threats. Vulnerability management ensures elements of this architecture are configured and secured correctly. Implementing robust defences is the best method to mitigate against these threats. Preparedness for an incident is as important as incident response.
Research Methods and Critical Analysis (10 Credits)
Theoretical concepts, research paradigms and critical readings relevant to the field of academic or professional applied research will be explored. Epistemological and ontological considerations will be discussed in relation to research design and learners will reflect on the challenges of carrying out empirical social research in their particular workplace or specialist field of application. Students will reflect upon some of the ethical, societal and practical problems of data collection, including sampling, gaining access to the field, designing a research instrument and the principles of qualitative and quantitative analysis.
The Thesis or Dissertation can be pursued in parallel with the year two modules and completed in year two.
Theoretical concepts, research paradigms and critical readings relevant to the field of academic or professional applied research will be explored. Epistemological and ontological considerations will be discussed in relation to research design and learners will reflect on the challenges of carrying out empirical social research in their particular workplace or specialist field of application. Students will reflect upon some of the ethical, societal and practical problems of data collection, including sampling, gaining access to the field, designing a research instrument and the principles of qualitative and quantitative analysis.
The Thesis or Dissertation can be pursued in parallel with the year two modules and completed in year two.
Thesis/Dissertation (50 Credits)
This applied research thesis or dissertation module p…
This applied research thesis or dissertation module p…
Recommended Study Hours per week
Students can expect 11 weekly contact hours on average. In Year 1, students undertake 3 modules of live and recorded lectures, tutorials and self guided study. Research Methods is self guided requiring approximately 4 hours per week. In Year 2, students undertake a self-guided and supervised Dissertation.
Examination and Assessment
Assessment in each module will be on the basis of 100% continuous assessment. This may include projects; e-portfolios; reflections; lab based practicals; group assignments; team work; presentations; problem based tasks; book and academic article reviews; academic essays (incorporating a literature review and a 17.500- word formal dissertation); individual and group case study assignments; formal poster presentations; a formal interview examination; peer review; self assessment and/ or mid-session practical examinations.
On-Campus Attendance Requirement
Module content is delivered online with synchronous and asynchronous lectures. There is no mandatory requirement for on-campus attendance. There is an optional 1-day per term on-campus tutorial session providing opportunity to meet and network with class colleagues and lecturers.
Progression
Graduates from this level 9 Master of Science in Cybersecurity Operations can progress on to other academic postgraduate and doctoral programmes or professional qualifications in IT, Computing, Cybersecurity, Research etc.
Download a prospectus
Entry Requirements
The minimum entry requirements are a Level 8 qualification in an IT related discipline.
Careers
The Cyber Security Skills Report 2021 identified that 62% of core IT companies will hire a security related person in the next year. 46% of security teams are understaffed leading to a demand for roles as security engineers, analysts, consultants and architects. At any one time, there are over 100 IT Security or Cyber Security related roles available. As an example, the following 2 positions (Systems Administrator, Senior Cyber Security Analyst) demonstrate that security and/or cyber security skills are required as part of their specific roles and responsibilities. The two roles can be on either end of an IT job spectrum, specifically related to cybersecurity:
Systems Administrator
- Design, Configuration, Maintenance and Monitoring of different Linux, Windows Servers, Network devices.
- AWS Cloud, Azure Cloud and Office 365 management.
- Basic database administration
- Quickly arrange repair for hardware in occasion of hardware failure
- End Point Device and Patch management and device OS rollouts.
- Manage backup and recovery.
- Implement the policies for the use of the computer system and network.
- Setup security policies for users. A system administrator must have a strong grasp of computer security (e.g. firewalls and intrusion detection systems).
- Identity management in local AD and cloud services.
Senior Cyber Security Analyst
- Participate in incident response and threat triage ensuring all incidents are brought to complete mitigation and/or closure.
- Document and maintain threat alerts, procedures, analysis, and investigations accurately.
- Perform root cause analysis and review complex attacks and threats – reconcile them against multiple sources and identify where a potential incident may have occurred.
- Participate in technology and policy implementation, tuning and oversight of new threat processes and procedures across all insider threat technologies executed in the firm, particularly in cutting edge analytics space.
Further Information
Who Should Apply?
This programme is aimed at IT professionals seeking to upskill/reskill in the domain of cybersecurity.
Contact Information
Department
Computer Science & Applied Physics