Cybersecurity Operations
Master of Science
Sonraí an Chúrsa
Course Code | GA_KCYGC_V09 |
---|---|
Céim | 9 |
Fad ama | 2 years |
Creidmheasanna | 90 |
Modh Seachadta | Blended |
Suímh campais | Mayo |
Modh Seachadta | Páirtaimseartha |
Forbhreathnú Cúrsa
- Organisations implement security measures to mitigate against data loss. Risk and compliance controls implemented within an organisation often fail to protect the organisation. In such an event, cybersecurity operations attempt to respond to the incident and defend the compromised vulnerability.
- As well as the theoretical component of malicious compromises and vulnerable attack vectors, successful applicants will work on practical solutions to ensure secure IT infrastructure. Data analytics are a key component of providing secure operations and successful applicants will also use relevant programming platforms to visualise threat data, aiding incident response.
- This programme is developed in partnership with Hewlett Packard Enterprises (HPE) in Galway. The HPE Cyber Defense Center (CDC) offers world-class capabilities in operations, engineering, intelligence, and cybersecurity incident management.
When Risk & Compliance fails, an organization must respond to cyber incidents. All IT practitioners and security operations personnel need to have the skills to systematically neutralize a threat. These steps include identifying a threat, employing quarantine measures and implementing robust measures to mitigate against future compromises. Engineering models and frameworks such as Mitre ATT&CK are explored as a means of analysing organisational data, identifying mitigating threats.
Incident detection identifies threat actors operating within an organization’s IT infrastructure. Using data analytic tools and machine learning, IT security personnel can forensically examine and identify anomalous activity, potentially being a malicious threat. Coding is an integral part of designing bespoke analytical tools and this module explores the programming languages necessary for data interpretation and visualisation.
An organization endeavours to secure its IT architecture against threats. Vulnerability management ensures elements of this architecture are configured and secured correctly. Implementing robust defences is the best method to mitigate against these threats. Preparedness for an incident is as important as incident response.
Theoretical concepts, research paradigms and critical readings relevant to the field of academic or professional applied research will be explored. Epistemological and ontological considerations will be discussed in relation to research design and learners will reflect on the challenges of carrying out empirical social research in their particular workplace or specialist field of application. Students will reflect upon some of the ethical, societal and practical problems of data collection, including sampling, gaining access to the field, designing a research instrument and the principles of qualitative and quantitative analysis.
The Thesis or Dissertation can be pursued in parallel with the year two modules and completed in year two.
This applied research thesis or dissertation module p…
Sonraí an Chúrsa
Bliain 1
Seimeastar | Sonraí an Mhodúil | Creidmheasanna | Éigeantach / Roghnach |
---|---|---|---|
Year |
Incident Detection and ResponseWhen cyber security controls are circumvented, an organization must respond to cyber incidents. Security operations personnel need to have the skills to systematically neutralize a threat. These steps include formal incident response preparation and planning, threat identification, containment and eradication measures, and implementation of robust controls to mitigate against future compromises. This module explores the necessary processes and tools used to respond effectively to a detected threat. A structured process of Incident Detection and Response will assist cyber security professionals in proactively searching for cyber security threats. Once detected, this process will ensure that the threat is analysed and neutralised. Information learned from this structured process ensures that cyber security professionals recognise the methods used by current and evolving threats. This module details the preparatory processes that are required in advance, such as incident detection and response policy documentation, teams and communication channels. These processes ensure that detection and reporting structures exist, enabling an organisation to triage a threat and assess its criticality. Containment and threat analysis can be reported back through the process ensuring that post-incident information will aid further detection and strengthen an organisation's cyber defences Torthaí Foghlama 1. Integrate advanced theoretical knowledgein the development of Incident Detection and Response policies. 2. Independently evaluate and critically analyse data collection tools, platforms. 3. Apply current accepted methodologies and frameworks for incident response and detection 4. Integrate knowledge of malware forensics to identify and managecyber threats. 5. Apply accepted methodologies for tacklingdesign issues associated with threat remediation. 6. Critically evaluate Incident Detection and Response policies in industry specific environments. |
10 | Mandatory |
Year |
Programming for CybersecurityAn introduction to automating computer tasks using scripting languages and solving problems using programming languages, with a focus on cyber-security. Torthaí Foghlama 1. Design scripts toAutomate cybersecuritytasks.. 2. Design and Developalgorithms to solvecomputational problems. 3. Developa complex scripts using programming techniques 4. Analyse and visualise metadata that has been extracted from a variety of sources 5. Design and developalgorithms to identify vunerabilities. 6. Analyse and evaluateareas in cybersecurity that can be automated and develop the algorithms to accomplish it. |
10 | Mandatory |
Year |
Security OperationsAn organization endeavours to secure its Information Technology Architecture against threats. Secure Operations Management ensures the elements of this architecture, Network, Operating Systems and Server Technology are configured and secured correctly and compliant with relevant frameworks. Implementing robust defences is the best method to mitigate against threats. Preparedness for an incident is as important as incident response. Torthaí Foghlama 1. Critically evaluate design and implement the planning, scoping and reconnaissance phases associated withpenetration testing. 2. Critically evaluate exisitng tools and techniques and develop new best practicesfor Vulnerability Management and Endpoint Protection. 3. Analyse and document measures,concepts and methods that apply to Security Governance, Strategic Planning and Organizational Structure. 4. Desgin and implement appropriate measures and controls that an organisation can deploy to harden devices, networks and operating systems against threats. 5. Conduct appropriate research and undertake the design and development ofappropriate measures and controls that an organisation can deploy to improve threat mitigation capabilities and ensure compliance with relevant frameworks. |
10 | Mandatory |
Year |
Research Methods and Critical AnalysisThis module aims to provide students with the theoretical foundations for their postgraduate research. Theoretical concepts; research paradigms and critical readings relevant to the field of academic or professional applied research will be explored. Epistemological and ontological considerations will be discussed in relation to research design and learners will reflect on the challenges of carrying out empirical research in their particular workplace or specialist field of application. Students will reflect on ethical, societal, egalitarian and practical problems of data collection, including sampling, gaining access to the field, designing a research instrument and the principles of qualitative and quantitative analysis. The module may also include introductory guest speakers or workshops on technologies for data analysis.This module is designed to develop theoretical knowledge of research paradigms and to explore methodological possibilities in addition to developing skills in critically engaging with academic literature and relevant, peer-reviewed journals and technical reports. It aims to increase proficiency in using critical evaluation skills within the context of a professional research project or practice-based innovation or applied research project. The module outcomes comprise a thorough ethical review of a research proposal in addition to presentation of a research proposal. Torthaí Foghlama 1. Articulate the alignment oftheir ownphilosophical positions with their researchmethodological choices and project design decisions. 2. Critically reviewtheir own personal positioning in the research context, and how this might shapethe knowledge they are producing, employing a process of guided reflexivity. 3. Evaluate theontological, epistemological and methodological choices and assumptions made, in reviews of otherpapers in their field of study. 4. Exhibit advanced knowledge of technical and professional advances in the field by creating a robust and practically applicable research design, in addition to communicatinghow theresearch project is situated, within wider global academic, emancipatory, environmental and professional discourses. 5. Communicate effectively within a formal research proposal, the philosophical assumptions that shape the research design; rationale and purpose, referencingacademic, professional and other relevant literature within the field or discipline studied. 6. Confidently leverage research skills and knowledge gained, to draft and present an applied research project proposal, having regard to ethical considerations and the potential individual, organisational, regulatoryand societal implications of the dissemination of findings. |
10 | Mandatory |
Bliain 2
Seimeastar | Sonraí an Mhodúil | Creidmheasanna | Éigeantach / Roghnach |
---|---|---|---|
Year |
Dissertation/Applied Research ProjectThis Applied Research Project or Dissertation module provides the mechanism for learners to carry out an in-depth, independent investigation, analysis and presentation of a research topic; organisational or workplace innovation dilemma of their choosing, related to the relevant academic discipline and/or professional field. This Applied Research Project or Dissertation module requires the learner to conceptualise, design, conduct, analyse and formally write up, then visually / orally present a substantial research project or workplace innovation/intervention to postgraduate research standard. The objective of this module is to provide a structured pathway to support students through a process of systematic investigation and applied, scholarly work and develop their capability to conduct an independent, ethically compliant critically evaluated research investigation. It is expected that learners will engage with research projects or workplace interventions which are relevant and applicable to their professional field. Torthaí Foghlama 1. Articulate advancedknowledge and understanding of a research topic / practice-based innovation question within the field of specialism. 2. Structure research work to a timeline, collaborating effectively under guidance in a peer relationship with their dissertation supervisor/ intervention mentor. 3. Critically evaluate and applya complex and specialised range of research design, data collection, data analysis techniques and investigative skills (such as fieldwork, interviews, questionnaires andquantitative techniques), relevant to aprofessional research focus. 4. Formally present an in-depth critical review of professional and academic literature related to the research or intervention topic. 5. Defend decisions related to theoretical and practical research design and implementation choices, justifying these with reference to ethical and regulatory considerations and, where applicable, potential or perceived organisational and/or societal impact. 6. Present, tothe appropriate scholarly standard, a robust,independently produced andcritically evaluated, written research dissertation or formally structured report. 7. Formally present and defend research and/or intervention findings, drawing conclusions and delivering recommendations relevant to the relevant professional field, having due regard to potential individual, societal and/ or organisational impacts of the research/innovation project outcomes. |
50 | Mandatory |
Uaireanta Staidéir Molta in aghaidh na seachtaine
Scrúdú agus Measúnú
Riachtanas Tinrimh ar an gCampas
Dul chun cinn
Download a prospectus
Riachtanais Iontrála
Gairmeacha
- Design, Configuration, Maintenance and Monitoring of different Linux, Windows Servers, Network devices.
- AWS Cloud, Azure Cloud and Office 365 management.
- Basic database administration
- Quickly arrange repair for hardware in occasion of hardware failure
- End Point Device and Patch management and device OS rollouts.
- Manage backup and recovery.
- Implement the policies for the use of the computer system and network.
- Setup security policies for users. A system administrator must have a strong grasp of computer security (e.g. firewalls and intrusion detection systems).
- Identity management in local AD and cloud services.
- Participate in incident response and threat triage ensuring all incidents are brought to complete mitigation and/or closure.
- Document and maintain threat alerts, procedures, analysis, and investigations accurately.
- Perform root cause analysis and review complex attacks and threats – reconcile them against multiple sources and identify where a potential incident may have occurred.
- Participate in technology and policy implementation, tuning and oversight of new threat processes and procedures across all insider threat technologies executed in the firm, particularly in cutting edge analytics space.
Further Information
Cé Ba Chóir Iarratas a Dhéanamh?
Eolas Teagmhála
Computer Science & Applied Physics