View all Courses
Computing in Cybersecurity
Postgraduate Diploma in Science
Course Details
Course Code | LY_ICYBS_G |
---|---|
Level | 9 |
Duration | 1 year |
Credits | 60 |
Method of Delivery | Online |
Campus Locations | Donegal – Letterkenny |
Mode of Delivery | Part Time |
Course Overview
2. Apply significant abstract and applied skills in response to complex and/or ill-defined Cybersecurity problems.
3. Select, plan, organise and manage Cybersecurity projects with a high degree of autonomy.
4. Choose, explain and justify a solution in a variety of real-world Cybersecurity contexts.
5. Relate and reconcile abstract requirements to the development of concrete solutions with a particular emphasis on Cybersecurity.
6. Analyse, diagnose problems in the Cybersecurity domain, choose, and justify solutions.
Course Details
Year 1
Semester | Module Details | Credits | Mandatory / Elective |
---|---|---|---|
1 |
Secure InfrastructureTo provide the student with a solid understanding of infrastructure (cabling, networks, servers and services, security devices) both from the theoretical perspective and as an applied discipline. This module will analyse vulnerabilities in infrastructure and consider strategies to remediate them. Learning Outcomes 1. D esign and audit the necessary ICT infrastructure appropriate to particular business requirements. |
10 | Mandatory |
1 |
Cryptography & Forensic AnalysisTo provide the student with a solid understanding of the role cryptography, authentication and key exchange play in the security of computer systems. The module will also address the issues of wireless security, block chain and the applications of block chain technology. In addition, students will gain familiarity with post attack forensic analysis. Learning Outcomes 1. Synthesise cryptography, authentication and key exchange to form a coherent understanding of the role of cryptography in wired and wireless systems |
10 | Mandatory |
1 |
Software ComplianceTo provide the student with a significant level of comprehension both of the theoretical concepts underpinning vulnerabilities and also how to implement remediation strategies in modern object oriented programming languages. Learning Outcomes 1. Critically analyse relevant topics in advanced secure programming. |
10 | Elective |
1 |
Threat Management IThe learner will develop ethical hacking skills in foot printing, scanning, hacking and develop a wide range of effective cross platform countermeasures Learning Outcomes 1. Evaluate, assess and mitigate information security threats and develop appropriate policies and guidelines. |
10 | Elective |
1 |
Information Security Management 1To provide the student with a practitioner's understanding of information security from the view of various stakeholders, roles and process that interact with data at rest or data in transit. This module will cover the core competencies and lead the learner to investigate further new areas as they arise. Learning Outcomes 1. A udit the necessary Information Systems appropriate to particular business requirements. |
10 | Elective |
2 |
Web Application Security and Software StandardsTo provide the student with a significant level of comprehension both Web Application security and relevant software compliance standards. Learning Outcomes 1. Critically analyse selected topics in Web Application and software security. |
10 | Elective |
2 |
Threat Management IIThe learner will also examine the security and vulnerabilities of web platforms and develop best practice in the area. The module will provide the student with skills and knowledge of vulnerabilities, web application attacks and threat intelligence. Learning Outcomes 1. Evaluate and test exploit code on remote machines using an anti-forensic framework. |
10 | Elective |
2 |
Information Security Management 2To provide the student with a solid background to information security management in projects and services from the governance level. As part of this module learners are encouraged to contribute to the leadership of their group by displaying critical thinking, analytical skills and judgement particularly when reviewing the impact of their decisions within the wider context. Learning Outcomes 1. Critically assess the governance of IT security, e valuat ing the wider business and strategic environments within which the project resides . |
10 | Elective |
Recommended Study Hours per week
Examination and Assessment
On-Campus Attendance Requirement
Progression
Download a prospectus
Entry Requirements
Careers
Further Information
Who Should Apply?
Contact Information
Department of Computing
Computing