Computing in Cybersecurity
Postgraduate Diploma in Science
Sonraí an Chúrsa
Course Code | LY_ICYBS_G |
---|---|
Céim | 9 |
Fad ama | 1 year |
Creidmheasanna | 60 |
Modh Seachadta | Online |
Suímh campais | Donegal – Letterkenny |
Modh Seachadta | Páirtaimseartha |
Forbhreathnú Cúrsa
2. Apply significant abstract and applied skills in response to complex and/or ill-defined Cybersecurity problems.
3. Select, plan, organise and manage Cybersecurity projects with a high degree of autonomy.
4. Choose, explain and justify a solution in a variety of real-world Cybersecurity contexts.
5. Relate and reconcile abstract requirements to the development of concrete solutions with a particular emphasis on Cybersecurity.
6. Analyse, diagnose problems in the Cybersecurity domain, choose, and justify solutions.
Sonraí an Chúrsa
Bliain 1
Seimeastar | Sonraí an Mhodúil | Creidmheasanna | Éigeantach / Roghnach |
---|---|---|---|
1 |
Secure InfrastructureTo provide the student with a solid understanding of infrastructure (cabling, networks, servers and services, security devices) both from the theoretical perspective and as an applied discipline. This module will analyse vulnerabilities in infrastructure and consider strategies to remediate them. Torthaí Foghlama 1. D esign and audit the necessary ICT infrastructure appropriate to particular business requirements. |
10 | Mandatory |
1 |
Cryptography & Forensic AnalysisTo provide the student with a solid understanding of the role cryptography, authentication and key exchange play in the security of computer systems. The module will also address the issues of wireless security, block chain and the applications of block chain technology. In addition, students will gain familiarity with post attack forensic analysis. Torthaí Foghlama 1. Synthesise cryptography, authentication and key exchange to form a coherent understanding of the role of cryptography in wired and wireless systems |
10 | Mandatory |
1 |
Software ComplianceTo provide the student with a significant level of comprehension both of the theoretical concepts underpinning vulnerabilities and also how to implement remediation strategies in modern object oriented programming languages. Torthaí Foghlama 1. Critically analyse relevant topics in advanced secure programming. |
10 | Elective |
1 |
Threat Management IThe learner will develop ethical hacking skills in foot printing, scanning, hacking and develop a wide range of effective cross platform countermeasures Torthaí Foghlama 1. Evaluate, assess and mitigate information security threats and develop appropriate policies and guidelines. |
10 | Elective |
1 |
Information Security Management 1To provide the student with a practitioner's understanding of information security from the view of various stakeholders, roles and process that interact with data at rest or data in transit. This module will cover the core competencies and lead the learner to investigate further new areas as they arise. Torthaí Foghlama 1. A udit the necessary Information Systems appropriate to particular business requirements. |
10 | Elective |
2 |
Web Application Security and Software StandardsTo provide the student with a significant level of comprehension both Web Application security and relevant software compliance standards. Torthaí Foghlama 1. Critically analyse selected topics in Web Application and software security. |
10 | Elective |
2 |
Threat Management IIThe learner will also examine the security and vulnerabilities of web platforms and develop best practice in the area. The module will provide the student with skills and knowledge of vulnerabilities, web application attacks and threat intelligence. Torthaí Foghlama 1. Evaluate and test exploit code on remote machines using an anti-forensic framework. |
10 | Elective |
2 |
Information Security Management 2To provide the student with a solid background to information security management in projects and services from the governance level. As part of this module learners are encouraged to contribute to the leadership of their group by displaying critical thinking, analytical skills and judgement particularly when reviewing the impact of their decisions within the wider context. Torthaí Foghlama 1. Critically assess the governance of IT security, e valuat ing the wider business and strategic environments within which the project resides . |
10 | Elective |
Uaireanta Staidéir Molta in aghaidh na seachtaine
Scrúdú agus Measúnú
Riachtanas Tinrimh ar an gCampas
Dul chun cinn
Download a prospectus
Riachtanais Iontrála
Gairmeacha
Further Information
Cé Ba Chóir Iarratas a Dhéanamh?
Eolas Teagmhála
Department of Computing
Computing