Bachelor of Science in Computing in Digital Forensics and Cyber Security
| Course code: BN311 | Entry Route into programme: Higher Certificate in Computing (NFQ Level 6) or equivalent |
| Duration: 1 year Part time (2 semesters) | |
| NFQ level: 7 | |
| Fee: € 3,500 | |
| Schedule: Tuesday , Wednesday & Thursday 6.00pm - 10.00pm | |
| Award title: Bachelor of Science | |
| Credits for Full Award: 60 @ NFQ Level 7 | |
| Awarding Body: ITB | |
Minimum Entry Requirements
The minimum entry requirement for standard entrants is a level 6 award in Computing.
Aim
Covering areas of computer and networking technology with emphasis placed on security and forensics and how this is applied to business needs. The objective of the course is to deepen the knowledge of subject areas by expanding on the fundamentals concepts. This year will focus on the Digital Forensics and Security of Information and introduce the students to working as teams where they will develop a project integrating knowledge from different modules.
Course Structure
ITB recognises the need for graduates with
computer NFQ Level 6 Higher Certificate
qualifications who are currently working
in the IT industry to return to college to
complete a level 7 award. As such, this
offer of an add-on course of the 3rd year
with an entry requirement of level 6 (or
higher) in computing. This course will be
delivered in a flexible manner (blended
learning, workshops, remote delivery,
block release) to enable graduates in the
workforce to upgrade their qualifications
while keeping their daily jobs.
Course Content
| Semester 1 | Semester 2 |
|---|---|
|
|
Computer & Network Forensics
The purpose of this module is provide learners with the essential skills for carrying out a Computer and Network Forensics Investigation. The steps include identifying, acquiring, examining, analysing and the presentation of digital evidence stored in computers, external hard drives, memory sticks and network storage devices. This evidence can be in the form of documents, images, emails, user profiles and log files.
The module covers the need of law enforcement agencies, insurance companies, compliance officials, information security departments, lawyers, solicitors, auditors, courts, tribunals and private investigators to search for digital evidence hidden in various data storage devices. Discovery/ disclosure of data by securing and searching all data sources with the intent of using them as evidence in civil, corporate or criminal legal cases. Other aims of the module is to review software systems that are used to operate digital devices, including operating systems, file management systems and applications. To cover best practice in the forensics techniques of data identification and extraction using commercial and open-source forensics tool kits. To cover best practice in network traffic monitoring and network log analysis and reporting.
Secure Communications
This module on secure communications will develop the knowledge and skills in the student to master the basics and identify the need for secure communications, to identify the vulnerabilities in data communication systems, to understand the different types of encryption processes available and to describe how best to secure data in transit.
Penetration Testing
Prepare students to conduct successful penetration testing and ethical hacking projects. Give students the skills of proper planning, scoping and reconnaissance, scanning, target exploitation, password attacks, and wireless and web applications with detailed hands-on exercises and practical tips for doing the job safely and effectively. Give students the skills to conduct a penetration test against a sample target organisation.
Network Security
Students will gain an introduction to core security technologies as well as how to develop security policies and mitigate risks. Specifically the student will secure routers and switches and their associated networks. Skills learned will include installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices. Furthermore they will gain a competency in the technologies that underpin the deployment of a secure network.
Group Project
The aim of this module is to provide students with an opportunity to undertake a group computing project with full system life cycle from proposal to deliverable. This activity will train students in the essential skills of team working, creative thinking and best practices so that they will understand how to conduct themselves professionally in a development group.
The Group Project will help students to consolidate knowledge obtained in their chosen area of study, and to integrate learning and skills acquired from life experience. We aim to provide the supporting environment for the student so that they may develop intellectually, be capable of independence, and have a high self-esteem and be able to demonstrate this through written and oral communication skills as required in each work phase of their project.
Secure Programming 1
This module will develop a mastery of processes and models underpinning secure software development, help the student to gain an insight into the inherent security drawbacks in various programming languages and architectures. The module also will investigate best practices in the adoption of secure coding practices.
Secure Programming 2
This module will develop the practical skill sets needed for secure software development, help the student to gain an insight into developing secure code. Investigate best practices in the use of code analysis and debugging.
Web Application Security
Modern cyber defense requires a realistic and thorough understanding of web application security issues. This module will enable students to capably assess a web application's security posture and convincingly demonstrate the impact of inadequate security that plagues most organisations. Students will come to understand major web application flaws and their exploitation and, most importantly, learn a field-tested and repeatable process to consistently find these flaws and convey what they have learned to their organisations.
How to Apply ?
For further details please contact the Marketing team on 01 885 1530 or e-mail: info@itb.ie.



