Bachelor of Science (Honours) in Computing in Digital Forensics and Cyber Security
| Course code: BN420 | Entry Route into programme: Level 7 Award in Computing |
| Duration: 1 year Part time (2 semesters) | |
| Fee: €3,500 | |
| NFQ level: 8 | |
| Method of application: ITB | |
| Schedule: Monday , Wednesday, Thursday 6.00pm - 10.00pm | |
| Award title: Bachelor of Science (Honours) | |
| Credits for Full Award: 60 @ NFQ Level 8 | |
| Awarding Body: ITB | |
Minimum Entry Requirements
The minimum entry requirement for standard entrants is a level 7 award in computing.
Aim
The purpose of this degree is to equip
students with the skills and knowledge
to embark upon a rewarding career
in the Information Security industry.
Digital information technology has made
significant strides in recent years and
the impact of this has transformed how
organisations do business through the
widespread adoption of communication
such as the Internet, digital video, mobile
computing and telecommunications, USB and solid state storage devices,
multimedia and interactive TV. Criminal
elements have been quick to see the
potential in accessing personal and
corporate data using information
technologies vulnerabilities and the
opportunity of anonymous remote access.
So information security has become
an essential element of organisation
structure to minimise the risk to
corporate data and to protect company
reputation in an increasing volitile
information technology world.
Course Structure & Delivery
This course is aimed at graduates from the BN311 degree at ITB and at graduates with level 7 or higher qualifications who are currently working in the information security industry. This course will be delivered in person during the evenings to enable graduates in the workforce to upgrade their qualifications while keeping their daily jobs.
All course material is available online through Moodle facility including lecture notes and exercises.
Classes are delivered each week in person but exercises/lab work can be done on students own laptop using software applications / license key provided by the college. Most exercises are report based.
We expect some attendance in the college as this promotes a class networking and companion experience for the student but attendance is not compulsory.
Course Content
| Semester 1 |
|---|
|
| Semester 2 |
|---|
|
Mobile Devices Forensics:
Module Aims :
The purpose of this module is: to provide learners with the skills to identify the correct forensics procedures in an investigation, especially the analysis of mobile device contents and networked applications. The module also examines the security vulnerabilities of communication devices and applications.
Business Continuity Management & Cloud Security
Module Aims :
The purpose of this module is to provide students with the knowledge and skills to:
- Understand the value of business continuity and disaster recovery planning.
- To perform effective business continuity and disaster recovery planning for a business.
- Understand the relationship and dependencies between IT governance, risk management and compliance in the modern business.
- To incorporate IT GRC information in the business continuity management plan.
Throughout the module, students will learn:
- The various types of IT failure modes, and methods of mitigating such failures.
- Business continuity and disaster recovery technologies and tools for IT environments.
- Tools and and mechanisms for building redundancy into IT systems.
- The role of high speed resilient network infrastructures in supporting business continuity. Amazon AWS will be used as a case study to demonstrate the important role the Cloud will have in the future of business continuity and disaster recovery. For example, how S3 and Glacier can be used as backup solutions.
- How to identify the appropriate organisational structures processes and controls for IT governance and risk management * existing rules and regulations for compliance and future possible legislation governing compliance and its effects.
Application Security
Module Aims:
Develop the essential skills required to assess web application security and to apply an appropriate solution where necessary. Gain an insight into the processes and models underpinning development of secure web applications. Investigate best practices in the adoption of secure web application practices.
Advanced Network Security
Module Aims:
Teach students to identify the threats against network infrastructures and build defensible networks that minimise the impact of attacks, as well as understand how to recognise and respond to attacks.
Biometrics and Forensics Applications
Module Aims:
This module aims to introduce the student to the fundamentals of biometrics and to develop an appreciation of the practical issues in using biometric systems in information security. The aim is to develop skills to the level required to competently select, deploy, test and administer a biometric system.
Individual Project
The project provides students with an opportunity to undertake a substantial, individual computing project and take responsibility for a full system life cycle. The project enables students to consolidate and further their chosen area of study, and to integrate knowledge and skills acquired from other studies. The project team aims to motivate and support students in their intellectual development, and the development of their independence, confidence and self-esteem.
The project also provides a vehicle for the development of students’ written and oral communication skills. Other aims for the project are to give students the experience of the stages of the system life cycle, including project implementation, evaluation, review, testing and final analysis, to allow students to prepare for and undertake an oral presentation and defense of their system and project experiences, to provide an opportunity for students to research and write a thesis describing and defending their system research, life cycle and evaluation, and finally to provide students with the opportunity to document their learning experiences, and reflect upon the problems, solutions and challenges of a substantial individual project.
Scripting & Data Processing
Module Aims :
The purpose of this module is: to provide students with the knowledge and skills to perform data collection and processing. Students will be given grounding in the principles and practice of awk, perl, bash, and python scripting to parse, sort and process data. They will also be introduced to statistics with an emphasis on data collection, presentation and interpretation.
How to Apply ?
For further details please contact the marketing team on 01 885 1530 or e-mail: info@itb.ie



