Master of Science in Computing ( Information Security & Digital Forensics)
|Course code: BN518||
Entry Route into programme:
|Duration: 1 academic year *|
|NFQ level: 9|
|Schedule: Full time|
|Award title: Master of Science|
|Credits for Full Award: 90 @ NFQ Level 9|
|Fee: €4000 **|
|Awarding Body: ITB||* A dissertation should be submitted by the end of August.|
ITB is now a part of Information Security Ireland (ISI) - a central force in the field of Information Security promoting interaction with technology firms, research institutes, academia & government. http://www.infosecurityireland.org/
Minimum Entry Requirements
The minimum entry requirement for standard entrants to the Master of Science in Computing is 2nd Class Honours Grade 2 (GPA 2.5 or equivalent), in a Bachelor of Science in Computing (level 8) course, or equivalent. Students progressing through the Higher Diploma in Science in Computing (BN509) who wish to enter the M.Sc. in Computing must attain a 2nd Class Honours Grade 2 (GPA 2.5) on the course. In the event of a student not attaining this standard level , students must achieve an acceptable standard for progression by other means approved by HETAC. The acceptance of candidates with third class honours degrees and appropriate work experience and industrial certification on this course will be allowed provided there is evidence that the candidate can cope with the learning objectives of the course.
Candidates will be interviewed to assess their suitability to undertake the level work required and to assess their commitment to succeeding on the MSc in Computing Programme.
The overall aims of this course are to produce postgraduate degree holders with comprehensive knowledge, skills and attitudes appropriate for careers in Information Security & Digital Forensics. In a rapidly evolving World of technology, this course seeks to develop the students' ability in dealing with technical and logical problems by analyzing the current industrial practices and investigating research developments of future technologies.
Delivery of course content will be in-person with lectures and labs conducted in ITB and made available online for remote access. Class discussions on research papers and issues of importance form part of the course. Modules are assessed through continuous assessment and written exam. Continuous assessment will include theoretical work in the form of literary reviews and practical work using commercial and open source forensics software tools.
Students must complete 6 modules and a thesis. All Modules are 10 ECTS Credits. The Research project is 30 ECTS Credits.
A choice of modules across streams will be offered over an academic year.
Electives will only be available at the discretion of the institute, subject to availability of lecturing staff and sufficient expression of interest from students.
- Investigation of core security technologies and security policies to mitigate risks.
- Ability to review procedures for installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices.
- Knowledge of the technologies that underpin the deployment and maintenance of a secure network.
- Understand the requirements of industrial standards like ISO 27002 in compliance for securing computer networks.
- Implement, monitor and maintain a secure network consisting of enterprise level routers and switches
- Understand the role of AAA and IPSec in securing networks.
- Understand how to design and implement firewall technologies that complement network policies in securing the perimeter of a network.
- Describe methods for implementing authentication, data confidentiality and integrity such as Public Key Cryptography and the use of VPNs.
- How to develop a comprehensive security policy for any organisation
Cyber Crime Investigation
- Research into criminal activities on the Internet and computer crime legislation.
- Review the Computer Forensics Investigative Methodology
- Investigation of computer network intrusion activities and detection tools.
- Development of preventative measures to safeguard computers and their users.
- Develop skills in tracing illegal activity on computers.
- Understand the Forensics Investigative Procedures for gathering evidence
- Analyze the software tools and methods currently available for finding illegal activities on computer disks and in computer networks.
- Research the criminal activity on the Internet and available tools to prevent such activity.
Business Continuity and Disaster Recovery
- Analysis of IT failure modes and how such failures can be mitigated
- Research into disaster recovery technologies in an IT environment
- Development of tools and systems for building redundancy into IT systems
- Investigation of the role of high speed resilient network infrastructures in providing for business continuance
- Develop the knowledge required to analyze IT infrastructures and develop efficient plans for deploying system redundancy and disaster recovery technologies to meet business needs.
- Research mandatory business continuance requirements and data protection requirements for various industries and service providers.
- Investigate the design and implementation of strategies and systems for protecting critical information assets.
- Research various network technologies and topologies for system redundancy, resilience and high availability.
Secure Communications & Cryptography
- Identify vulnerabilities in data and voice communication systems
- Understand the different types of encryption processes available
- Learn how to secure data and voice communications systems
- Select a secure communications solution from range of possibilities based on system.
- Understand how to implement proper secure communications.
- Analyze existing technologies and future new technologies.
- Research vulnerabilities in systems and identify best solutions.
- Investigate the Digital Forensics Investigative Procedures
- Research how user activity can be tracked on a digital device
- Comparison of tools and techniques for digital forensics
- Develop skills in applying digital forensics investigation techniques
- Understand how information is stored and used on digital devices
- Analyze digital devices to establish user activity
- Research the development of new devices and technologies and how current digital forensics methods will apply to them.
- Cover a broad range of approaches to biometrics reflecting both fundamental principles and the current state-of-the-art.
- To develop an understanding of the fundamental components common to all biometric systems.
- To develop the student’s ability to design, implement, test and evaluate biometric systems that conform to international standards.
- To develop the students ability to carry out research in biometrics.
- Modern biometric technologies and The generic components of a biometric system.
- Pattern recognition and feature extraction in biometrics, Voice and face recognition systems.
- Understand ethical and legal issues associated with biometrics.
- Select the most appropriate biometric for a given application.
- Testing and evaluating biometric systems with standard test datasets.
- Work with signal and image acquisition systems, Deploying biometric systems.
- Complete documentation to accompany designed biometric systems.
- Defend proposed biometric systems in an oral presentation.
This module aims:
- To give students the experience of an individual computing project at postgraduate level
- To give students responsibility for substantial independent working and a full project life cycle, from problem specification through to implementation and evaluation
How to apply ?
** For more info about fees for International Students email email@example.com
For further details on post graduate courses and intakes in 2013 please contact our marketing team on 01 885 1000 or e-mail: firstname.lastname@example.org