Master of Science in Computing (Information Security & Digital Forensics)
| Course code: BN518 |
Entry Route into programme:
|
| Duration: 2 years (4 Semesters) | |
| NFQ level: 9 | |
| Fee: €2,000 per year | |
| Schedule: Tuesday and Thursday 6.00pm -10.00pm | |
| Award title: Master of Science | |
| Credits for Full Award: 90 @ NFQ Level 9 | |
| Awarding Body: ITB | |
This course has now been discontinued and has been replaced by BN528: MSc in Computing (Applied Cyber Security)
Overview
This course is about producing postgraduate degree holders with comprehensive knowledge, skills and attitudes appropriate for careers in Information Security and Digital Forensics. The course is focussed on
developing the student’s ability to deal with technical and logical problems by
analysing the current industrial practices and investigating and researching
developments of future technologies.
Who Should Apply for the MSc in Computing at ITB?
The MSc in Computing programme is of particular value to holders of a primary degree in computing, IT, or equivalent, working as IT professionals. It is also of value to individuals with a computing degree background who wish to develop their career towards working within a research-oriented environment at a postgraduate level.
Minimum Entry Requirements
The minimum entry requirement for standard entrants to the Master of Science in Computing is 2nd Class Honours Grade 2 (GPA 2.5 or equivalent), in a Bachelor of Science in Computing (level 8) course, or equivalent.
Students progressing through the Higher Diploma in Science in Computing (BN509) who wish to enter the M.Sc. in Computing must attain a 2nd Class Honours Grade 2 (GPA 2.5) on the course.
In the event of a student not attaining this standard level , students must achieve an acceptable standard for progression by other means approved by QQI.
The acceptance of candidates with third class honours degrees and appropriate work experience and industrial certification on this course will be allowed provided there is evidence that the candidate can cope with the learning objectives of the course.
Candidates may be interviewed to assess their suitability to undertake the level of work required and to assess their commitment to succeding on the MSc in Computing Programme.
Careers Opportunities
There are a large number of career
opportunities for success graduates from
this master’s programme. Graduates will
be knowledgeable and skills in areas of
digital forensics, secure networking and
communications, biometrics, business
continuance and disaster recovery and
cybercrime prevention. Graduates from
this programme now work in
Liberty IT, Deloitte, Grant Thornton, Ward Solutions, Integrity Solutions,
SAP,
Google, HP, IBM, Intel, Microsoft, Rits,
IDA and a wide range of SME businesses
throughout Ireland.
Typical job titles are Information Security
Crime Investigator/Forensics Expert,
System, Network, and/or Web Penetration
Tester, Network Security Engineer,
Application Penetration Tester, Disaster
Recovery/Business Continuity Analyst/
Manager.

ITB is also part of Information Security Ireland (ISI) - a central force in the field of Information Security promoting interaction with technology firms, research institutes, academia & government. http://www.infosecurityireland.org/
COURSE CONTENT
| Year 1 Semester 1 |
|---|
|
| Year 1 Semester 2 |
|
| Year 2 Semester 3 |
|---|
|
| Year 2 Semester 4 |
|---|
|
Students must complete 6 modules and a thesis. All Modules are 10 ECTS Credits. The MSc Research Project is 30 ECTS Credits.
The order of Module Delivery may differ from the listing above.
An award of ‘Postgraduate Diploma in Science in Computing’ may be granted if learners leave this programme having completed 6 taught modules and attained 60 credits with a minimum GPA of 2.00.
Network Security
Module Aims:
- Investigation of core security technologies and security policies to mitigate risks.
- Ability to review procedures for installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices.
- Knowledge of the technologies that underpin the deployment and maintenance of a secure network.
Learning Outcomes:
- Understand the requirements of industrial standards like ISO 27002 in compliance for securing computer networks.
- Implement, monitor and maintain a secure network consisting of enterprise level routers and switches
- Understand the role of AAA and IPSec in securing networks.
- Understand how to design and implement firewall technologies that complement network policies in securing the perimeter of a network.
- Describe methods for implementing authentication, data confidentiality and integrity such as Public Key Cryptography and the use of VPNs.
- How to develop a comprehensive security policy for any organisation
Cyber Crime Investigation
Module aims:
- Research into criminal activities on the Internet and computer crime legislation.
- Review the Computer Forensics Investigative Methodology
- Investigation of computer network intrusion activities and detection tools.
- Development of preventative measures to safeguard computers and their users.
Learning outcomes:
- Develop skills in tracing illegal activity on computers.
- Understand the Forensics Investigative Procedures for gathering evidence
- Analyse the software tools and methods currently available for finding illegal activities on computer disks and in computer networks.
- Research the criminal activity on the Internet and available tools to prevent such activity.
Business Continuity and Disaster Recovery
Module aims:
- Analysis of IT failure modes and how such failures can be mitigated
- Research into disaster recovery technologies in an IT environment
- Development of tools and systems for building redundancy into IT systems
- Investigation of the role of high speed resilient network infrastructures in providing for business continuance
Learning outcomes:
- Develop the knowledge required to analyse IT infrastructures and develop efficient plans for deploying system redundancy and disaster recovery technologies to meet business needs.
- Research mandatory business continuance requirements and data protection requirements for various industries and service providers.
- Investigate the design and implementation of strategies and systems for protecting critical information assets.
- Research various network technologies and topologies for system redundancy, resilience and high availability.
Secure Communications & Cryptography
Module aims:
- Identify vulnerabilities in data and voice communication systems
- Understand the different types of encryption processes available
- Learn how to secure data and voice communications systems
Learning outcomes:
- Select a secure communications solution from range of possibilities based on system.
- Understand how to implement proper secure communications.
- Analyse existing technologies and future new technologies.
- Research vulnerabilities in systems and identify best solutions.
Digital Forensics
Module aims:
- Investigate the Digital Forensics Investigative Procedures
- Research how user activity can be tracked on a digital device
- Comparison of tools and techniques for digital forensics
Learning outcomes:
- Develop skills in applying digital forensics investigation techniques
- Understand how information is stored and used on digital devices
- Analyse digital devices to establish user activity
- Research the development of new devices and technologies and how current digital forensics methods will apply to them.
Biometrics
Module Aims:
- Cover a broad range of approaches to biometrics reflecting both fundamental principles and the current state-of-the-art practices.
- To develop an understanding of the fundamental components common to all biometric systems.
- To develop the student’s ability to design, implement, test and evaluate biometric systems that conform to international standards.
- To develop the students ability to carry out research in biometrics.
Learning Outcomes:
- Modern biometric technologies and the generic components of a biometric system.
- Pattern recognition and feature extraction in biometrics, voice and face recognition systems.
- Understand ethical and legal issues associated with biometrics.
- Select the most appropriate biometric for a given application.
- Testing and evaluating biometric systems with standard test datasets.
- Work with signal and image acquisition systems, deploying biometric systems.
- Complete documentation to accompany designed biometric systems.
- Defend proposed biometric systems in an oral presentation.
MSc Research Project :
This module aims:
- To give students the experience of an individual major project at postgraduate level
- To give students responsibility for substantial independent working and a full project life cycle, from problem specification through to implementation and evaluation
How to Apply ?
For further details please contact the marketing team on 01 885 1530 or e-mail: info@itb.ie.



