Master of Science in Computing (Information Security & Digital Forensics)
|Course code: BN518||
Entry Route into programme:
|Duration: 2 years (4 Semesters)|
|NFQ level: 9|
|Fee: €2,000 per year|
|Schedule: Mon & Thurs 6pm-10pm.|
|Award title: Master of Science|
|Credits for Full Award: 90 @ NFQ Level 9|
|Awarding Body: ITB|
ITB is now part of Information Security Ireland (ISI) - a central force in the field of Information Security promoting interaction with technology firms, research institutes, academia & government. http://www.infosecurityireland.org/
Minimum Entry Requirements
The minimum entry requirement for standard entrants to the Master of Science in Computing is 2nd Class Honours Grade 2 (GPA 2.5 or equivalent), in a Bachelor of Science in Computing (level 8) course, or equivalent.
Students progressing through the Higher Diploma in Science in Computing (BN509) who wish to enter the M.Sc. in Computing must attain a 2nd Class Honours Grade 2 (GPA 2.5) on the course.
In the event of a student not attaining this standard level , students must achieve an acceptable standard for progression by other means approved by HETAC.
The acceptance of candidates with third class honours degrees and appropriate work experience and industrial certification on this course will be allowed provided there is evidence that the candidate can cope with the learning objectives of the course.
Candidates will be interviewed to assess their suitability to undertake the level of work required and to assess their commitment to succeding on the MSc in Computing Programme.
This course is about producing
postgraduate degree holders with
comprehensive knowledge, skills
and attitudes appropriate for careers
in Information Security and Digital
Forensics. The course is foucsed on
developing the student’s ability to deal with technical and logical problems by
analyzing the current industrial practices and investigating and researching
developments of future technologies.
Who Should Apply for the MSc in Computing at ITB?
The MSc in Computing programme is of particular value to holders of a primary degree in computing, IT, or equivalent, working as IT professionals at the level of the enterprise or as IT professionals. It is also of value to individuals with a computing degree background who wish to develop their career towards working within a research-oriented environment at a postgraduate level.
There are a large number of career
opportunities for success graduates from
this master’s programme. Graduates will
be knowledgeable and skills in areas of
digital forensics, secure networking and communications, biometrics, business
continuance and disaster recovery and cybercrime prevention. Graduates from
this programme now work in SAP, Google, HP, IBM, Intel, Microsoft, Rits, IDA and a wide range of SME businesses throughout Ireland.
Typical job titles are Information Security Crime Investigator/Forensics Expert,
System, Network, and/or Web Penetration Tester, Network Security Engineer,
Application Penetration Tester, Disaster Recovery/Business Continuity Analyst/
|Year 1 Semester 1|
|Year 1 Semester 2|
|Year 2 Semester 3|
|Year 2 Semester 4|
Students must complete 6 modules and a thesis. All Modules are 10 ECTS Credits. The MSc Research Project is 30 ECTS Credits.
The order of Module Delivery may differ from the listing above.
- Investigation of core security technologies and security policies to mitigate risks.
- Ability to review procedures for installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices.
- Knowledge of the technologies that underpin the deployment and maintenance of a secure network.
- Understand the requirements of industrial standards like ISO 27002 in compliance for securing computer networks.
- Implement, monitor and maintain a secure network consisting of enterprise level routers and switches
- Understand the role of AAA and IPSec in securing networks.
- Understand how to design and implement firewall technologies that complement network policies in securing the perimeter of a network.
- Describe methods for implementing authentication, data confidentiality and integrity such as Public Key Cryptography and the use of VPNs.
- How to develop a comprehensive security policy for any organisation
Cyber Crime Investigation
- Research into criminal activities on the Internet and computer crime legislation.
- Review the Computer Forensics Investigative Methodology
- Investigation of computer network intrusion activities and detection tools.
- Development of preventative measures to safeguard computers and their users.
- Develop skills in tracing illegal activity on computers.
- Understand the Forensics Investigative Procedures for gathering evidence
- Analyze the software tools and methods currently available for finding illegal activities on computer disks and in computer networks.
- Research the criminal activity on the Internet and available tools to prevent such activity.
Business Continuity and Disaster Recovery
- Analysis of IT failure modes and how such failures can be mitigated
- Research into disaster recovery technologies in an IT environment
- Development of tools and systems for building redundancy into IT systems
- Investigation of the role of high speed resilient network infrastructures in providing for business continuance
- Develop the knowledge required to analyze IT infrastructures and develop efficient plans for deploying system redundancy and disaster recovery technologies to meet business needs.
- Research mandatory business continuance requirements and data protection requirements for various industries and service providers.
- Investigate the design and implementation of strategies and systems for protecting critical information assets.
- Research various network technologies and topologies for system redundancy, resilience and high availability.
Secure Communications & Cryptography
- Identify vulnerabilities in data and voice communication systems
- Understand the different types of encryption processes available
- Learn how to secure data and voice communications systems
- Select a secure communications solution from range of possibilities based on system.
- Understand how to implement proper secure communications.
- Analyze existing technologies and future new technologies.
- Research vulnerabilities in systems and identify best solutions.
- Investigate the Digital Forensics Investigative Procedures
- Research how user activity can be tracked on a digital device
- Comparison of tools and techniques for digital forensics
- Develop skills in applying digital forensics investigation techniques
- Understand how information is stored and used on digital devices
- Analyze digital devices to establish user activity
- Research the development of new devices and technologies and how current digital forensics methods will apply to them.
- Cover a broad range of approaches to biometrics reflecting both fundamental principles and the current state-of-the-art practices.
- To develop an understanding of the fundamental components common to all biometric systems.
- To develop the student’s ability to design, implement, test and evaluate biometric systems that conform to international standards.
- To develop the students ability to carry out research in biometrics.
- Modern biometric technologies and the generic components of a biometric system.
- Pattern recognition and feature extraction in biometrics, Voice and face recognition systems.
- Understand ethical and legal issues associated with biometrics.
- Select the most appropriate biometric for a given application.
- Testing and evaluating biometric systems with standard test datasets.
- Work with signal and image acquisition systems, Deploying biometric systems.
- Complete documentation to accompany designed biometric systems.
- Defend proposed biometric systems in an oral presentation.
MSc Research Project :
This module aims:
- To give students the experience of an individual computing project at postgraduate level
- To give students responsibility for substantial independent working and a full project life cycle, from problem specification through to implementation and evaluation
Course Progression :
Successful graduates from the Master's Programme will be eligible to progress onto a Level 10 programme.
How to Apply ?
The closing date for receipt of completed applications is Tuesday 4th June 2013.
For further details please contact the marketing team on 01 885 1000 or e-mail: firstname.lastname@example.org.