Print Print Page | A | A | A

Course Details

Master of Science in Computing (Information Security & Digital Forensics)

Course code: BN518 Entry Route into programme:
  • Second Class Honours grade 2 (GPA 2.5 or equivalent) in a Bachelor of Science (Honours) in Computing (level 8) or graduate diploma or equivalent
Duration: 2 years (4 Semesters)
NFQ level: 9
Fee: €2,000 per year
Schedule: Tuesday and Thursday 6.00pm -10.00pm
Award title: Master of Science
Credits for Full Award: 90 @ NFQ Level 9
Awarding Body: ITB  

 This course has now been discontinued and has been replaced by BN528: MSc in Computing (Applied Cyber Security)



This course is about producing postgraduate degree holders with comprehensive knowledge, skills and attitudes appropriate for careers in Information Security and Digital Forensics. The course is focussed on
developing the student’s ability to deal with technical and logical problems by
analysing the current industrial practices and investigating and researching
developments of future technologies.


Who Should Apply for the MSc in Computing at ITB?

The MSc in Computing programme is of particular value to holders of a primary degree in computing, IT, or equivalent, working as IT professionals. It is also of value to individuals with a computing degree background who wish to develop their career towards working within a research-oriented environment at a postgraduate level.


Minimum Entry Requirements

The minimum entry requirement for standard entrants to the Master of Science in Computing is 2nd Class Honours Grade 2 (GPA 2.5 or equivalent), in a Bachelor of Science in Computing (level 8) course, or equivalent.

Students progressing through the Higher Diploma in Science in Computing (BN509) who wish to enter the M.Sc. in Computing must attain a 2nd Class Honours Grade 2 (GPA 2.5) on the course.

In the event of a student not attaining this standard level , students must achieve an acceptable standard for progression by other means approved by QQI.

The acceptance of candidates with third class honours degrees and appropriate work experience and industrial certification on this course will be allowed provided there is evidence that the candidate can cope with the learning objectives of the course.

Candidates may be interviewed to assess their suitability to undertake the level of work required and to assess their commitment to succeding on the MSc in Computing Programme.


Careers Opportunities

There are a large number of career opportunities for success graduates from this master’s programme. Graduates will be knowledgeable and skills in areas of
digital forensics, secure networking and communications, biometrics, business
continuance and disaster recovery and cybercrime prevention. Graduates from
this programme now work in Liberty IT, Deloitte, Grant Thornton, Ward Solutions, Integrity Solutions, SAP, Google, HP, IBM, Intel, Microsoft, Rits, IDA and a wide range of SME businesses throughout Ireland.
Typical job titles are Information Security Crime Investigator/Forensics Expert,
System, Network, and/or Web Penetration Tester, Network Security Engineer,
Application Penetration Tester, Disaster Recovery/Business Continuity Analyst/


ITB is also part of Information Security Ireland (ISI) - a central force in the field of Information Security promoting interaction with technology firms, research institutes, academia & government.


Year 1 Semester 1
  • Network Security
  • Cyber Crime Investigation
Year 1 Semester 2
  • Business Continuity and Disaster Recovery
  • Secure Communication and Cryptography
Year 2 Semester 3
  • Digital Forensics
  • Biometrics
Year 2 Semester 4
  • MSc Research Project


 Students must complete 6 modules and a thesis. All Modules are 10 ECTS Credits. The MSc Research Project is 30 ECTS Credits.

The order of Module Delivery may differ from the listing above.

An award of ‘Postgraduate Diploma in Science in Computing’ may be granted if learners leave this programme having completed 6 taught modules and attained 60 credits with a minimum GPA of 2.00.


Network Security

Module Aims:

  • Investigation of core security technologies and security policies to mitigate risks.
  • Ability to review procedures for installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices.
  • Knowledge of the technologies that underpin the deployment and maintenance of a secure network.

Learning Outcomes:

  • Understand the requirements of industrial standards like ISO 27002 in compliance for securing computer networks.
  • Implement, monitor and maintain a secure network consisting of enterprise level routers and switches
  • Understand the role of AAA and IPSec in securing networks.
  • Understand how to design and implement firewall technologies that complement network policies in securing the perimeter of a network.
  • Describe methods for implementing authentication, data confidentiality and integrity such as Public Key Cryptography and the use of VPNs.
  • How to develop a comprehensive security policy for any organisation


Cyber Crime Investigation

Module aims:

  • Research into criminal activities on the Internet and computer crime legislation.
  • Review the Computer Forensics Investigative Methodology
  • Investigation of computer network intrusion activities and detection tools.
  • Development of preventative measures to safeguard computers and their users.

Learning outcomes:

  • Develop skills in tracing illegal activity on computers.
  • Understand the Forensics Investigative Procedures for gathering evidence
  • Analyse the software tools and methods currently available for finding illegal activities on computer disks and in computer networks.
  • Research the criminal activity on the Internet and available tools to prevent such activity.


Business Continuity and Disaster Recovery

Module aims:

  • Analysis of IT failure modes and how such failures can be mitigated
  • Research into disaster recovery technologies in an IT environment
  • Development of  tools and systems for building redundancy into IT systems
  • Investigation of the role of high speed resilient network infrastructures in providing for business continuance

Learning outcomes:

  • Develop the knowledge required to analyse IT infrastructures and develop efficient plans for deploying system redundancy and disaster recovery technologies to meet business needs.
  • Research mandatory business continuance requirements and data protection requirements for various industries and service providers.
  • Investigate the design and implementation of strategies and systems for protecting critical information assets.
  • Research various network technologies and topologies for system redundancy, resilience and high availability.


Secure Communications & Cryptography

Module aims:

  • Identify vulnerabilities in data and voice communication systems
  • Understand the different types of encryption processes available
  • Learn how to secure data and voice communications systems

Learning outcomes:

  • Select a secure communications solution from range of possibilities based on system.
  • Understand how to implement proper secure communications.
  • Analyse existing technologies and future new technologies.
  • Research vulnerabilities in systems and identify best solutions.



Digital Forensics

Module aims:

  • Investigate the Digital Forensics Investigative Procedures
  • Research how user activity can be tracked on a digital device
  • Comparison of tools and techniques for digital forensics

Learning outcomes:

  • Develop skills in applying digital forensics investigation techniques
  • Understand how information is stored and used on digital devices
  • Analyse digital devices to establish user activity
  • Research the development of new devices and technologies and how current digital forensics methods will apply to them.



Module Aims:

  • Cover a broad range of approaches to biometrics reflecting both fundamental principles and the current state-of-the-art practices.
  • To develop an understanding of the fundamental components common to all biometric systems.
  • To develop the student’s ability to design, implement, test and evaluate biometric systems that conform to international standards.
  • To develop the students ability to carry out research in biometrics.

Learning Outcomes:

  • Modern biometric technologies and the generic components of a biometric system.
  • Pattern recognition and feature extraction in biometrics, voice and face recognition systems.
  • Understand ethical and legal issues associated with biometrics.
  • Select the most appropriate biometric for a given application.
  • Testing and evaluating biometric systems with standard test datasets.
  • Work with signal and image acquisition systems, deploying biometric systems.
  • Complete documentation to accompany designed biometric systems.
  • Defend proposed biometric systems in an oral presentation.



MSc Research Project :

This module aims:

  • To give students the experience of an individual major project at postgraduate level
  • To give students responsibility for substantial independent working and a full project life cycle, from problem specification through to implementation and evaluation



How to Apply ?

Apply Online Now



For further details please contact the marketing team on 01 885 1530 or e-mail:

What our students say...

Geri Wickham

"I have done a few software modules in ITB, so I knew the focus would be different if I came here. The practical experience here really helped me. Until I started doing Software, I was a complete technophobe. I was working as an engineer, but now I do more quality and IT. I work in a very small company, everybody has to do bits of everything, and I learnt a lot here, and it gave me great confidence."

Geri Wickham,
Computing Student

Area / Transport Map