Print Print Page | A | A | A

Course Details

Bachelor of Science in Computing in Digital Forensics and Cyber Security

Course code: BN311 Entry Route into programme:
Higher Certificate in Computing (NFQ Level 6) or equivalent
Duration: 1 year Part time (2 semesters)
NFQ level: 7
Fee: € 3,500
Schedule: Tuesday , Wednesday & Thursday 6.00pm - 10.00pm
Award title: Bachelor of Science
Credits for Full Award: 60 @ NFQ Level 7
Awarding Body: ITB  

Minimum Entry Requirements

The minimum entry requirement for standard entrants is a level 6 award in Computing.

Aim

Covering areas of computer and networking technology with emphasis placed on security and forensics and how this is applied to business needs. The objective of the course is to deepen the knowledge of subject areas by expanding on the fundamentals concepts. This year will focus on the Digital Forensics and Security of Information and introduce the students to working as teams where they will develop a project integrating knowledge from different modules.

Course Structure

ITB recognises the need for graduates with computer NFQ Level 6 Higher Certificate
qualifications who are currently working in the IT industry to return to college to
complete a level 7 award. As such, this offer of an add-on course of the 3rd year
with an entry requirement of level 6 (or higher) in computing. This course will be
delivered in a flexible manner (blended learning, workshops, remote delivery, block release) to enable graduates in the workforce to upgrade their qualifications while keeping their daily jobs.

Course Content

Semester 1 Semester 2
  • Computer & Network Forensics
  • Secure Communications
  • Secure Programming 1
  • Penetration Testing
  • Network Security
  • Secure programming 2
  • Web Application Security
  • Group Project
Computer & Network Forensics

The purpose of this module is provide learners with the essential skills for carrying out a Computer and Network Forensics Investigation. The steps include identifying, acquiring, examining, analysing and the presentation of digital evidence stored in computers, external hard drives, memory sticks and network storage devices. This evidence can be in the form of documents, images, emails, user profiles and log files.

The module covers the need of law enforcement agencies, insurance companies, compliance officials, information security departments, lawyers, solicitors, auditors, courts, tribunals and private investigators to search for digital evidence hidden in various data storage devices. Discovery/ disclosure of data by securing and searching all data sources with the intent of using them as evidence in civil, corporate or criminal legal cases. Other aims of the module is to review software systems that are used to operate digital devices, including operating systems, file management systems and applications. To cover best practice in the forensics techniques of data identification and extraction using commercial and open-source forensics tool kits. To cover best practice in network traffic monitoring and network log analysis and reporting.

Secure Communications

This module on secure communications will develop the knowledge and skills in the student to master the basics and identify the need for secure communications, to identify the vulnerabilities in data communication systems, to understand the different types of encryption processes available and to describe how best to secure data in transit.

Penetration Testing

Prepare students to conduct successful penetration testing and ethical hacking projects. Give students the skills of proper planning, scoping and reconnaissance, scanning, target exploitation, password attacks, and wireless and web applications with detailed hands-on exercises and practical tips for doing the job safely and effectively. Give students the skills to conduct a penetration test against a sample target organisation.

Network Security

Students will gain an introduction to core security technologies as well as how to develop security policies and mitigate risks. Specifically the student will secure routers and switches and their associated networks. Skills learned will include installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices. Furthermore they will gain a competency in the technologies that underpin the deployment of a secure network.

Group Project

The aim of this module is to provide students with an opportunity to undertake a group computing project with full system life cycle from proposal to deliverable. This activity will train students in the essential skills of team working, creative thinking and best practices so that they will understand how to conduct themselves professionally in a development group.

The Group Project will help students to consolidate knowledge obtained in their chosen area of study, and to integrate learning and skills acquired from life experience. We aim to provide the supporting environment for the student so that they may develop intellectually, be capable of independence, and have a high self-esteem and be able to demonstrate this through written and oral communication skills as required in each work phase of their project.

Secure Programming 1

This module will develop a mastery of processes and models underpinning secure software development, help the student to gain an insight into the inherent security drawbacks in various programming languages and architectures. The module also will investigate best practices in the adoption of secure coding practices.

Secure Programming 2

This module will develop the practical skill sets needed for secure software development, help the student to gain an insight into developing secure code. Investigate best practices in the use of code analysis and debugging.

Web Application Security

Modern cyber defense requires a realistic and thorough understanding of web application security issues. This module will enable students to capably assess a web application's security posture and convincingly demonstrate the impact of inadequate security that plagues most organisations. Students will come to understand major web application flaws and their exploitation and, most importantly, learn a field-tested and repeatable process to consistently find these flaws and convey what they have learned to their organisations.

How to Apply ?

Apply Online Now

 

For further details please contact the Marketing team on 01 885 1530 or e-mail: info@itb.ie.



What our students say...

Pearse Lynch

"The college is fun and I'm really happy with the course, the fact that there is a lot of practical in it and not all just theory… the practicals are very good – it's very hands on."

Pearse Lynch,
Computing Student

Area / Transport Map