Print Print Page | A | A | A

Course Details

Bachelor of Science (Honours) in Computing in Digital Forensics and Cyber Security

Course code: BN420 Entry Route into programme:         Level 7 Award in Computing
Duration: 1 year Part time (2 semesters)
Fee: €3,675
NFQ level: 8
Method of application: ITB
Schedule: Monday , Wednesday, Thursday 6.00pm - 10.00pm
Award title: Bachelor of Science (Honours)
Credits for Full Award: 60 @ NFQ Level 8
Awarding Body: ITB  


Minimum Entry Requirements

The minimum entry requirement for standard entrants is a level 7 award in computing.


The purpose of this degree is to equip students with the skills and knowledge to embark upon a rewarding career in the Information Security industry. Digital information technology has made significant strides in recent years and the impact of this has transformed how organisations do business through the widespread adoption of communication such as the Internet, digital video, mobile computing and telecommunications, USB and solid state storage devices, multimedia and interactive TV. Criminal elements have been quick to see the potential in accessing personal and corporate data using information technologies vulnerabilities and the
opportunity of anonymous remote access.

Information security has become an essential element of organisation structure to minimise the risk to corporate data and to protect company reputation in an increasing volatile information technology world.

Course Structure & Delivery

This course is aimed at graduates from the BN311 degree at ITB and at graduates with level 7 or higher qualifications who are currently working in the information security industry. This course will be delivered in person during the evenings to enable graduates in the workforce to upgrade their qualifications while keeping their daily jobs.

All course material is available online through Moodle facility including lecture notes and exercises.

Classes are delivered each week in person but exercises/lab work can be done on students own laptop using software applications / license key provided by the college.  Most exercises are report based.

We expect some attendance in the college as this promotes a class networking and companion experience for the student but attendance is not compulsory.


Course Content

Semester 1
  • Mobile Device Forensics
  • Business Continuity Management & Cloud Security
  • Application Security
Semester 2
  • Advanced Network Security
  • Biometrics and Forensics Applications
  • Scripting & Data Processing
  • Individual Project



Mobile Devices Forensics:

Module Aims :

The purpose of this module is: to provide learners with the skills to identify the correct forensics procedures in an investigation, especially the analysis of mobile device contents and networked applications. The module also examines the security vulnerabilities of communication devices and applications.

Business Continuity Management & Cloud Security

Module Aims :

The purpose of this module is to provide students with the knowledge and skills to:

  • Understand the value of business continuity and disaster recovery planning.
  • To perform effective business continuity and disaster recovery planning for a business.
  • Understand the relationship and dependencies between IT governance, risk management and compliance in the modern business.
  • To incorporate IT GRC information in the business continuity management plan.

Throughout the module, students will learn:

  1. The various types of IT failure modes, and methods of mitigating such failures.
  2. Business continuity and disaster recovery technologies and tools for IT environments.
  3. Tools and and mechanisms for building redundancy into IT systems.
  4. The role of high speed resilient network infrastructures in supporting business continuity. Amazon AWS will be used as a case study to demonstrate the important role the Cloud will have in the future of business continuity and disaster recovery. For example, how S3 and Glacier can be used as backup solutions.
  5. How to identify the appropriate organisational structures processes and controls for IT governance and risk management * existing rules and regulations for compliance and future possible legislation governing compliance and its effects.


Application Security

Module Aims:

Develop the essential skills required to assess web application security and to apply an appropriate solution where necessary. Gain an insight into the processes and models underpinning development of secure web applications. Investigate best practices in the adoption of secure web application practices.

Advanced Network Security

Module Aims:

Teach students to identify the threats against network infrastructures and build defensible networks that minimise the impact of attacks, as well as understand how to recognise and respond to attacks.

Biometrics and Forensics Applications

Module Aims:

This module aims to introduce the student to the fundamentals of biometrics and to develop an appreciation of the practical issues in using biometric systems in information security. The aim is to develop skills to the level required to competently select, deploy, test and administer a biometric system.


Individual Project

The project provides students with an opportunity to undertake a substantial, individual computing project and take responsibility for a full system life cycle. The project enables students to consolidate and further their chosen area of study, and to integrate knowledge and skills acquired from other studies. The project team aims to motivate and support students in their intellectual development, and the development of their independence, confidence and self-esteem.

The project also provides a vehicle for the development of students’ written and oral communication skills. Other aims for the project are to give students the experience of the stages of the system life cycle, including project implementation, evaluation, review, testing and final analysis, to allow students to prepare for and undertake an oral presentation and defense of their system and project experiences, to provide an opportunity for students to research and write a thesis describing and defending their system research, life cycle and evaluation, and finally to provide students with the opportunity to document their learning experiences, and reflect upon the problems, solutions and challenges of a substantial individual project.


Scripting & Data Processing

Module Aims :

The purpose of this module is: to provide students with the knowledge and skills to perform data collection and processing. Students will be given grounding in the principles and practice of awk, perl, bash, and python scripting to parse, sort and process data. They will also be introduced to statistics with an emphasis on data collection, presentation and interpretation.


How to Apply ?



For further details please contact the marketing team on 01 885 1530 or e-mail:

What our students say...

Pearse Lynch

"The college is fun and I'm really happy with the course, the fact that there is a lot of practical in it and not all just theory… the practicals are very good – it's very hands on."

Pearse Lynch,
Computing Student

Area / Transport Map