Cybersecurity is an essential need for a modern society in which information technology and services pervade every aspect of our lives. Cybersecurity has the fastest growth rate among all areas of IT, with the labour market encountering a severe workforce shortage in this field.

The aim of this programme is to provide learners with essential expert technical knowledge, competence and research skills of the most important technical concepts of cybersecurity and how they are applied in emerging areas such as device security and forensics.

The course is technical and practical in nature, uniquely embedded in industry, and develops in-depth expertise of core technical topics within the area of cybersecurity such as information security, secure programming, network security, penetration testing, malware analysis, IT law and ethics, and technologies and tools that support application and service vulnerability detection, incident detection, data and log retrieval and analysis. The course also provides a sharper focus into forensics and cloud security through the two specialisations that are offered to the learners.

Who is the course for?
This course is ideal for ICT professionals or graduates with an honours degree in computing/computer science or in a cognate area (STEM) that wish to develop a career as a cybersecurity professional; to take a leading technical or managerial role; to progress faster in their employment or to apply the knowledge in their current role. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered, based on relevant academic qualifications or extensive work experience.

As a graduate of this course you will be able to:

Critically assess and evaluate ethical, legal, privacy, sustainable, and governance issues associated with the management of data assets in the cybersecurity domain.

Communicate effectively complex and advanced cybersecurity concepts to a range of audiences in both written and verbal media.

Apply advanced security knowledge and utilise practical skills and technologies to design and implement cybersecurity solutions that address business and technical problems.

Make decisions and address security requirements through analytical thinking, communication, and interaction.

Analyse, identify, and document measures to address vulnerabilities, risks, weaknesses, and other safety aspects within a given cybersecurity context.

Identify knowledge gaps and undertake self-learning to acquire new knowledge and meet the requirements of the rapidly developing and expanding cybersecurity industry.

Conduct independent research in the cybersecurity area and formulate and implement novel ideas by applying the latest research methodologies and industry practices.

Subjects taught

Core Modules
• Network Security and Penetration Testing
• Security Fundamentals
• Data Governance, Ethics, and Sustainability
• Cloud Architectures and Security
• Cryptography and Blockchain
• AI/ML in Cybersecurity
• Business Resilience and Incident Management

Elective Modules
• Secure Web Development
• Forensics and eDiscovery
• Secure Application Development
• Malware Analysis

Note that there are dependencies between secure development electives. To study Secure Application Development in semester 2, students must have studied Secure Web Development in semester 1. However, all students can elect to study Malware Analysis in semester 2.

Research Elective
• Practicum
• Internship

Elective modules are subject to availability and a minimum number of students required to run a module.

Entry requirements

An honours (level 8) primary degree in computing or a cognate area with a 2.2 award or higher. Cognate area means a STEM (Science, Technology, Engineering, and Mathematics) degree that also has taught programming/application development related modules. Candidates are expected to have programming ability, which can be demonstrated through transcripts, recognised certifications, and/ or relevant work experience. An assessment and/or interview may be conducted to ascertain suitability if necessary, for candidates who do not meet the normal academic requirements.

The college operates a Recognition of Prior Experiential Learning (RPEL) scheme meaning applicants who do not meet the normal academic requirements may be considered based on relevant work and other experience. This may be assessed using a portfolio of learning, demonstration of work produced, and an interview. The programming ability of the applicant will also be assessed.

Non-English-speaking applicants must demonstrate fluency in the English language as demonstrated by an IELTS academic score of at least 6.0 or equivalent.

Laptop Requirement
This programme has a BYOD (Bring Your Own Device) policy. Specifically, students are expected to successfully participate in lectures, laboratories and projects using a portable computer (laptop/notebook) with a substantial hardware configuration. The minimal suitable configuration is 8GB of RAM (16GB are recommended); a modern 64-bit x86 multi-core processor (Intel i5 or superior); 250+ GB of available space in hard disk; WiFi card; and a recent version of Ubuntu, macOS, or Windows.

It is the responsibility of each student to ensure their computer is functioning correctly and that they have full administrator rights. NCI IT cannot provide support for these personal devices.

Some students may be able to avail of the Student Laptop Loan Scheme, subject to eligibility.

Application dates

Apply online.


Part-time Option:

2 years; 4 semesters with a final research project in an industry or academic environment

Blended: Livestream with some Campus Stream classes scheduled in advance.

Indicative Schedule:
Two evenings per week 18.00 to 22.00 and every second Saturday.

Full-time Option:

1 year; 3 semesters with a final research project in an industry or academic environment

Classes for this course will take place on-site at our IFSC campus.

Indicative Schedule:
Students need to be available 09.00 - 18.00 Mon – Fri (class days and times vary).

Post Course Info

Award and Progression
The Master of Science in Cybersecurity is awarded by QQI at level 9 on the National Framework of Qualifications (NFQ). Students who successfully complete this course may progress to a major award at level 10 on the NFQ. Students may also elect to exit early with a Postgraduate Diploma in Science in Cybersecurity at level 9.

Career Prospects
Several reports indicate shortage of skills and strong demand for cybersecurity professionals. The Expert Group on Future Skills Needs identified cybersecurity as a high-growth area that requires significant support for skills development. The State of the Cybersecurity Sector in Ireland 2022 Report indicates that there are almost 500 companies offering cybersecurity services or have employees in internal cybersecurity roles, and 83% of companies expect to grow their cybersecurity team over the next 12 months. This field has the fastest growth rate when compared with the rest of technology jobs. Considering the high demand of various types of jobs in the cybersecurity domain that currently exist in the market, graduates from this course may work in the following roles: information security analyst, secure application developer, cybersecurity tester, risk analyst / consultant, cyber incident responder, cloud security analyst, security researcher, etc.

More details
  • Qualification letters


  • Qualifications

    Degree - Masters (Level 9 NFQ)

  • Attendance type

    Full time,Part time,Evening,Daytime,Weekend,Blended

  • Apply to

    Course provider