Programme Overview
This course is being offered under the Springboard+ initiative for free for jobseekers and for a nominal fee for applicants in employment. See the Springboard+ tab for more information and to find out how to apply for this course.
Cybersecurity is an essential need for a modern society in which information technology and services pervade every aspect of our lives. The Cybersecurity field has the fastest growth rate while the labour market encounters a severe workforce shortage.
This course is ideal for ICT professionals or graduates with a level 8 degree on National Framework of Qualifications (NFQ), in computing/ computer science or in a cognate area (STEM) that wish to develop a career as a cybersecurity professional; to take a leading technical or managerial role; to progress faster in their employment or to apply the knowledge in their current role. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience. Candidates are expected to have programming ability.
Who is the course for?
This course is ideal for ICT professionals or graduates with a level 8 degree on the National Framework of Qualifications (NFQ), in computing/computer science or in a cognate area (STEM) that wish to develop a career as a cybersecurity professional; to take a leading technical or managerial role; to progress faster in their employment or to apply the knowledge in their current role. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience. Candidates are expected to have programming ability.
As a graduate of the course you will be able to:
• Conduct independent research and analysis in the Cyber Security domain including secure application design, development and testing within a given context e.g. Web, cloud computing, and forensic investigation.
• Demonstrate practical skills and expert knowledge of technologies and tools that support cryptanalysis, application and service vulnerability detection and patching, security incidents detection and log file analysis.
• Critically evaluate the design and implementation and evaluation of a research idea.
• Analyse and evaluate the legal, ethical and economic ramifications of developing secure applications and services.
• Communicate effectively to a range of audiences in both written and verbal media and undertake self-learning in order to acquire new knowledge.
Comment
Laptop Requirements
This programme has a BYOD (Bring Your Own Device) policy. Specifically, students are expected to successfully participate in lectures, laboratories and projects using a portable computer (laptop/notebook) with a substantial hardware configuration. Its minimal suitable configuration is 8GB of RAM (16GB are recommended); a modern 64-bit x86 multi-core processor (Intel i5 or superior); 250+ GB of available space in hard disk; WiFi card; and a recent version of Ubuntu, macOS, or Windows. It is the responsibility of the student to ensure their laptop is functioning correctly and that they have full administrator rights to the machine. NCI IT cannot provide support to personal devices.