Micro-Credentials

Add description of micro-credentials here

Cybersecurity Standards & Risk

In this module students will learn about risk management processes with a particular focus on how to manage the risk related to the use, processing, storage, and transmission of data. Laws, regulations, controls, compliance and violations as it pertains to personal information and data are also included as part of this module.

Price

€625

Duration

13 Weeks

Apply Here

Cryptography & Protocols

Cryptography is integral to our online world and information systems. It is essential that when building these systems we understand the significance of the cryptographic applications we use. In this module the student will learn the fundamentals of cryptography and its application in security protocols. These protocols allow systems to achieve information security, privacy and trust. Students will learn the mathematics and cryptographic tools to analyse and understand the strengths and shortcomings of such security protocols and will develop an understanding of how to improve insecure systems.

Price

€667

Duration

13 Weeks

Apply Here

Secure Network Systems

Network security is the activity associated with the detection and prevention of unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. In this module, the learner will evaluate common cyber security threats and defense in depth techniques to defend against these threats. In particular, the module will provide the learner with the skills to apply and use various computer protection components such as Firewalls, VPN and Intrusion Detection and Response Systems (NIDRS) and security techniques such as zoning and encryption. At the end of this module the learner should have the ability to operate and interpret information collected from various network security equipment and network tools to implement a secure network architecture.

Price

€625

Duration

13 Weeks

Apply Here

Security Assurance

IT systems inherently have security vulnerabilities both within the individual software applications or at various integration points throughout the system. In this module students will learn how to locate and identify system vulnerabilities along with methods to identify potential vulnerabilities in a system design. The student will also learn methods to validate a system's security meets the organizations security needs.

Price

€625

Duration

13 Weeks

Practical Cryptography

Cryptography is an essential part of building secure and robust information systems and applications. In this module students will gain a hands-on understanding of practical cryptographic applications and their correct implementations in information systems. This will include an understanding of symmetric and asymmetric cryptography and hash functions.

Price

€625

Duration

13 Weeks

Secure Software Development

A Module focusing on secure software development practices and how they should be integrated throughout the software development life cycle. The module explores various pitfalls and mitigation techniques for software-based attacks and how to prevent the inclusion of such vulnerabilities in software.

Price

€625

Duration

13 weeks

Apply Here

Information Security Architecture

Module around information security and its importance in protecting the confidentiality, integrity and availability of systems and information. The student will develop the skills to discern between the different security needs of various stakeholders, evaluate the robustness of security designs and design security controls to protect information assets.

Price

€667

Duration

13 Weeks

Apply Here

Secure Network Services

This module is focused on the study of advanced system and network administration topics. Topics explored and implemented will include the setup and maintenance of many of the most popular network services including servers for DNS, LDAP and email (SMTP, POP3, IMAP). Special attention is paid to the concepts needed to implement these services securely and to the troubleshooting skills that will be necessary for real-world administration of these network services. At the end of this module learners should have the ability to operate, configure and secure various electronic communication systems, services and networks.

Price

€625

Duration

13 Weeks

Log Files and Event Analysis

Log files contain valuable information for infrastructure management as most malicious exploits and intrusions leave their fingerprints all over log files and system performance issues can be identified from analyzing specific log data. In this module, the learner will evaluate log files and learn tools to extract associated valuable data for detecting cyber threats and system performance issues. In particular, the module will provide the learner with skills to apply and use log file management tools, access log files, efficiently search log data using best practices. The learner will apply this knowledge to evaluate and implement YARA and Sigma rules for Indicators of Compromise (IoCs) and system information and event management tools. At the end of the module the learner should have developed a mindset for using log files for cyber security and incident investigation including system performance issues.

Price

€625

Duration

13 Weeks

Secure Systems Architecture

In this module the student will learn the key concepts and techniques employed in designing secure system architectures. The module will cover key technologies to be aware of, whilst imparting the learner with the ability to keep informed on emerging technologies.

Price

€667

Duration

13 Weeks