Secure Network Systems

The learner will evaluate common cyber security threats and defense in depth techniques to defend against these threats.

Information Security Architecture

Students will learn about information security and its importance in protecting the confidentiality, integrity and availability of systems and information.

Cryptography & Protocols

Students will learn the mathematics and cryptographic tools to analyse and understand the strengths and shortcomings of such security protocols.

Secure Software Development

This module focuses on secure software development practices and how they should be integrated throughout the software development life cycle.

Cybersecurity Standards & Risk

Students will learn about risk management processes with a focus on how to manage the risk related to the use, processing, storage, and transmission of data.

Security Architecture

Students will learn the key concepts and techniques employed in designing secure system architectures.

Practical Cryptography

Students will gain a hands-on understanding of practical cryptographic applications and their correct implementations in information systems.

Log Files and Event Analysis

The learner will evaluate log files and learn tools to extract associated valuable data for detecting cyber threats and system performance issues.

Security Assurance

Learn how to locate and identify system vulnerabilities along with methods to identify potential vulnerabilities in a system design.

Secure Network Services

At the end of this module learners should have the ability to operate, configure and secure various electronic communication systems, services and networks.

OT/ICS Networks & Protocols

The aim of the module is to provide knowledge, skills and abilities related to communication networks and protocols used in Operational Technology.

Future Focused Professional Portfolio 1

This module provides learners with an opportunity to demonstrate independent and self-determined learning through the creation of their individual portfolio.

Future Focused Professional Portfolio 2

This module provides learners with an opportunity to demonstrate independent and self-determined learning through the creation of their individual portfolio.

Secure OT/ICS Networks

The aim of the module is to enable students to understand the differences between IT and OT security risks, the impacts of user's behaviour and how to establish a Cyber Security Ma

Vulnerability Analysis

A vulnerability assessment analyst performs assessments within the network environment and identifies where those systems/networks deviate from acceptable configurations.

Evasion and Defense Analysis

This module will utilize purple teaming to develop evasion and detection skills to maximize the cyber capabilities of the learner.

Penetration Testing

Penetration Testing is the authorized process of attacking a computer system to evaluate the security of the system by identifying and verifying security weaknesses.

Security Web Penetration Testing

This module explores various web penetration testing techniques and industry-standard tools.

Cyber Security Awareness

Cybersecurity awareness is the process of educating a workforce on the various threats that exist, how to recognise them, and the steps to take to keep themselves protected.

Cyber Security for Business

This module covers how cybersecurity impacts a business and what a business needs to do to prepare against a cyberattack.

Practical Cybersecurity

In this module, learners will be provided practical skills necessary to secure their networks, data devices, cloud security, VPNs, website security, cell phones, and more.

Computer Forensics

In this module students will learn how to identify, collect and preserve digital evidence on different operating systems.

Cyber Crime and Digital Forensics

As part of this module learners will be introduced to the topic of digital forensics and key laws and legislation related to the e-discovery process.

Malware Reverse Engineering

This module teaches students the skills and toolsets required for in-depth investigations of modern malware and understanding what malicious impacts it can have on systems.

Malware Behaviour Analysis

Malware analysis is used as part of a forensic investigation to understand the behaviour and purpose of malware which is designed to cause harm or exploit any programmable device.

Cyber Security Law and Regulations

The aim of the module is to enable students to be aware of Security Standards and associated laws and regulations for Information Technology (IT) convergence.

A micro-credential is a short, accredited module of learning.

Our Cyber Skills Micro-Credentials are 5-10 credits and can be used towards a major award. If you are looking to gain specific knowledge or skills in an area of Cyber Security, this may be the best option for you.  

For further information on our pathways and micro-credentials don’t hesitate to contact us at: info@cyberskills.ie