View all Courses
Cybersecurity Operations
Master of Science
Course Details
Course Code | GA_KCYGC_V09 |
---|---|
Level | 9 |
Duration | 2 years |
Credits | 90 |
Method of Delivery | Blended |
Campus Locations | Mayo |
Mode of Delivery | Part Time |
Course Overview
Organisations implement security measures to mitigate against data loss. Risk and compliance controls implemented within an organisation often fail to protect the organisation. In such an event, cybersecurity operations attempt to respond to the incident and defend the compromised vulnerability.
As well as the theoretical component of malicious compromises and vulnerable attack vectors, successful applicants will work on practical solutions to ensure secure IT infrastructure. Data analytics are a key component of providing secure operations and successful applicants will also use relevant programming platforms to visualise threat data, aiding incident response.
This programme is developed in partnership with Hewlett Packard Enterprises (HPE) in Galway. The HPE Cyber Defense Center (CDC) offers world-class capabilities in operations, engineering, intelligence, and cybersecurity incident management.
When Risk & Compliance fails, an organization must respond to cyber incidents. All IT practitioners and security operations personnel need to have the skills to systematically neutralize a threat. These steps include identifying a threat, employing quarantine measures and implementing robust measures to mitigate against future compromises. Engineering models and frameworks such as Mitre ATT&CK are explored as a means of analysing organisational data, identifying mitigating threats.
Incident detection identifies threat actors operating within an organization’s IT infrastructure. Using data analytic tools and machine learning, IT security personnel can forensically examine and identify anomalous activity, potentially being a malicious threat. Coding is an integral part of designing bespoke analytical tools and this module explores the programming languages necessary for data interpretation and visualisation.
An organization endeavours to secure its IT architecture against threats. Vulnerability management ensures elements of this architecture are configured and secured correctly. Implementing robust defences is the best method to mitigate against these threats. Preparedness for an incident is as important as incident response.
Theoretical concepts, research paradigms and critical readings relevant to the field of academic or professional applied research will be explored. Epistemological and ontological considerations will be discussed in relation to research design and learners will reflect on the challenges of carrying out empirical social research in their particular workplace or specialist field of application. Students will reflect upon some of the ethical, societal and practical problems of data collection, including sampling, gaining access to the field, designing a research instrument and the principles of qualitative and quantitative analysis.
The Thesis or Dissertation can be pursued in parallel with the year two modules and completed in year two.
This applied research thesis or dissertation module p…
Recommended Study Hours per week
Examination and Assessment
On-Campus Attendance Requirement
Note: Check programme Examination and Assessment requirements, as they may involve examinations to be taken on campus.
Progression
Download a prospectus
Entry Requirements
Careers
Design, Configuration, Maintenance and Monitoring of different Linux, Windows Servers, Network devices.
AWS Cloud, Azure Cloud and Office 365 management.
Basic database administration
Quickly arrange repair for hardware in occasion of hardware failure
End Point Device and Patch management and device OS rollouts.
Manage backup and recovery.
Implement the policies for the use of the computer system and network.
Setup security policies for users. A system administrator must have a strong grasp of computer security (e.g. firewalls and intrusion detection systems).
Identity management in local AD and cloud services.
Participate in incident response and threat triage ensuring all incidents are brought to complete mitigation and/or closure.
Document and maintain threat alerts, procedures, analysis, and investigations accurately.
Perform root cause analysis and review complex attacks and threats – reconcile them against multiple sources and identify where a potential incident may have occurred.
Participate in technology and policy implementation, tuning and oversight of new threat processes and procedures across all insider threat technologies executed in the firm, particularly in cutting edge analytics space.
Further Information
Who Should Apply?
Contact Information
Dr Seamus Dowling
Programme Chair
ATU Galway Mayo
E: seamus.dowling@atu.ie
T: 094 9043251
Computer Science & Applied Physics