Postgraduate Diploma in Network and Information Security
Managing and maintaining network and information security is an essential aspect for the development of the global economy and is crucial to the success of all companies, particularly in the current climate.
Managing and maintaining network security poses a huge challenge for businesses today and is forcing them to look for next-generation security solutions to contain cyber threats, with the result that there has been a 40% increase in cybersecurity vacancies over the past two years. Security is perceived as one of the key challenges of mobility, with a higher number of devices and connected endpoints increasing organisations' exposure to cyberthreats.
This postgraduate diploma prepares students with computing backgrounds for employment in the IT industry with a specific focus on addressing these networking and information security challenges.
Why Study Network and Information Security at Griffith College?
Designed specifically to address a growing need in the industry, the Postgraduate Diploma in Network and Information Security at Griffith College is a fully-funded* one-year programme, delivered part-time over three semesters, which aims to enable students to develop robust and efficient network security plans, strategies and solutions. During the course, you will:
- All classes are available online with the opportunity of some face-to-face weekend workshops (pending social distancing restrictions).
- Obtain specialist knowledge and skills essential for a career in network security.
- Establish an analytical mindset necessary for independent academic and professional research.
- Gain a practical understanding of how to identify industrial requirements of computer network security and analyse security risks.
- Develop a team player attitude necessary to communicate problems, ideas and solutions to all levels of the industrial team.
- Build upon your knowledge of supporting topics in the area of network and information security.
- Delivered from Limerick but available to applicants nationwide.
- Delivered part-time over 12 months
- Small class sizes
- Access to state-of-the-art facilities
- A dedicated experienced lecturing Team
- Industry guest speakers
The next intake for this course will be:
*subject to sufficient numbers.
This module serves to significantly deepen the learners’ research skills, both in relation to their module-related assignments and later in the completion of their major dissertation / dissertation by practice. Specifically, it extends their abilities as self-directed learners by equipping them with the appropriate vocabulary for reflecting on, critiquing and evaluating their own work and that of others. Throughout the module, they are required to engage in a number of research methodologies and current research issues and trends in computing science. The module also addresses the need for critical project management skills and techniques for the successful delivery of any project.
This module aims to give the learner an understanding of the issues relating to the management of information security in modern industry. It explores the roles, policies and procedures applied in information security. The module further explores the specific role that software systems play in the threat against information security.
This module aims to provide the learner with an understanding of the issues involved in the design and analysis of telecommunication networks, as well as a knowledge of such systems in terms of physical implementation, protocols, routing algorithms, management, software interfaces, and applications. The course also focuses on high speed telecommunication networks.
This module aims to provide the learner with an understanding of Digital Forensics and the tools and techniques used in investigations that involve digital evidence. The learner gains an in-depth knowledge of all aspects of digital forensics including methodologies on how to conduct a forensics investigation, the best practice to employ throughout (the course of) an investigation and the tools required to conduct such an investigation.
Learners are also exposed to recent high-profile cases involving digital evidence and future trends through the review of current academic papers and/or professional industry reports.
This module aims to provide the learner with the knowledge and understanding of the legal and ethical issues surrounding information and information security, privacy and data protection. The module gives the learner an understanding of Irish and international information relating laws. The learner also focuses on the legal and ethical aspects of computer crimes and their investigations, and the issues relating to intellectual property. The module does not aim at having the learner becoming an expert in legal matters but will make the learner aware of legal responsibilities and the ability to recognise when a lawyer is required.
This module aims to furnish the learner with a mastery of the core aspects of computer communication security. This module gives the learner mastery of security models, policies and mechanisms, encryption and decryption, confidentiality, integrity, authentication, cryptography and secure communication, digital signatures, certificates and coding. The learner will gain in-depth knowledge of the classical techniques as well as state of the art approaches to cryptography.
This course aims to provide the learner with the knowledge of the technologies that are used to protect computer networks as well as those used to infiltrate and attack them. This course of study gives the learner mastery of a variety of how such technologies can be used in attacking or protecting networks.
This module aims to provide the learner with an understanding of what IT infrastructure is, how to protect it and the role Ethical Hacking plays in this regard.
Learners develop an understanding of the key mechanisms (ACLs, firewalls, IDS/IPS etc.) that can be employed to protect an IT infrastructure and how to use them in tandem to maximise protection. They will also obtain an in-depth knowledge of the primary methodologies (top-down, bottom-up etc.) that are used to protect IT infrastructure and knowledge of the different forms of Ethical Hacking and exposure to the tools and techniques that are used to perform same.
You can download our Academic Calendar here.
How to Apply
Candidates applying for this course should have a 2.2 Level 8 Honours degree or above in Computing Science, or a 2.2 Higher Diploma in Computing or related discipline or international equivalent and/or relevant work experience.
Griffith College is accepting the online Duolingo English Test (DET) as valid proof of English proficiency. Please see here for further details.
Non-EU/Non-EEA applicants please note:
These Irish Government-funded programmes are only available to Non-EU/Non-EEA applicants who are currently resident in Ireland with an Immigration Stamp 4/Stamp 4 EU FAM, who have been living in Ireland with a valid Stamp 4/Stamp 4 EU FAM for 3 out of the last 5 years. The period of residency for holders of Stamp 4/Stamp 4 EU FAM is calculated from the date of receipt of the Stamp 4/Stamp 4 EU FAM.
How to Apply
To apply for the MSc in Network and Information Security please submit an online application.
A member of our admissions team will then be in contact with you to request to following documents:
A copy of your undergraduate degree transcripts
A copy of your passport or driving licence