0% found this document useful (0 votes)
351 views1 page

Diploma in Cyber Security Overview

This 11-week diploma in cyber security will be offered either fully online or on-campus, with intakes starting in April/June 2023. The course examines cyber security fundamentals, threats, and best practices over one evening per week. Fees are €965 for online study and €1,250 for on-campus, with promotional discounts potentially available.

Uploaded by

Daniel S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
351 views1 page

Diploma in Cyber Security Overview

This 11-week diploma in cyber security will be offered either fully online or on-campus, with intakes starting in April/June 2023. The course examines cyber security fundamentals, threats, and best practices over one evening per week. Fees are €965 for online study and €1,250 for on-campus, with promotional discounts potentially available.

Uploaded by

Daniel S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Duration: 11 weeks,

one evening per week


Delivery: Online, On-campus
Intakes*: April/June 2023
Fees**: Online - € 965
On-campus - € 1,250
*Contact us for next availability.
** Check our website or contact
our sales agents for information on
our current promotional offers

Diploma in Cyber Security


This diploma examines how the internet has grown as a global phenomenon over the past
twenty years, bringing with it the threat of crime in a variety of forms. Decision makers must
be familiar with the basic principles and best practices of cyber security to best protect their
enterprises, and digital assets. The programme will discuss the laws that are in use to try and
regulate the internet and assess the various threats posed by internet crime in its many varieties.

This course is suitable if you wish to obtain a broad understanding of cyber security. An
engineering or computing background is not required.

Course structure Information Continuity Plan


• Vulnerabilities and Controls Entry requirements management roles. Throughout his extensive
• Introduction to Information Security • Information Risk Management career, he has gained an expert knowledge
Fundamentals and Best Practices • Risk Response Development This course has been developed for of cybersecurity in financial services, higher
• Protecting Your Computer and Control those with little or no prior cyber and education and the healthcare sector.
and Its Contents • Security Policy, Compliance, digital security experience, but a desire to Thomas holds the following professional
• Securing Computer Networks — and Business Continuity understand appropriate approaches for risk qualifications: CISSP, HCISPP, CEH, C|CISO,
Basics of Computer Networking Theory • Cyber Incident Analysis management and best practices in relation to Security+, Network+, CCENT, MCA, MCP,
• Ethics in Cyber Security and Cyber Law and Response cyber and digital security. MCTS, PCIP, PCI-ISA, CISA, CISM, CRISC, CGEIT.
• Secure Communications and Information
Security Best Practices Career opportunities An engineering or computing background is
• Privacy Guidelines and not required to benefit from this course.
Safe Internet Usage • ICT Cyber Security Analyst
• Intellectual Property • Cyber Security Team Member/Lead Lecturer profile: Thomas Owen
• Professional Ethics • Advisory Consultant — Cyber Security
• Internet Fraud • Cyber Security Analyst Thomas has been working in information
• Cybercrimes • Cyber Security Engineer technology and security for over 20 years of
• Secure Software and Browser Security • Cyber Security Manager which 18 have been spent in supervisory and
enquiry@[Link]
• Cookies and Browser Storage +353 1 8075 055
• Managing a Business *More intakes available. Get in touch to find out more. [Link]

Diploma in Cyber Security
Entry requirements
This course has been developed for 
those with little or no prior cyber and 
dig

You might also like