Course Description

Master of Science in Cybersecurity Operations





The objective of the Masters in Cybersecurity Operations is to educate IT practitioners in responding to cyber-attack incidents. It examines the tools to identify threat actors. Models and frameworks are followed to manage the response. Data analytics can use tools such as machine learning to identify anomalies in organisational IT traffic.Cybersecurity Operations involves implementing secure architecture to defend against vulnerable systems. It can be considered the stage when risk and compliance has failed.This Masters provides a pathway for IT professionals to upskill in the area of cybersecurity operations. Developed in partnership with HPE, a learner can pursue a major L9 award through 4 x 10 credit taught modules and completing a 50-credit thesis.Why Study this course?Organisations implement security measures to mitigate against data loss. Risk and compliance controls implemented within an organisation often fail to protect the organisation. In such an event, cybersecurity operations attempt to respond to the incident and defend the compromised vulnerability.As well as the theoretical component of malicious compromises and vulnerable attack vectors, successful applicants will work on practical solutions to ensure secure IT infrastructure. Data analytics are a key component of providing secure operations and successful applicants will also use relevant programming platforms to visualise threat data, aiding incident response.This programme is developed in partnership with Hewlett Packard Enterprises (HPE) in Galway. The HPE Cyber Defense Center (CDC) offers world-class capabilities in operations, engineering, intelligence, and cybersecurity incident management.The taught modules are delivered in year one of the Masters and prepares the learner for independent, delt-directed thesis research in the domain of cybersecurity operations .Incident Detection & Response (10 Credits)When Risk & Compliance fails, an organization must respond to cyber incidents. All IT practitioners and security operations personnel need to have the skills to systematically neutralize a threat. These steps include identifying a threat, employing quarantine measures and implementing robust measures to mitigate against future compromises. Engineering models and frameworks such as Mitre ATT&CK are explored as a means of analysing organisational data, identifying mitigating threats.Programming for Data Analytics (10 Credits)Incident detection identifies threat actors operating within an organizations IT infrastructure. Using data analytic tools and machine learning, IT security personnel can forensically examine and identify anomalous activity, potentially being a malicious threat. Coding is an integral part of designing bespoke analytical tools and this module explores the programming languages necessary for data interpretation and visualisation. Secure Operations (10 Credits)An organization endeavours to secure its IT architecture against threats. Vulnerability management ensures elements of this architecture are configured and secured correctly. Implementing robust defences is the best method to mitigate against these threats. Preparedness for an incident is as important as incident response.Research Methods and Critical Analysis (10 Credits)Theoretical concepts, research paradigms and critical readings relevant to the field of academic or professional applied research will be explored. Epistemological and ontological considerations will be discussed in relation to research design and learners will reflect on the challenges of carrying out empirical social research in their particular workplace or specialist field of application. Students will reflect upon some of the ethical, societal and practical problems of data collection, including sampling, gaining access to the field, designing a research instrument and the principles of qualitative and quantitative analysis. The Thesis or Dissertation can be pursued in parallel with the year two modules and completed in year two.Thesis/Dissertation (50 Credits)This applied research thesis or dissertation module p…

The Master of Science in Cybersecurity Operations course at Atlantic Technological University (ATU Mayo) is listed in Courses.ie's national courses finder.
Training ProviderAtlantic Technological University (ATU Mayo)
Course LocationCastlebar, Mayo
Course TypeBlended Learning - Mix of Classroom & Online
Course QualificationMasters Degree
Course Duration2 years
Course TimePart-time
Course Fee7200
Entry RequirementsThe minimum entry requirements are a Level 8 qualification in an IT related discipline.
Career PathThis programme is aimed at IT professionals seeking to upskill/reskill in the domain of cybersecurity.
For more information about Atlantic Technological University (ATU Mayo), please visit our College page on Courses.ie by clicking here.

Course Provider

Atlantic Technological University (ATU Mayo)



ATU Mayo , Westport Road,, Castlebar, Mayo, Republic of Ireland. Eircode: F23 X853

Make Enquiry

Please insert your contact details and any additional information you require and we will forward your request to Atlantic Technological University (ATU Mayo)

    Captcha code        I confirm I have read the Cookie Information, Terms and Conditions and Privacy Policy and I agree to join the Courses.ie community.
     

    Map

    Atlantic Technological University (ATU Mayo)
    ATU Mayo , Westport Road,
    Castlebar, Mayo
    Republic of Ireland
    Visit Website