About the training
In this module, the learner will evaluate common security threats and defense-in-depth techniques to defend against these threats. In particular, the module will provide the learner with the skills to apply various computer protection components such as Firewalls, VPNs, Intrusion Detection and Response Systems, and security techniques such as zoning and encryption.
In this module, the learner will evaluate common security threats and defense-in-depth techniques to defend against these threats. In particular, the module will provide the learner with the skills to apply various computer protection components such as Firewalls, VPNs, Intrusion Detection and Response Systems, and security techniques such as zoning and encryption.
What you will learn
LO1 Evaluate Network Security Architecture and Defense in Depth (DiD) techniques to ensure the security of a network against a range of cyber security attacks.
LO2 Assess, configure and use a firewall to protect a network against a range of attacks.
LO3 Appraise, configure and use a Network Intrusion Detection and Response Systems (NIDRS) with the aim of protecting a network against various forms of
attacks.
LO4 Explain, install and configure Virtual Private Network (VPN) technology.
LO5 Critically access the use of encryption to protect sensitive data and issues related to key management.
LO1 Evaluate Network Security Architecture and Defense in Depth (DiD) techniques to ensure the security of a network against a range of cyber security attacks.
LO2 Assess, configure and use a firewall to protect a network against a range of attacks.
LO3 Appraise, configure and use a Network Intrusion Detection and Response Systems (NIDRS) with the aim of protecting a network against various forms of
attacks.
LO4 Explain, install and configure Virtual Private Network (VPN) technology.
LO5 Critically access the use of encryption to protect sensitive data and issues related to key management.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr George O’Mahony: GeorgeD.OMahony@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr George O’Mahony: GeorgeD.OMahony@mtu.ie