About the training
In this module students will learn how to locate and identify system vulnerabilities along with methods to identify potential vulnerabilities in a system design. The student will also learn methods to validate a system's security meets the organization's security needs.
In this module students will learn how to locate and identify system vulnerabilities along with methods to identify potential vulnerabilities in a system design. The student will also learn methods to validate a system's security meets the organization's security needs.
What you will learn
LO1 Critically evaluate the steps involved in defining a process to elicit and document organizational security requirements for a system design. LO2 Use threat modelling techniques to assess a system architecture identifying exploitable vulnerabilities in the design. LO3 Using appropriate tools perform a software security analysis, testing the security of a software system against an organizations requirement. LO4 Appraise current and emerging offensive security techniques. LO5 To present and prioritise security findings to potential stakeholders.
LO1 Critically evaluate the steps involved in defining a process to elicit and document organizational security requirements for a system design. LO2 Use threat modelling techniques to assess a system architecture identifying exploitable vulnerabilities in the design. LO3 Using appropriate tools perform a software security analysis, testing the security of a software system against an organizations requirement. LO4 Appraise current and emerging offensive security techniques. LO5 To present and prioritise security findings to potential stakeholders.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Anila Mjeda: Anila.mjeda@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Anila Mjeda: Anila.mjeda@mtu.ie