About the training
Designed to provide the experienced Systems Architect with the cybersecurity skills needed to design Secure IT Systems.
This pathway provides in-depth knowledge of cryptographical algorithms and protocols providing the learner with detailed knowledge in order to assess the correct type and usage of cryptography.
Designed to provide the experienced Systems Architect with the cybersecurity skills needed to design Secure IT Systems.
This pathway provides in-depth knowledge of cryptographical algorithms and protocols providing the learner with detailed knowledge in order to assess the correct type and usage of cryptography.
What you will learn
Learning Outcomes
1. Evaluate advanced concepts in applying secure systems architecture principles to the design and assessment of enterprise information technology architecture.
2. Investigate cybersecurity theories and identify their limitations.
3. Develop skills and tools for securing enterprise IT architecture and select appropriate strategies to solve related problems.
4. Test security of IT systems to effectively, diagnose and solve related issues.
Learning Outcomes
1. Evaluate advanced concepts in applying secure systems architecture principles to the design and assessment of enterprise information technology architecture.
2. Investigate cybersecurity theories and identify their limitations.
3. Develop skills and tools for securing enterprise IT architecture and select appropriate strategies to solve related problems.
4. Test security of IT systems to effectively, diagnose and solve related issues.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie