About the training
In this module, the learner will evaluate information security and its importance in protecting the confidentiality, integrity, and availability of systems and information. The student will develop the skills to discern the different security needs of various stakeholders, evaluate the robustness of security designs, and design security controls to protect information assets.
In this module, the learner will evaluate information security and its importance in protecting the confidentiality, integrity, and availability of systems and information. The student will develop the skills to discern the different security needs of various stakeholders, evaluate the robustness of security designs, and design security controls to protect information assets.
What you will learn
LO1 Discern between the different obligations and requirements that an organization need to consider to protect the confidentiality, integrity and availability of
information.
LO2 Evaluate the engagement with information security at a governance level to achieve an organisation's sustainable protection of its information assets.
LO3 Assess and design security controls that should be considered as part of an overall Information Security Management (ISM) strategy.
LO4 Assess the role of Identity and Access Management (IAM) techniques as a method to control access to information assets.
LO1 Discern between the different obligations and requirements that an organization need to consider to protect the confidentiality, integrity and availability of
information.
LO1 Discern between the different obligations and requirements that an organization need to consider to protect the confidentiality, integrity and availability of
information.
LO2 Evaluate the engagement with information security at a governance level to achieve an organisation's sustainable protection of its information assets.
LO3 Assess and design security controls that should be considered as part of an overall Information Security Management (ISM) strategy.
LO4 Assess the role of Identity and Access Management (IAM) techniques as a method to control access to information assets.
LO1 Discern between the different obligations and requirements that an organization need to consider to protect the confidentiality, integrity and availability of
information.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie