![](https://road2cyber.eu/uploads/course_1723025663.jpg)
About the training
Graduates from the programme will be equipped with the understanding of how digital forensics is an essential part of breach response and legal investigations as well as in depth understanding of malware behaviour and reverse engineering.
Graduates from the programme will be equipped with the understanding of how digital forensics is an essential part of breach response and legal investigations as well as in depth understanding of malware behaviour and reverse engineering.
What you will learn
Learning Outcomes
1. Gain knowledge of advanced theoretical and practical knowledge and skills relevant to digital forensics investigation and malware analysis.
2. Develop a capacity to critically appraise forensics methodologies based on the needs of the investigation and legal and ethical considerations.
3. Learn how to apply state-of-the-art tools and techniques effectively to conduct a comprehensive forensic investigation.
4. Identify and respond to emerging cybersecurity threats, selectively applying appropriate strategies and solutions.
5. Analyse and document a wide variety of cybersecurity intrusions and deploy investigation and reporting measures appropriate to that scenario.
Learning Outcomes
1. Gain knowledge of advanced theoretical and practical knowledge and skills relevant to digital forensics investigation and malware analysis.
2. Develop a capacity to critically appraise forensics methodologies based on the needs of the investigation and legal and ethical considerations.
3. Learn how to apply state-of-the-art tools and techniques effectively to conduct a comprehensive forensic investigation.
4. Identify and respond to emerging cybersecurity threats, selectively applying appropriate strategies and solutions.
5. Analyse and document a wide variety of cybersecurity intrusions and deploy investigation and reporting measures appropriate to that scenario.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie
![](../dist-front/images/Group 130.png)
Certificate
Yes (based on specific standards, recognised by national/international organizations)
![](../dist-front/images/Group 130.png)
Price
1000€ +
![](../dist-front/images/Group 130.png)
Level
Post-entry (upskilling - reskilling)
![](../dist-front/images/Group 130.png)
Teaching Method/s
Online
![](../dist-front/images/Group 130.png)
Duration
3+ months
![](../dist-front/images/Group 130.png)
Discount
Yes
![](../dist-front/images/Group 130.png)
Type
Postgraduate
![](../dist-front/images/Group 130.png)