About the training
Graduates from the programme will be equipped with the understanding of how digital forensics is an essential part of breach response and legal investigations as well as in depth understanding of malware behaviour and reverse engineering.
Graduates from the programme will be equipped with the understanding of how digital forensics is an essential part of breach response and legal investigations as well as in depth understanding of malware behaviour and reverse engineering.
What you will learn
Learning Outcomes
1. Gain knowledge of advanced theoretical and practical knowledge and skills relevant to digital forensics investigation and malware analysis.
2. Develop a capacity to critically appraise forensics methodologies based on the needs of the investigation and legal and ethical considerations.
3. Learn how to apply state-of-the-art tools and techniques effectively to conduct a comprehensive forensic investigation.
4. Identify and respond to emerging cybersecurity threats, selectively applying appropriate strategies and solutions.
5. Analyse and document a wide variety of cybersecurity intrusions and deploy investigation and reporting measures appropriate to that scenario.
Learning Outcomes
1. Gain knowledge of advanced theoretical and practical knowledge and skills relevant to digital forensics investigation and malware analysis.
2. Develop a capacity to critically appraise forensics methodologies based on the needs of the investigation and legal and ethical considerations.
3. Learn how to apply state-of-the-art tools and techniques effectively to conduct a comprehensive forensic investigation.
4. Identify and respond to emerging cybersecurity threats, selectively applying appropriate strategies and solutions.
5. Analyse and document a wide variety of cybersecurity intrusions and deploy investigation and reporting measures appropriate to that scenario.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr Hazel Murray: Hazel.murray@mtu.ie