Course Details

Course Code(s):
BSCYSEUPAD
Available:
Part-Time
Intake:
Autumn/Fall
Course Start Date:
September
Duration:
3 Years, Part-Time
Award:
Undergraduate
Qualification:
NFQ Level 8 Major Award
Faculty: Electronic & Computer Engineering, Science and Engineering
Course Type: Professional/Flexible
Fees: For Information on Fees, see section below.

Contact(s):

Name: Elaine.Butler
Email: apprenticeships@ul.ie Telephone: +353 (0)61 237798

Apply Now

Read instructions on how to apply

Brief Description

Next Intake: September 2024

Our Cybersecurity Practitioner Degree Apprenticeship was developed by Limerick for IT in partnership with the University of Limerick. 
Our industry consortia partners are integral to the success of this programme.

This Level 8 Executive Apprenticeship will equip you with in-demand practitioner skills and serves as a talent pipeline for industry. It is a three year work-based education programme which supports the development and knowledge base of cybersecurity practitioners in organisations. It provides a new and exciting career pathway if you are just starting out in industry or are already working there by fusing blended learning at the University of Limerick with real-world application and learning in the field.

You will learn how to develop systems using cognitive computing, the Internet of Things, cloud computing, computer forensics, data retrieval processes, and more. You will also be skilled at building security systems, analysing security breaches, and investigating and putting into practice crucial security measures.

Cybersecurity Practitioners are responsible for safeguarding the ever-growing amount of data collected and required by companies, monitoring networks and systems for intrusions, identifying security flaws and vulnerabilities, and recommending and implementing the appropriate tools and countermeasures.

For more information on how to apply, email apprenticeships@ul.ie.

Download Brochure

Video file

Security is paramount in all industries today, it is imperative that systems and processes are cybersecure from incursion.   Companies need cybersecurity practitioners to protect the computer and network from cyber-attack. The cybersecurity practitioner will be involved in the operation and maintenance of information security aspects (data integrity, availability, authentication, confidentiality, and non-repudiation). They will also be involved in the monitoring of network and systems for detection of intrusions, identifying security flaws and vulnerabilities, risk analysis, analysis of security breaches and the recommendation and installation of appropriate tools/countermeasures.  

Course structure:

The apprenticeship is a blended combination of on-the-job employer-based training and off-the-job training. The programme has been designed to be flexible to facilitate participation and to ensure the apprentice can minimise the amount of time away from work. Learning material will be delivered by a combination of academic subject matter experts and industry professionals. Programme content will be delivered both virtually and on campus. A combination of evening and day lectures and masterclasses will be scheduled this will require apprentices be released from work to be on campus 1 day per week during the semester to engage primarily in labs and tutorials. There is an emphasis on directed assignment work in each of the modules to allow participants to spend more time applying the concepts in the context of their own organisations. 

This immersed learning approach allows you to earn-as-you-learn whilst also developing highly-valued skills within the workplace.

Apprentices will be registered on the University of Limerick Virtual Learning platform where they will be able to access programme content, examination and assessment requirements, electronic library and on-line collaboration spaces.  

Year 1*

 

Autumn

Operating Systems 1

This module introduces multi-tasking operating system concepts. Topics include: processes, threads, memory management and file systems. Focus is on a single processor machine. The module will include a laboratory project. 

Computer Software 3

Introduction to algorithms and dynamic data structures (e.g. queue, trees, and dynamic arrays), software engineering practices, flow diagrams and class diagrams. Includes good software practice to develop a significant application. 

Modern Communications Fundamentals

An introduction to modern communication systems, definitions, concepts and communication standards. Both fixed and wireless systems and their fundamentals are discussed. This module introduces the student to modern communications business models and paradigms that are used in the industry today. 

Computer Network Standards, Protocols & The Internet of Things

The aim of this module is to provide further education in communications networks and a detailed overview of the main international networking standards. Includes an introduction to modern communications standardised infrastructures and the Internet of Things (IoT). Offers a learn-by-doing approach in communications and computer networks, for a better understanding of how networking technologies, mainly network protocols, operate in practice.  

Spring

Operating Systems 2

The study of multitasking operating systems. Study will be confined to single processor systems. A Unix or WIN-32 operating system will be selected as the prime example operating system. The module lab work will teach the student to develop concurrent program solutions. The module includes: concurrency, states, queues, scheduling. Process inter-communication. Memory management. File systems to support multitasking, File sharing, file protection, performance issues. Conditions for deadlock and solutions. I/O devices and device drivers. File security and protection. 

TCP/IP Networking

The aim of this module is to provide a detailed study of the TCP/IP model and the internet. The module also covers advanced topics in multimedia communications. 

Mobile & Wireless Communications

This module provides an introduction to mobile communications and mobile networking. At the completion of the module, students should have an understanding of the important issues in providing a mobile communications system including signal transmission, network management and interaction with a fixed network. Students should understand the principles of operation of a current mobile communications system and the potential for future services development.  

Summer

Reflective Learning Journal 1

Reflective Learning Journal  modules 1 to 6: Aims to enable students to reflect on their professional practice and associated learning in the context theories and practical applications studied across the modules within the programme. The module seeks to empower and challenge students to engage in self evaluation and reflection by prioritising their learning and development needs. 

Year 2

Autumn

Introduction to Security Cryptography

To introduce fundamental concepts of information and network security. To introduce the ideas of threats and vulnerabilities such as viruses, worms, malware etc. To introduce fundamental ideas in cryptography. To place them in their historical perspective. To provide an appreciation of approaches to preventing such attacks. 

Computer Law, Investigations & Ethics

With an overview of computer forensics technology, students will learn how to investigate, gather and preserve evidence related to computer crime. Begin to understand legal issues like: evidence integrity, chain of custody and admissibility. Gain a realistic perspective on the strengths and limitations of law enforcement with regards to digital crimes. Understand and apply accepted ethical practices with regards to computer usage - both personal and business. 

Reflective Learning Journal 2

Reflective Learning Journal  modules 1 to 6: Aims to enable students to reflect on their professional practice and associated learning in the context theories and practical applications studied across the modules within the programme. The module seeks to empower and challenge students to engage in self evaluation and reflection by prioritising their learning and development needs. 

 

Spring

Data Security

To introduce the concept of security services such as authentication, integrity and confidentiality. To introduce the role of digital signatures and their implementation using cryptographic ciphers. To introduce basic security protocols that provide security services. Attacks against security services: Replay attack, man in the middle attack. 

Introduction to Cloud Computing

An introduction to the concepts and practice of Cloud Computing including foundational technologies of the cloud, principles of secure cloud computing and an overview of cloud architectural principles. Cloud economic modes are also introduced here. 

Reflective Learning Journal 3

Reflective Learning Journal  modules 1 to 6: Aims to enable students to reflect on their professional practice and associated learning in the context theories and practical applications studied across the modules within the programme. The module seeks to empower and challenge students to engage in self evaluation and reflection by prioritising their learning and development needs. 

 

Summer

Reflective Learning Journal 4

Reflective Learning Journal  modules 1 to 6: Aims to enable students to reflect on their professional practice and associated learning in the context theories and practical applications studied across the modules within the programme. The module seeks to empower and challenge students to engage in self evaluation and reflection by prioritising their learning and development needs. 

 

Year 3

Autumn

Applied Cloud Computing

This module will give the student experience in the practice of Cloud Computing including aspects of cloud architecting and design, with developing in the cloud and/or operations in the cloud. In addition managing and securing services in the cloud will be discussed as will Cloud Computing Security Issues and resolutions related to security management and Access control issues. 

Introduction to Data Engineering & Machine Learning

To provide insight and grounding into information/data engineering and machine learning, the module will cover mathematical and coding skills essential to developing machine learning applications in Python and will provide an introduction to some advanced machine learning topics such as modern machine learning platforms, data visualisation, and deep learning. 

Project 1

The project is intended to give students the chance to study a topic in the field in depth and to apply his/her theoretical knowledge to their organisation.  

Reflective Learning Journal 5

Reflective Learning Journal  modules 1 to 6: Aims to enable students to reflect on their professional practice and associated learning in the context theories and practical applications studied across the modules within the programme. The module seeks to empower and challenge students to engage in self evaluation and reflection by prioritising their learning and development needs. 

 

Spring

Host & Network Security

The module provides an in-depth knowledge of host and network security including assessing the security of a network, recommending and implementing measures to prevent security threats, research and development of security audits, and conversant in current trends and methodologies. 

Computer Forensics

This module aims to give the student a firm understanding of the problems associated with computer forensics in relation to data recovery from digital media, whether the data was accidentally lost or deliberately destroyed. The student will learn to extract information from a computer which might be of relevance at a crime-scene using a variety of forensic techniques, tools and commands. 

Project 2

The module is a continuation of ET4927 Project 1. The project is intended to give students the chance to study a topic in the field in depth and to apply his/her theoretical knowledge to their organisation. 

Reflective Learning Journal 6

Reflective Learning Journal  modules 1 to 6: Aims to enable students to reflect on their professional practice and associated learning in the context theories and practical applications studied across the modules within the programme. The module seeks to empower and challenge students to engage in self evaluation and reflection by prioritising their learning and development needs. 

 

* Advanced entry into Year 2 will be possible for students who hold a relevant Level 7 qualification in an ICT related discipline and have relevant work experience).

 

Applicants for this programme must meet the following: 

  • Minimum academic requirements (or RPL) for the programme of study. – i.e. NFQ level 6 qualification in an ICT discipline or equivalent (60 ECTS) with relevant work experience or NFQ Level 6 ICT Associate Apprenticeship
  • Irish based with an Irish contract of employment with your registered employer for the duration of the programme of study (3 years)
  • Have company sponsorship / support
  • Ability to meet the necessary on the job learning requirements
  • Ability to undertake your studies alongside your employment. (attend campus 1 day per week) 
  • Meet the English language requirements as laid out by the University of Limerick

What to Include with your Application

  • Qualification transcripts and certificates
  • A copy of your birth certificate or passport
  • If your qualifications have been obtained in a country where English is an official language this will suffice
  • If this is not available, the following additional documents must be provided:
  • English translation of your qualification(s)/transcripts AND
  • English language competency certificate
  • Please click here for Further Information on English Language Requirements

Company Registration Process:  No Charge 
 
Online Student Application Fee: €50 
 
Annual Student Fee: €1,200  
 
*It should be noted that these fees are subject to change depending on the programme of study and external funders requirements 
 
For further information and how to apply email apprenticeships@ul.ie.  

Please click here for information on funding and scholarships.

Qualified candidates will be eligible to work with both technical and business functions across a range of technologies in the field of information and communications technology, working with either hardware or software as appropriate.  They will be able to apply their knowledge and skills in communications technologies, networks, IT Forensics, computers and computer-based applications, security in information technology, as required.