Skip to main content
CyberSkills | Building Irelands Cyber Security Skills
  • Study
    • Overview
    • Pathways
    • Microcredentials
    • Module Search
  • Explore
    • News
    • Blog
    • Cyber Security Sector Report
    • Events
  • About Us
    • About
    • Contact Us
    • Cyber Futures
    • Project Team
    • Our Lecturers
  • For Students
    • Student Hub
    • FAQ
    • Term Calendar
    • Timetable
    • Useful links

Defensive Security

  1. Cyber Skills
  2. Study
  3. Module Search

Our "Certificate in Cyber Defence Forensics" provides a comprehensive look into the crucial role of digital forensics in breach responses and legal investigations, equipping graduates with insights into malware behaviour and reverse engineering. Our "Certificate in Secure Network Operations" is designed for Networking Professionals who wish to gain a deep understanding of network security protocols, enhancing their capabilities to manage networks securely and adeptly handle cyber-attacks through log file and event analysis. A selection of 11 micro credentials for these courses, allows for a customised learning experience in the defensive security domain. Join us and stand at the forefront of cyber defence. 

All our courses and modules are part-time and online, ensuring they seamlessly integrate with your work schedule and lifestyle. You can read more about them below.

Certificate in Cyber Defence Forensics
Image for Certificate in Cyber Defence Forensics

Understand how digital forensics is an essential part of breach response and legal investigations

Certificate in Secure Network Operations
Image for Certificate in Secure Network Operations

Certificate in Secure Network Operations is designed to enhance Networking Professionals skills with those required to securely manage networks.

Computer Forensics
Image for Computer Forensics

In this module students will learn how to identify, collect and preserve digital evidence on different operating systems.

Cryptography & Protocols
Image for Cryptography & Protocols

Students will learn the mathematics and cryptographic tools to analyse and understand the strengths and shortcomings of such security protocols.

Cybersecurity Standards & Risk
Image for Cybersecurity Standards & Risk

Students will learn about risk management processes with a focus on how to manage the risk related to the use, processing, storage, and transmission of data.

Log Files and Event Analysis
Image for Log Files and Event Analysis

The learner will evaluate log files and learn tools to extract associated valuable data for detecting cyber threats and system performance issues.

Malware Behaviour Analysis
Image for Malware Behaviour Analysis

Malware analysis is used as part of a forensic investigation to understand the behaviour and purpose of malware which is designed to cause harm or exploit any programmable device.

OT/ICS Networks & Protocols
Image for OT/ICS Networks & Protocols

The aim of the module is to provide knowledge, skills and abilities related to communication networks and protocols used in Operational Technology.

Professional Diploma in OT Security Operations Specialist
Image for Professional Diploma in OT Security Operations Specialist

Learn the necessary awareness, business and technical, knowledge, skills and abilities to protect their business against cybersecurity threats.

Secure Network Services
Image for Secure Network Services

At the end of this module learners should have the ability to operate, configure and secure various electronic communication systems, services and networks.

Secure Network Systems
Image for Secure Network Systems

The learner will evaluate common cyber security threats and defense in depth techniques to defend against these threats.

Secure OT/ICS Networks
Image for Secure OT/ICS Networks

The aim of the module is to enable students to understand the differences between IT and OT security risks, the impacts of user's behaviour and how to establish a Cyber Security Ma

Vulnerability Analysis
Image for Vulnerability Analysis

A vulnerability assessment analyst performs assessments within the network environment and identifies where those systems/networks deviate from acceptable configurations.

We'd love to hear from you!

Reach out via any of the channels below

Find a course

Pathways

Microcredentials

Contact Us

Contact

info@cyberskills.ie


Social

  • Facebook Icon Find us on Facebook
  • Instagram Icon Find us on Instagram
  • Twitter Icon Find us on Twitter
  • LinkedIn Icon Find us on LinkedIn
  • YouTube Icon Find us on YouTube
Sign Up For Our Newsletter Receive offers, industry news and information about courses!
We safely secure your data.

© CyberSkills 2023