Diploma in Information Security and Computer Forensics

This is a two-year diploma program which equips graduates with knowledge and technical (practical) skills in computer forensics and information security.

The use of digital devices in all aspects of life is a new normal. Mobile phones, computers, mobile gad gets like iPads and laptops and a plethora of mobile storage devices has changed the way people share information and communicate. The growth of the Internet and world-wide-web has given to the growth of social networks that have changed the way people network and find new friends.

 This development of the cyber space also threatens our privacy and personal security. Technology has increased the scale and impact of cyber threats and attacks. Cybercrime cases are well documented:

Credit card fraud at banks. Websites getting hacked by unidentified criminals. Heart bleed bug affecting government websites and private ones alike. Increasing incident of money laundering on a global scale. These recent cases of cyber security breaches that made headlines are just a few examples of the alarming rise in Internet crimes.

Here is students’ opportunity to get on top of the new developments. Join the fight against cyber threats with our new Diploma in Information Security & Computer Forensics (ISCF), where you will be trained to be an IT security and forensics professional -a profession that is in demand now.

Students will build a strong foundation in the basics of IT and security in your first year with modules such as Fundamentals of Programming, Network Fundamentals, Networking Infrastructure, Databases, Cryptography, Vulnerabilities in detail and Operating System fundamentals.

In their second and final year, students will develop skills in the areas of network security, software security and digital forensics. They will earn to setup secured computer networks, develop secure software applications and investigate cybercrimes. They will also learn how to secure codes and processes that go into developing applications, so that they are protected from external threats right from the start. This is called the Security Development Lifecycle, and is a highly valued skill in the industry.

Thereafter, students will put your skills into practice by performing penetration tests on software, systems and networks, conducting in-depth forensic investigations on digital devices and networks, and analyzing malicious software, or malware. Students will get to practice our penetration testing and defense skills, as well as work on information security projects a tour computer forensics lab.

What's more, students will be co-opted on the Summit Consulting Ltd cyber team and if they perform well, be retained as one of the expert consultants and trainer.

1.1  Justification for the program

 The past few years have seen a significant focus on computer and network security as both an academic discipline and in the demands by industry for graduates with skills in this area. This qualification is likely to lead to employment in computer security and forensics related areas such as with public and private security agencies, computer companies, local police forces and other government agencies.

This set of courses will provide both theory and practice and will enable students to develop the knowledge and skills to:

  • Understand the theory behind key discipline sin computer forensics and information security

  • Have extensive understanding of security-based architectures

  • Design and build secure computer and network architectures

  • To manage a forensic case and to understand and perform detailed technical analyses of computer-based evidence

  • Develop skills in the use of tools to test and evaluate such systems.

1.2 Objectives of the program

The goal of the programme is to produce graduates with a specialization in computer forensics and information security and professional skills in computer and network forensics who will meet national and international demand by industry.

This diploma will provide both theory and practice and will enable students to develop the knowledge and understanding of the theory and principles under pinning computer security & forensics. Students will be able to:

  • understand the theory behind key disciplines in information security and forensics;

  • design and build secure computer and network architectures and to manage a forensic case;

  • understand and perform detailed technical analyses of computer-based evidence;

  • have extensive understanding of security-based architectures;

  • Develop skills in the use of tools to test and evaluate such systems.

 

1.3 Entry Requirements

 One principal pass at Advanced Level.

 1.4 Duration

 Two academic years