Programme content

Module/date Objective and topics 
 Module 1

 Introduction to cyber security concepts

Objective: To gain an understanding of the key concepts, trends and threats in cyber security today and the concepts of identify, protect, detect, respond and recover. 

Topics covered:
1. What is cyber security and why the big fuss?;
2. Is there a difference between information, security and cyber security?;
3. Current trends in cyber and cyber-enabled crime;
4. Government initiatives;
5. Recent examples of the impact of cyber attacks


Cyber risk management

Identify, Protect and Detect in more detail;
Learn how to adopt a risk based approach to cyber security and develop proportionate strategies.

Topics covered:

  1. Governance and organisation including key roles and responsibilities;
  2. Information risk frameworks and implementing proportionate measures;
  3. A risk-based approach to cyber security management; understanding the relationship between assets, threat actors and threat vectors;
  4. Defence in Depth: protecting from the perimeter and establishing a cyber security posture;
  5. Protective monitoring and proactive security.
  6. Mobile device security and other trending issues.

 Module 2

Cyber security responses 

Objectives: Respond and recover;
Understand the different approaches to maintain security, including the role of business continuity as a key control. 

Topics covered:

  1. Cyber security maturity models;
  2. The importance of business continuity planning;
  3. Anatomy of a breach – when and why controls fail;
  4. Breach readiness; developing response and escalation plans.
  5. Audit and assurance – continuous review during “business as usual”

Introduction to forensic IT 

Objective: To give all participants an understanding of the forensic IT process that can be used to investigate all manners of cyber crime. 

Topics covered:

  1. Introduction to Digital Evidence types;
  2. An overview of digital evidence collection strategies;
  3. Introduction on how to interrogate digital evidence.


 Module 3

Introduction to cyber crime 

Objective: To gain an understanding of what exactly cyber crime is as well as some of the strategies employed by cyber criminals. 

Topics covered:

  1. Introduction to the different types of cyber crime
  2. Types of Malware
  3. The hacking process

Introduction to Windows forensics 

Objective: To illustrate to students some of the key forensic artefacts that exist on a Windows computer, and how to interrogate that information.

Topics covered:

  1. Overview of Windows forensic artefacts;
  2. How to analyse a selection of forensics artefacts;
  3. Introduction to a selection of forensic tools to extract and analyse data from forensic artefacts.
   Introduction to cyber incident response and analysis

Objective:To provide students with a background on how cyber incidents are managed.

Topics covered:

  1. An overview of incident response methodologies;
  2. Introduction to data analytics.

Module 4


Introduction to Data Protection Law 

Objective: To gain an understanding of the origins of the laws of privacy and data protection, how these concepts differ and the current laws governing data protection in Ireland. 

Topics covered:

  1. Data protection v privacy;
  2. Irish and EU legislation;
  3. Core definitions;
  4. Why data protection is important.

The principles of data protection 

Objective: To develop a clear understanding of the core principles of data protection; the obligations on data controllers and processors and the rights of data subjects. 

Topics covered:

  1. Data protection obligations;
  2. Eight principles of data protection;
  3. Case studies.

Privacy and data protection policies 

Objectives: To gain an insight into how data protection policies and procedures, when built into the foundations of an organisations' operations, will help ensure compliance with data protection obligations; the objectives and content of data protection audits and impact assessments to determine levels of compliance; the security measures required to protected personal data from cyber-attacks. 

Topics covered:

  1. Privacy by design;
  2. Data protection audits;
  3. Data Protection Officers;
  4. Privacy impact assessments;
  5. Data protection policies;
  6. Security measures;
  7. Compliance

Data protection and cyber security 

Objective: To examine the hypothesis that the implementation of data protection principles in a cyber security policy can act as a proxy to reduce cyber threats. 

Topics covered:

  1. National Cyber Security Strategy 2015-2017;
  2. ODPC Personal Data Security Breach Code of Practice;
  3. Criminal Justice (Offences Relating to Information Systems) Act 2017;
  4. Data protection and cyber security policies.

General data protection regulation 

Objectives: To develop and understanding of the key changes that the GDPR will introduce; how GDPR will impact on data protection obligations, data subjects rights, data security and compliance efforts. 

Topics covered:

  1. General Data Protection Regulation (“GDPR”)