Note: As a subsidiary of
Te Pūkenga - New Zealand Institute of Skills and Technology
, UCOL Te Pūkenga is committed to providing the best learning outcome for you. As part of this, all programmes are currently being reviewed to make them portable, consistent, and closely aligned with the needs of the industry. When published, this course information is correct, but the courses offered may change over time.
This programme consists of 120 Credits. The courses include;
Information System Security (15 Credits)
Learners will analyse the fundamental concepts in information system security and the impact of cyber law and regulations on the organisation’s operations. After this course, you will be able to:
- Analyse the security requirements of an organisation’s information system using information management principles.
- Analyse the impact of different types of security risks on the operations of an organisation’s information system.
- Analyse the impact of the legal, privacy, and ethical factors on an organisation’s information system security decisions.
- Apply personal and communication skills to present information system security essentials.
Cryptography (15 Credits)
Learners will learn the concepts of cryptography and analyses the mechanisms to manage access to sensitive data in an organisation. After this course, you will be able to:
- Analyse different security algorithm designs to meet an organisation’s security objective(s).
- Analyse the design concepts of data integrity and authentication mechanisms to support an organisation’s security requirements.
- Apply key management and distribution approaches to secure remote services.
- Analyse access models to manage sensitive data access according to an organisation’s security requirements.
Network Security (15 Credits)
Learners will analyse different attacks targeting an organisation’s network, as well as the security mechanisms to protect the network against these attacks. After this course, you will be able to:
- Analyse network protocols that are essential for an organisation’s operations.
- Assess different cybersecurity attacks on network services.
- Analyse security mechanisms at different network layers to meet an organisation’s security requirements.
- Apply interpersonal skills to manage network security efficiently.
Cybersecurity Management (15 Credits)
Learners will analyse the requirements of cybersecurity management within an organisation and applies cybersecurity frameworks to manage risks. After this course, you will be able to:
- Apply cybersecurity frameworks to assess cybersecurity risks in an organisation, and communicate the results to decision-makers.
- Analyse the effects of security governance on an organisation’s information system operations and its stakeholders.
- Apply professional and ethical practices in cybersecurity management.
Ethical Hacking and Testing (15 Credits)
Learners will analyse and apply different methods to perform hacking ethically and implement security mechanisms to protect the organisation’s information system. After this course, you will be able to:
- Analyse penetration methodologies to plan and design ethical hacking processes.
- Apply legal and organisational regulatory requirements in ethical hacking and testing.
- Apply ethical hacking tools to exploit vulnerabilities in an organisation’s information system.
- Assess, select, and implement security approaches and controls to support the organisation’s operations.
Cybersecurity Data Analysis (15 Credits)
Learners will analyse and apply the cybersecurity incident handling process and techniques in an information system to manage cybersecurity breaches. After this course, you will be able to:
- Analyse data collection methods to monitor cybersecurity events.
- Analyse security operation processes to monitor, detect, handle, and report cybersecurity incidents.
- Identify and apply cybersecurity incident handling techniques to manage cybersecurity breaches.
Cybersecurity Project (30 Credits)
Learners will research, analyse, select, and apply a range of tools and techniques to develop a solution to a cybersecurity problem. Wherever possible, learners should implement a project on behalf of a client. After this course, you will be able to:
- Analyse business requirements to identify potential cybersecurity vulnerabilities and weaknesses.
- Apply cybersecurity risk assessment to develop a project plan to produce a cybersecurity solution.
- Assess and select cyber technologies to implement and validate cybersecurity solutions to meet business requirements.
- Apply project management tools and techniques to manage the project efficiently.
- Apply critical thinking skills to produce an innovative and timely solution for a cybersecurity project.
- Apply professional and ethical practices to work effectively and efficiently for quality outcomes.
- Apply communication skills to collaborate and present project development life cycle to relevant stakeholders.