COURSE INFORMATION

On this course, you will learn how to think like a hacker, and gain a deep understanding of security issues and concerns. The course introduces you to characteristics of cybercrime, security principles, technologies, and procedures to defend networks. You will understand how to develop security policies that comply with cyber security laws.

Reflecting rapidly growing business needs, you will learn procedures to implement data confidentiality, integrity, availability and security controls on networks, servers, and applications, building both technical and professional skills to pursue a career in cyber security.

  • Study & research skills
  • Communication
  • Problem solving
  • Knowledge of digital security
  • Digital forensics
  • Ethical hacking
  • Networking and computer hardware
  • One year full-time
  • Two years part-time
  • Computer architecture
  • Computer networking: concepts, practice and introduction to security
  • Computer programming
  • Data security
  • Digital forensics
  • Ethical hacking
  • Social engineering
  • Intrusion prevention systems
  • Scripting for security
  • Securing network devices
  • Working in cyber security
  • Professionalism and ethics in cyber security
  • Graded Unit (Exam)
  • One of the following: 
  • One Higher at Grade C or above in Computing Science, Maths, Graphic Communication or any Science/Technology subject; plus four National 5s at Grade C or above, including Core Skills Level 5 Literacy 
  • Foundation Apprenticeship: Information Technology: Hardware/System Support SCQF Level 6 plus four National 5s at Grade C or above 
  •  Advanced Certificate: Computing with Digital Media SCQF Level 6 
  •  Another relevant course at SCQF Level 6 
  •  Relevant industry experience and/or other qualifications will be considered on an individual basis
  • Cyber security analyst
  • Cyber security engineer
  • Cyber security consultant
  • Cyber security architect
  • Cyber security administrator
  • Security software developer
  • Cryptographer
  • Crypto analyst
  • Penetration tester
  • Ethical hacker
  • Digital forensics analyst
  • You may be required to take part in an informal conversation as part of the application process. This group/individual conversation may be an information session, a portfolio discussion, or a skills based exercise
  • You will be expected to bring a reference with you
  • In the case of Fife school leavers, the College will request a Transition Form from your school