Explore UCD

UCD Home >

COMP47850

Academic Year 2024/2025

Trends in Cybersecurity (COMP47850)

Subject:
Computer Science
College:
Science
School:
Computer Science
Level:
4 (Masters)
Credits:
5
Module Coordinator:
Dr Shen Wang
Trimester:
Spring
Mode of Delivery:
Blended
Internship Module:
No
How will I be graded?
Letter grades

Curricular information is subject to change.

The Trends in Cybersecurity module will cover modern research approaches and technology trends in cybersecurity. The topics to the module will be constantly updated on a yearly basis. Example topics of the module include:
- blockchain technologies
- ransomware analysis and defence
- large language models (LLM) for cybersecurity
- Secure software development lifecycle and security DevOps
- secure network protocol for internet of things (IoT)
- adversarial machine learning

About this Module

Learning Outcomes:

• Identify and acquire new knowledge about modern security trends and technologies
• Critically identify and explain the main novelties and and applications of modern security trends and technologies
• Assess strengths and limitations of modern security trends and technologies

Indicative Module Content:

There are three face-to-face workshop sessions
- brief introduction to the recommended trends/topics for cybersecurity;
- students presentations on their work-in-progress research against the chosen cybersecurity topic;
- providing peer review feedbacks to the essay submissions guided by lecturers.

Recorded lectures include methodologies (e.g., reading, writing, and presenting) for conducting literature review on frontier research topics.

Student Effort Hours:
Student Effort Type Hours
Specified Learning Activities

6

Autonomous Student Learning

80

Online Learning

14

Total

100


Approaches to Teaching and Learning:
active/task-based learning; peer and group work; critical writing; enquiry & problem-based learning; debates; case-based learning; student presentations

Requirements, Exclusions and Recommendations
Learning Requirements:

To attend this module students should have successfully passed the following modules
- Information Security
- Leadership in Security
- Privacy and Compliance
- Risk Assessment and Security Standards
- Secure Software Engineering
- Applied Cybersecurity
- Network Security
- Incident Response


Module Requisites and Incompatibles
Pre-requisite:
COMP47800 - Leadership in Security, COMP47870 - Incident Response, COMP47880 - Network Security, COMP47890 - Applied Cryptography, COMP47900 - Cyber Risk Assessment&Standard, COMP47910 - Secure Software Engineering, COMP47920 - Information Security, LAW42160 - Cybersecurity Law


 

Assessment Strategy  
Description Timing Component Scale Must Pass Component % of Final Grade In Module Component Repeat Offered

Not yet recorded.


Carry forward of passed components
Yes
 

Remediation Type Remediation Timing
In-Module Resit Prior to relevant Programme Exam Board
Please see Student Jargon Buster for more information about remediation types and timing. 

Feedback Strategy/Strategies

• Feedback individually to students, post-assessment
• Group/class feedback, post-assessment
• Peer review activities

How will my Feedback be Delivered?

Feedback will be provided in different ways: - Group feedback will be provided to students after their presentations and essay submissions. - Peer review feedback will also be provided in relation to the presentation and essay

Name Role
Dr Anca Delia Jurcut Lecturer / Co-Lecturer
Dr Liliana Pasquale Lecturer / Co-Lecturer