infomatics institute of technology

“Equip yourself to fight cyber crimes”

All students will take the core modules, which are designed to give a comprehensive introduction to this specialist field. The course will cover basic digital forensics and network security, and computer system tools and the Linux/UNIX operating system. It will also deal with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines).

You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialize within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

infomatics institute of technology

Awarding University & Course Recognition

infomatics institute of technology

Awarded by the University of Westminster UK

infomatics institute of technology

Recognized by the University Grants Commission of Sri Lanka

Next Intake

January, 2025
Intakes

January/May/September

infomatics institute of technology

Duration

2 Years

(Part Time)

infomatics institute of technology

Entry Requirements

The minimum expected qualification is a good degree in a computing-related discipline from a recognised university.

If the first degree does not have a strong computing element, then work experience and other qualifications will be considered.

Applicants will also be subjected to an interview.

Apply Now

Associated Careers

  • Researcher in Applied Cryptography
  • Researcher in Network/Computer Security
  • IT Security Engineer
  • Computer Security Incident Responder
  • Source Code Auditor
  • IT Security Operations Specialist
  • Cyber Security Manager
  • Information Security Analyst
  • Information Security Consultant
  • Information Security Assurance Officer
  • Information Security Assurance Analyst
  • Information Security Risk Officer
  • Security Officer
  • Penetration Tester (also known as Ethical Hacker)
  • Vulnerability Assessor
  • Computer Forensics Analyst, Anti-Piracy
  • Content Protection Analyst
Core Modules
  • Principles of Digital Forensics
  • Network Security Management
  • Research Methods
  • Cyber Security and Forensics Project

  • Digital Forensics Pathway
  • Digital Forensics and Incident Response
  • Computer System Tools
  • Digital Forensics Applications

  • Cyber Security Pathway
  • Cyber Security Applications
  • Cyber Security Threats and Countermeasures
  • Information Security Governance and Compliance

Each module will be conducted through tutorials, lab-based sessions and lectures. The courses will be offered by highly experienced academic staff at IIT and industry experts in the subject. Assessments will be carried out through practical or research based course work.

Apply Now