fbpx
4.33
(3 Ratings)

Level 5 Diploma in Computing with Cyber Security

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Course Title:

NCC Level 5 Diploma in Computing (with Cyber Security) (L5DC CS)

Mode of Study: Online

Duration:

  • Full-time: 1 year
  • Part-time: 2-3 years

Start Dates: Registration throughout the year

Awarding Institution:

NCC Education

Language of Study:

English

Programme Overview: The NCC Education Level 5 Diploma in Computing (with Cyber Security) (L5DC CS) makes up the second year of the NCC Education degree journey. This builds upon the knowledge gained during the Level 4 Diploma in Computing (L4DC) or the Level 4 Diploma in Computing (with Business Management) (L4DC BM).

This qualification is designed to develop the specialist skills necessary to protect and secure data systems from ever-increasing threats in today’s evolving digital society.

Entry Requirements:

For entry onto the NCC Education L5DC CS course, students must have at least one of the following:

  • NCC Education Level 4 Diploma in Computing (L4DC) or the Level 4 Diploma in Computing (with Business Management) (L4DC BM).
  • A local or international qualification deemed to be of a similar level to the NCC Education L4DC or L4DC BM qualifications. This must be agreed with NCC Education in advance.

If a potential student’s first language is not English, they must also meet the English language requirements of either:

  • International English Language Testing System (IELTS) minimum score of 5.5 or above.
  • Alternatively, take the free NCC Education Higher English Placement Test, which is administered by our Accredited Partner Centres.

Programme Structure: Students are required to complete six units comprising five core units and one of two elective units.

Core Units:

  1. Business IT Project: Provides practical experience in developing system solutions to open-ended problems derived from the real world.
  2. Information Systems Analysis: Equips students with tools to analyze the function and requirements of information systems.
  3. Network Security Threats and Defence Mechanisms: Provides students with skills to eliminate or reduce risks associated with network vulnerability.
  4. Computer Forensics and Incident Investigation: Understanding the investigation requirements of cybercriminals, including acquiring, inspecting, and reporting information across computer networks.
  5. Ethical Hacking and Information Security Assessments: Understanding ethical hacking and its essential elements, such as information security, hacking techniques, and risk management.

Elective Units:

  1. Analysis, Design and Implementation: In-depth knowledge and experience in the use of object-oriented techniques for software development.
  2. Professional Issues in IT: Highlights professional issues in the development, deployment, and maintenance of computer systems.

Assessment Strategy:

Assessment includes:

  • Coursework: Assignments and projects make up a significant part of the assessment.
  • Examinations: Formal exams assess knowledge and understanding.

Formative assessments provide feedback throughout the course to help students improve, while summative assessments contribute to the final grade.

Learning Outcomes:

Upon successful completion of the program, students will be able to:

Knowledge & Understanding:

  • Demonstrate an understanding of advanced IT and cybersecurity concepts.
  • Apply principles of cybersecurity in various scenarios.
  • Understand and apply techniques in network security and information systems analysis.

Cognitive & Intellectual Skills:

  • Analyze and solve complex cybersecurity and IT problems.
  • Use effective study and research skills to gather and evaluate information.
  • Apply critical thinking in cybersecurity-related situations.

Practical & Professional Skills:

  • Communicate effectively in both written and verbal forms.
  • Use advanced computing and cybersecurity techniques in professional applications.
  • Demonstrate competency in designing, developing, and managing IT security projects.

Transferable Skills:

  • Develop effective study habits and time management skills.
  • Work collaboratively in team settings.
  • Utilize critical thinking and problem-solving skills in various professional contexts.

Career and Professional Development:

Graduates of the Level 5 Diploma in Computing (with Cyber Security) can progress to:

  • The final year of a degree with NCC Education, such as:
    • BSc (Hons) Business Computing and Information Systems Top-up Degree, validated and awarded by the University of Central Lancashire (UCLan)
    • BSc (Hons) Computing Top-up Degree, awarded by the University of Greenwich
  • Alternatively, they can pursue careers in the IT industry, such as cybersecurity analyst, network security consultant, IT auditor, or digital forensic analyst.

Support for Student Learning:

Students will have access to:

  • Personal Tutors: Available for guidance and support.
  • Learning Resources: Online libraries, tutorials, and study materials.
  • Discussion Forums and Live Sessions: For interaction with peers and instructors.

Total Qualification Time: 1,200 hours (including 438 Guided Learning Hours)

Show More

What Will You Learn?

  • Computer Forensics And Incident Investigations
  • Ethical Hacking And Information Security Assessments
  • Information Systems Analysis
  • Network Security Threats And Defence Mechanisms
  • Business IT Project
  • Analysis, Design And Implementation
  • Professional Issues In IT

Course Content

Computer Forensics and Incident Investigation

  • ASPEN Document Portal

Ethical Hacking and Information Security Assessments

Information Systems Analysis

Network Security Threats and Defence Mechanisms
By studying this Unit you will gain a detailed understanding and the ability to function in real life situations involving network defence. You will gain the technical depth required to actively design a secure network in an organisation. This Unit gives you the fundamental understanding of the construct of data transfer, network technologies and software technologies so that you understand how networks operate.You will learn how to protect, detect and respond to network attacks. You will learn network defence fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. The Unit covers the protect, detect and respond approach to network security. The program contains hands-on lab sessions, based on major network security tools and techniques.

Business IT Project

Analysis, Design and Implementation

Professional Issues in IT

Student Ratings & Reviews

4.3
Total 3 Ratings
5
2 Ratings
4
0 Rating
3
1 Rating
2
0 Rating
1
0 Rating
4 years ago
I like what I see, thanks for this :)
5 years ago
Very good course, great structure, really easy to follow. Have gone back and forth many times to check on some issues arising on my site. Also very handy to see what kind of plugins are available to serve different purposes.
5 years ago
Excellent feel good fit for my I study and install accounting software. However wow a lot of stuff covered here. For me great. For a lot of others beginners may be a little over whelming. Again for me extremely helpful. I study software in chunks.
Select your currency
AED United Arab Emirates dirham
×

Hello!

Click one of our contacts below to chat on WhatsApp

× How can we help you?