Skip to Content

PGC Level 7 Diploma in Cyber Security

INFORMATION TECHNOLOGY PROGRAMS

Post-Graduate Certificate
Level 7 Diploma in Cyber Security

                   


Course Overview


Level 7 Diploma in Cyber Security is a postgraduate-level programme designed for learners seeking to deepen their expertise in advanced cyber security domains. This diploma equips learners with the critical knowledge, practical skills, and strategic understanding needed to lead cyber security initiatives across both private and public sectors.


Through intensive study of network security, cryptography, digital forensics, and governance frameworks, learners develop strong competencies to tackle complex threats, build secure systems, and ensure regulatory compliance. The course also supports progression to a full Master’s degree via university partnerships.

Entry Requirements


Applicants must:


Be aged 20 or over


Hold a Level 6 qualification or equivalent


In some cases, relevant industry experience may be considered in lieu of formal qualifications


If English is not the applicant’s first language, an IELTS score of 6.0 (or equivalent) is required


Provide two references, one of which should preferably be academic


Complete a successful interview with the approved centre


Qualification Structure

This diploma requires completion of 4 mandatory units and 4 optional units, totalling 120 credits and 1,200 Total Qualification Time (TQT) hours.


🔒 Mandatory Units


Fundamentals of Cyber Security
• SMART Objectives

• Cyber security threats, risks and vulnerabilities, threat landscape and attack vectors

• System vulnerabilities

• Legal responsibilities

• Physical security measures

• Software and hardware

• security measures Various Obstacles

• Delivery formats

• Network types

• Network components

• Networking infrastructure services and resources

• Importance of training staff on cyber security


Network, Infrastructure and Systems Security

• Research methodologies

• Networking principles

• Firewalls, VPN, and Firmware

• Access logs

• Baselines and assurance

• Firmware updates

• End user device security

• Malware and Anti-virus protection

• Identify security weaknesses and focus on them

• End-point protection

• Security designs and related principles

• Internet and cloud computing/infrastructure


Applications of Cyber Security

• Limit the damage

• Disruption of attacks

• Restore operations

• Facing a cyber-security breach demands swift

• Strategic action to safeguard your assets, operations, and reputation

• Total costs

• Network trafficking

• Operating systems

• Incident resolution

• Task creation and management

• Human factors when securing networks and applications


Security Management and Governance

• Data breaches

• Malware

• Cyber threats

• Attach vectors

• Zero-day vulnerabilities

• SQL injections

• Network infrastructure

• Emerging threats

• Legal compliance

• Data reports

• Data protection

• Record keeping

• Key standardised approaches and the fundamental importance of a risk-based

approach


🧩 Optional Unit Example


Cryptography
• Backup and Restore

• Disaster Recovery

• Data Backup Solutions

• Data Replication and Data Restoration

• Backup Strategy

• Point-in-Time Recovery

• Data Loss Prevention

• Risk Tolerance

• Business Impact Analysis

• Security Risk Assessment

• Cyber-security Risk Management

• Risk Mitigation Strategies

• Risk Management Policies

• Risk Management Frameworks in Cyber-security


*Additional optional units are available and can be tailored to the learner’s career goals.




Key Outcomes

Graduates will be able to:


Identify and analyse complex cyber threats


Design enterprise-grade security architectures


Implement organisation-wide security policies and procedures


Conduct penetration testing and identify system vulnerabilities


Collaborate effectively with technical and non-technical teams


Understand and apply secure coding principles


Communicate cyber risks and solutions clearly across stakeholders.

Duration and Delivery

Flexible online or blended delivery


Tutor support, webinars, case-based learning, and real-time assessments


Typically completed in 6–12 months, depending on pace of study


Assessment and Verification

Assessments include: research-based assignments, case studies, technical reports, and practical evaluations


Centres are externally quality-assured by QUALIFI’s EQA team


Plagiarism prevention and integrity protocols apply throughout

Progression Opportunities

Upon successful completion, learners may:


Progress to a full Master’s Degree (by completing an additional 60 credits with a partner university)


Enter or advance in roles such as:


Chief Information Security Officer (CISO)


Cybersecurity Consultant


Risk & Compliance Manager


Threat Intelligence Analyst


Cyber Operations Lead