INFORMATION TECHNOLOGY PROGRAMS
Post-Graduate Certificate
Level 7 Diploma in Cyber Security
Course Overview
Level 7 Diploma in Cyber Security is a postgraduate-level programme designed for learners seeking to deepen their expertise in advanced cyber security domains. This diploma equips learners with the critical knowledge, practical skills, and strategic understanding needed to lead cyber security initiatives across both private and public sectors.
Through intensive study of network security, cryptography, digital forensics, and governance frameworks, learners develop strong competencies to tackle complex threats, build secure systems, and ensure regulatory compliance. The course also supports progression to a full Master’s degree via university partnerships.
Entry Requirements
Applicants must:
Be aged 20 or over
Hold a Level 6 qualification or equivalent
In some cases, relevant industry experience may be considered in lieu of formal qualifications
If English is not the applicant’s first language, an IELTS score of 6.0 (or equivalent) is required
Provide two references, one of which should preferably be academic
Complete a successful interview with the approved centre
Qualification Structure
This diploma requires completion of 4 mandatory units and 4 optional units, totalling 120 credits and 1,200 Total Qualification Time (TQT) hours.
🔒 Mandatory Units
Fundamentals of Cyber Security
• SMART Objectives
• Cyber security threats, risks and vulnerabilities, threat landscape and attack vectors
• System vulnerabilities
• Legal responsibilities
• Physical security measures
• Software and hardware
• security measures Various Obstacles
• Delivery formats
• Network types
• Network components
• Networking infrastructure services and resources
• Importance of training staff on cyber security
Network, Infrastructure and Systems Security
• Research methodologies
• Networking principles
• Firewalls, VPN, and Firmware
• Access logs
• Baselines and assurance
• Firmware updates
• End user device security
• Malware and Anti-virus protection
• Identify security weaknesses and focus on them
• End-point protection
• Security designs and related principles
• Internet and cloud computing/infrastructure
Applications of Cyber Security
• Limit the damage
• Disruption of attacks
• Restore operations
• Facing a cyber-security breach demands swift
• Strategic action to safeguard your assets, operations, and reputation
• Total costs
• Network trafficking
• Operating systems
• Incident resolution
• Task creation and management
• Human factors when securing networks and applications
Security Management and Governance
• Data breaches
• Malware
• Cyber threats
• Attach vectors
• Zero-day vulnerabilities
• SQL injections
• Network infrastructure
• Emerging threats
• Legal compliance
• Data reports
• Data protection
• Record keeping
• Key standardised approaches and the fundamental importance of a risk-based
approach
🧩 Optional Unit Example
Cryptography
• Backup and Restore
• Disaster Recovery
• Data Backup Solutions
• Data Replication and Data Restoration
• Backup Strategy
• Point-in-Time Recovery
• Data Loss Prevention
• Risk Tolerance
• Business Impact Analysis
• Security Risk Assessment
• Cyber-security Risk Management
• Risk Mitigation Strategies
• Risk Management Policies
• Risk Management Frameworks in Cyber-security
*Additional optional units are available and can be tailored to the learner’s career goals.
Key Outcomes
Graduates will be able to:
Identify and analyse complex cyber threats
Design enterprise-grade security architectures
Implement organisation-wide security policies and procedures
Conduct penetration testing and identify system vulnerabilities
Collaborate effectively with technical and non-technical teams
Understand and apply secure coding principles
Communicate cyber risks and solutions clearly across stakeholders.
Duration and Delivery
Flexible online or blended delivery
Tutor support, webinars, case-based learning, and real-time assessments
Typically completed in 6–12 months, depending on pace of study
Assessment and Verification
Assessments include: research-based assignments, case studies, technical reports, and practical evaluations
Centres are externally quality-assured by QUALIFI’s EQA team
Plagiarism prevention and integrity protocols apply throughout
Progression Opportunities
Upon successful completion, learners may:
Progress to a full Master’s Degree (by completing an additional 60 credits with a partner university)
Enter or advance in roles such as:
Chief Information Security Officer (CISO)
Cybersecurity Consultant
Risk & Compliance Manager
Threat Intelligence Analyst
Cyber Operations Lead