Information Systems Security
Credential: Ontario College Graduate Certificate
Work Integrated Learning: 1 Internship
Length: 3 Semesters
Duration: 1 Year
Effective: Fall 2018
This program prepares students for careers involving the development, evaluation, and support of IT security solutions. Building on previous educational experience, students learn to create cost effective and secure computing environments. Graduates are able to categorize, design, implement, and integrate technical and managerial safeguards to ensure the security of networked computer systems. An emphasis will be placed on interpersonal, organizational, technical, communication, and problem-solving skills applied to enhance the effective implementation of security in a business environment.
The need for organizations to build and maintain secure network and information systems has created demand for skilled computer and network systems security specialists. Chief Information Officers and Information Technology Managers charged with the need to plan and implement security controls and infrastructure to protect corporate information systems will increasingly require the skills of security specialists. Career opportunities will be available in both public and private sector organizations. Graduates may gain employment as administrators, technicians or security analysts.
Program Learning Outcomes
The graduate has reliably demonstrated the ability to:
- deploy and manage desktop and server operating systems and optimize system settings in order to 'harden' information systems;
- establish best practices to protect business resources from vulnerabilities and exploits;
- develop security strategies for the deployment of network security procedures and network security devices;
- establish security plans and strategies for proper use and protection of information assets including contingency and disaster plans in compliance with best practices, standards, and regulations;
- create acceptable use policies for business information systems;
- apply project management tools and principles in the building and deployment of security policies and strategies;
- perform security audits using log management software and log analysis to ensure compliance with security plans, policies, standards, and regulations and present results to senior management;
- deliver an effective security awareness and training program to ensure compliance with security policies;
- apply basic entrepreneurial strategies to identify and respond to new opportunities in the information security field;
- investigate and employ environmentally sustainable practices within the information security field.
The Program Progression
- Sem 1: Fall 2018
- Sem 2: Winter 2019
- Sem 3: Summer 2019
- Post-secondary diploma or degree with a focus in computer studies, or equivalent work experience in computer networks and operating systems.
Applicants will be asked to submit a current resume and letter of interest to the Program Coordinator. Academic and experiential learning of all applicants will be assessed.
Criminal Reference/Vulnerable Sector Check
Placement agencies require an up-to-date clear criminal reference check and vulnerable sector check prior to going out on placement. Students should obtain their criminal reference three months prior to placement; checks conducted earlier may not be considered current. As some jurisdictions require longer lead-time for processing, please check with the program coordinator to ensure you allow for sufficient turn-around time. It is the student's responsibility to provide the completed document prior to placement start.
NOTE: A record of criminal offences, for which a pardon has not been granted, may prevent students from completing their placements, thereby affecting their ability to graduate.
To be successful in this program, you are required to have a personal notebook computer (either PC or Mac architecture) prior to the start of the program that meets or exceeds the following hardware specifications:
- Intel I3 processor or AMD equivalent
- 4GB of memory
- 250GB hard drive
Additional operating systems, security tools, and software used in the program will be provided to the student upon commencement of the program.
12 Program Courses
To graduate from this program, a student must attain a minimum of 60% or a letter grade of P (Pass) or S (Satisfactory) in each course in each semester. The passing weighted average for promotion through each semester and to graduate is 60%.
|NETS 1015||Security Management||42|
|NETS 1025||Network Security 1||42|
|NETS 1026||Windows Systems Security||42|
|NETS 1028||Linux Systems Security||42|
|NETS 1035||Applied Cryptography||42|
|NETS 1036||Information Security||42|
|NETS 1006||Contingency Planning and Disaster Recovery||42|
|NETS 1030||Networks Security 2||42|
|NETS 1032||Digital Forensics||42|
|NETS 1034||Hacking Techniques and Exploits||42|
|NETS 1037||Monitoring and Log Management||42|
|NETS 1038||Application Security||42|
|NETS 1033||Computer and Network Systems Security Internship||560|
Information contained in College documents respecting programs is correct at the time of publication. Academic content of programs and courses is revised on an ongoing basis to ensure relevance to changing educational objectives and employment market needs. The college reserves the right to add or delete programs, options, courses, timetables or campus locations subject to sufficient enrolment, and the availability of courses.