This program prepares students for careers involving the development, evaluation, and support of IT security solutions. Building on previous educational experience, students learn to create cost effective and secure computing environments. Graduates are able to categorize, design, implement, and integrate technical and managerial safeguards to ensure the security of networked computer systems. An emphasis will be placed on interpersonal, organizational, technical, communication, and problem-solving skills applied to enhance the effective implementation of security in a business environment.
The need for organizations to build and maintain secure network and information systems has created demand for skilled computer and network systems security specialists. Chief Information Officers and Information Technology Managers charged with the need to plan and implement security controls and infrastructure to protect corporate information systems will increasingly require the skills of security specialists. Career opportunities will be available in both public and private sector organizations. Graduates may gain employment as administrators, technicians or security analysts.
- Post-secondary diploma or degree with a focus in computer studies, or equivalent work experience in computer networks and operating systems.
Applicants will be asked to submit a current resume and letter of interest to the Program Coordinator. Academic and experiential learning of all applicants will be assessed.
Criminal Reference / Vulnerable Sector Check
Placement agencies require an up-to-date clear criminal reference check and vulnerable sector check prior to going out on placement. Students should obtain their criminal reference three months prior to placement; checks conducted earlier may not be considered current. As some jurisdictions require longer lead-time for processing, please check with the program coordinator to ensure you allow for sufficient turn-around time. It is the student''s responsibility to provide the completed document prior to placement start.
NOTE: A record of criminal offences, for which a pardon has not been granted, may prevent students from completing their placements, thereby affecting their ability to graduate.
To be successful in this program, you are required to have a personal notebook computer (either PC or Mac architecture) prior to the start of the program that meets or exceeds the following hardware specifications:
- Intel i5 processor or AMD equivalent
- 12GB of memory (16 GB recommended)
- 250GB hard drive (SSD recommended)
Additional operating systems, security tools, and software used in the program will be provided to the student upon commencement of the program.
- NETS 1015 - Security Management (Semester 1 / 42 hours)
- NETS 1025 - Network Security 1 (Semester 1 / 42 hours)
- NETS 1026 - Windows Systems Security (Semester 1 / 42 hours)
- NETS 1028 - Linux Systems Security (Semester 1 / 42 hours)
- NETS 1035 - Applied Cryptography (Semester 1 / 42 hours)
- NETS 1036 - Information Security (Semester 1 / 42 hours)
- NETS 1006 - Contingency Planning and Disaster Recovery (Semester 2 / 42 hours)
- NETS 1030 - Networks Security 2 (Semester 2 / 42 hours)
- NETS 1032 - Digital Forensics (Semester 2 / 42 hours)
- NETS 1034 - Hacking Techniques and Exploits (Semester 2 / 42 hours)
- NETS 1037 - Monitoring and Log Management (Semester 2 / 42 hours)
- NETS 1038 - Application Security (Semester 2 / 42 hours)