Students prepare for careers involving the development, evaluation, and support of IT security solutions. Building on previous educational experience, students learn to create cost effective and secure computing environments. Students develop the knowledge and skills to categorize, design, implement, and integrate technical safeguards to ensure the security of information systems. Emphasis is placed on cultivating the interpersonal, organizational, technical, communication, and problem-solving skills applied to enhance the effective implementation of security in a business environment.
The need for organizations to build and maintain secure network and information systems has created demand for skilled computer and network systems security specialists. Chief Information Officers and Information Technology Managers charged with the need to plan and implement security controls and infrastructure to protect corporate information systems will increasingly require the skills of security specialists. Career opportunities may be available in both public and private sector organizations including the financial sector, health care, education and more. Graduates may gain employment as administrators, technicians, security analysts or penetration testers.
- Post-secondary diploma or degree with a focus in computer science, computer engineering or computer networking, or equivalent work experience in computer networks, operating systems and programming.
Applicants will be asked to submit a current resume and letter of interest to the Program Coordinator. Academic and experiential learning of all applicants will be assessed.
Criminal Reference/Vulnerable Sector Check
Placement agencies require an up-to-date clear criminal reference check and vulnerable sector check prior to going out on placement. Students should obtain their criminal reference three months prior to placement; checks conducted earlier may not be considered current. As some jurisdictions require longer lead-time for processing, please check with the program coordinator to ensure you allow for sufficient turn-around time. It is the student's responsibility to provide the completed document prior to placement start.
NOTE: A record of criminal offences, for which a pardon has not been granted, may prevent students from completing their placements, thereby affecting their ability to graduate.
To be successful in this program, you are required to have a personal notebook computer (either PC or Mac architecture) prior to the start of the program that meets or exceeds the following hardware specifications:
- Intel i5 processor or AMD equivalent
- 12GB of memory (16 GB recommended)
- 250GB hard drive (SSD recommended)
Additional operating systems, security tools, and software used in the program will be provided to the student upon commencement of the program.
- NETS 1015 - Security Management (Semester 1 / 42 hours)
- NETS 1025 - Network Security 1 (Semester 1 / 42 hours)
- NETS 1026 - Windows Systems Security (Semester 1 / 42 hours)
- NETS 1028 - Linux Systems Security (Semester 1 / 42 hours)
- NETS 1035 - Applied Cryptography (Semester 1 / 42 hours)
- NETS 1039 - Cloud Security (New Course) (Semester 1 / 42 hours)
- NETS 1006 - Contingency Planning and Disaster Recovery (Semester 2 / 42 hours)
- NETS 1030 - Network Security 2 (Semester 2 / 42 hours)
- NETS 1032 - Digital Forensics (Semester 2 / 42 hours)
- NETS 1034 - Hacking Techniques and Exploits (Semester 2 / 42 hours)
- NETS 1037 - Monitoring and Log Management (Semester 2 / 42 hours)
- NETS 1038 - Application Security (Semester 2 / 42 hours)
- COOP 1050 - Information Systems Security Work Term (560 hours)