NOTE: Students enrolling in this program are required to purchase their own laptop. For specific hardware and software requirements for this program click here.
This graduate certificate program is designed for students with previous education and/or relevant experience (please see the entrance requirements section of this page for more detail).
This program will enable you to learn to develop, evaluate and support information technology (IT) security solutions by creating cost-effective and secure computing environments that will safeguard networked computer systems. You will become skilled in formulating and organizing security policies and procedures to protect corporate information assets including legal, regulatory and governance issues. In addition, you will learn to detect various hacking and penetration attacks while exploring forensic methods designed to mine data and preserve the chain of evidence in accordance with regulation standards.
The curriculum will consider information systems security as it applies to business and provide a hands-on approach to understanding a broad range of security concepts and industry best practices.
Gaining the knowledge required to manage the strategic and operational aspects of information security you will focus on the following areas:
- Identifying business assets in need of protection
- Implementing appropriate safeguards to protect businesses
- Measuring the effectiveness of the protection and safeguard methods used
- Implementing vulnerability and remediation of threat vectors
You will learn detailed, practical aspects of security such as risk analysis, vulnerability testing, writing security policies, implementing access controls and performing security audits. Emphasis will be placed on interpersonal, organizational, technical, communication and troubleshooting skills applied to enhance the effective implementation of information systems.
This program incorporates a hybrid delivery model that includes both in-class and online learning to allow for added flexibility.
Student may choose to pursue the following industry certifications, which may require additional exams and/or related work experience to qualify:
- CISSP Certified Information Systems Security Professional (by ISC2)
- CEH Certified Ethical Hacker (by EC-Council)
- CISA Certified Information Systems Auditor (by ISACA)