Mar 28, 2024  
PUBLISHED 2018-2019 Credit Catalog 
    
PUBLISHED 2018-2019 Credit Catalog [ARCHIVED CATALOG]

Information Systems Security


Return to {$returnto_text} Return to: Programs & Categories by Delivery Method

Program Description


Computer and systems security is an integral part of our everyday lives. When the systems work it is transparent but when they fail it can be catastrophic. Not only are businesses focused on the security of their data, nation states are focused on the security of their people. Terrorism, rogue states, organized crime and low level cyber-warfare are all part of today’s threat landscapes.

The Information Systems Security program prepares you for entering the security profession with confidence and solid fundamental knowledge. You will use a wide variety of defensive and offensive tools while learning the fundamentals of: networking, malware analysis, reverse engineering, tool construction, operating systems internals, forensics, legal/ethical issues, social engineering and military strategy.

Information Systems Security will have some of its courses delivered in a unique lab environment designed to contain and control the possible spread of the malware being analyzed. The first year of the program rests on a strong base of fundamental skills: programming, operating systems, networking and strategy. The second year moves into the more practical applications of defense and offensive technologies accumulating with a unique penetration testing oriented capstone project. The program is two years in length with each academic year divided into two 15-week semesters.

All Information Systems Security students participate in e-learning based curriculum. Students lease PC laptop computers from SAIT, which are equipped with various virtual environments and software applications.

A criminal records check is required for entrance to this program. Please wait until you have received an invitation by email to attend a selection session from the School of Information and Communication Technologies before requesting a records check. An applicant with a pardon will still be considered for the program.

Program Overview


Your Career

Upon graduation, you may find employment in a wide variety of areas: penetration testing, log analysis, threat analysis, risk management, network security, Internet of Things hardening, physical security, quality assurance, malware analysis and security audits. The security industry is experiencing a large deficit in well trained, entry level security professionals who can be instantly productive in a large variety of jobs. The opportunities are exciting but the career is intellectually challenging, requiring lifelong learners with unusual dedication and focus.

Student Success

Applicants with strong curiosity, good problem solving skills and excellent work habits are usually more successful in programs such as Information Systems Security.

Credentials and Accreditation

Upon successfully completing this program, graduates will receive a SAIT diploma in Information Systems Security.

There are no formal accreditation arrangements at this time. Please contact the School of Information and Communications Technologies (ICT) for more information.

Abbreviated Program Name


Information Systems Security

Program Code


ISS

Progression


Students must attain a PGPA and/or a CGPA of 2.0 or better in each semester and pass the necessary prerequisite courses to progress through the program. To qualify for graduation, students must pass all courses, attain a CGPA of 2.0 or better and complete course requirements within the prescribed timelines.

Admission Requirements


Completion of the following courses or equivalents:

  • At least 65% in Math 30-1 or at least 70% in Math 30-2 or Applied Math 30, AND,

  • At least 60% in English Language Arts 30-1, or at least 65% in English Language Arts 30-2.

  • All applicants must demonstrate English Language Proficiency prior to admission, including students educated in Canada.

  • All qualified students will enter selection.

Program Outline


Total Credits 60.0


Program Outcomes


  1. Analyze existing systems for vulnerabilities.

  2. Design exploits to expose vulnerabilities in systems.
  3. Analyze data for exceptions to normal operations.
  4. Deploy a vulnerability response system.
  5. Implement data security systems.
  6. Exercise appropriate legal practices and ethical codes of conduct.
  7. Analyze risks, costs and benefits associated with the security of business processes.
  8. Expose security deficiencies through the use of social engineering.
  9. Demonstrate effective oral, written and presentation skills.

Program Articulation


Return to {$returnto_text} Return to: Programs & Categories by Delivery Method