May 08, 2021  
PUBLISHED 2020-2021 Credit Catalog 
PUBLISHED 2020-2021 Credit Catalog

Information Systems Security

Return to {$returnto_text} Return to: Programs/Categories

Program Description

Computer and systems security is an integral part of our everyday lives. When the systems work it is transparent but when they fail it can be catastrophic. Not only are businesses focused on the security of their data, nation states are focused on the security of their people. Terrorism, rogue states, organized crime and low level cyber-warfare are all part of today’s threat landscapes.

The Information Systems Security program prepares you for entering the security profession with confidence and solid fundamental knowledge. You will use a wide variety of defensive and offensive tools while learning the fundamentals of: networking, malware analysis, reverse engineering, tool construction, operating systems internals, forensics, legal/ethical issues, social engineering and military strategy.

Information Systems Security will have some of its courses delivered in a unique lab environment designed to contain and control the possible spread of the malware being analyzed. The first year of the program rests on a strong base of fundamental skills: programming, operating systems, networking and strategy. The second year moves into the more practical applications of defense and offensive technologies accumulating with a  capstone project in which students will apply knowledge learned from previous courses. The program is two years in length with each academic year divided into two 15-week semesters.

All Information Systems Security students participate in e-learning based curriculum. Students lease PC laptop computers from SAIT, which are equipped with various virtual environments and software applications.

A criminal records check may be required by potential employers. Basic level of computer networking and “C” language programming will greatly enhance your success as a student in this program.

Program Overview

Fast Facts

Your Career

Upon graduation, you may find employment in a wide variety of areas: penetration testing, log analysis, threat analysis, risk management, network security, Internet of Things hardening, physical security, quality assurance, malware analysis and security audits. The security industry is experiencing a large deficit in well trained, entry level security professionals who can be instantly productive in a large variety of jobs. The opportunities are exciting but the career is intellectually challenging, requiring lifelong learners with unusual dedication and focus.

Student Success

Applicants with strong curiosity, good problem solving skills and excellent work habits are usually more successful in programs such as Information Systems Security.


Upon successfully completing this program, graduates will receive a SAIT diploma in Information Systems Security.


There are no formal accreditation arrangements at this time. Please contact the School of Information and Communications Technologies (ICT) for more information.


Students must attain a PGPA and/or a CGPA of 2.0 or better in each semester and pass the necessary prerequisite courses to progress through the program. To qualify for graduation, students must pass all courses, attain a CGPA of 2.0 or better and complete course requirements within the prescribed timelines.

Admission Requirements

Completion of the following courses or equivalents:

  • At least 65% in Math 30-1 or at least 70% in Math 30-2 or Applied Math 30, AND,

  • At least 60% in English Language Arts 30-1, or at least 65% in English Language Arts 30-2.

  • All applicants must demonstrate English Language Proficiency prior to admission, including students educated in Canada.

  • All qualified students will enter selection.

Program Outline

Total Credits 60.0

Program Outcomes

  1. Analyze existing systems for vulnerabilities.
  2. Design exploits to expose vulnerabilities in systems.
  3. Analyze data for exceptions to normal operations.
  4. Deploy a vulnerability response system.
  5. Implement data security systems.
  6. Exercise appropriate legal practices and ethical codes of conduct.
  7. Analyze risks, costs and benefits associated with the security of business processes.
  8. Expose security deficiencies through the use of social engineering.
  9. Demonstrate effective oral, written and presentation skills.

Program Articulation

Return to {$returnto_text} Return to: Programs/Categories