Sep 19, 2021  
PUBLISHED 2021-2022 Credit Catalog 
    
PUBLISHED 2021-2022 Credit Catalog

Information Systems Security


Return to {$returnto_text} Return to: Programs/Categories in ICT

Program Description


Computer and systems security is an integral part of our everyday lives. When the systems work it is apparent, though when they fail it can be catastrophic. Not only are businesses focused on the security of their data, but nation states are focused on the security of their people. Terrorism, rogue states, organized crime, and low level cyber-warfare are all part of today’s threat landscapes.

The Information Systems Security program prepares you to enter the security profession with confidence and solid fundamental knowledge. You will use a wide variety of defensive and offensive tools while learning the fundamentals of networking, malware analysis, reverse engineering, tool construction, operating systems internals, forensics, legal and ethical issues, social engineering, and military strategy.

The first year of the program delivers a strong base of fundamental skills in programming, operating systems, networking, and strategy. The second year moves into the more practical applications of defensive and offensive technologies, cumulating with a capstone project in which students apply the sum of their learning in the program. Underscoring the rigorous nature of the training, a selection of courses are conducted in a unique lab environment that is designed to contain and control the possible spread of the malware being analyzed.

 

Program Overview


Fast Facts


  • This program is two years in length, with each academic year divided into two 15-week semesters
  • Students participate in e-learning based curriculum, leasing a SAIT laptop computer that comes equipped with a variety of required software applications
  • Internet access (on-site), training, and technical support are provided throughout the program

 

Your Career


Graduates may find employment in a wide variety of functions, including penetration testing, log analysis, threat analysis, risk management, network security, Internet of Things hardening, physical security, quality assurance, malware analysis, and security audits.

The information security industry is currently experiencing a large deficit in well-trained, entry-level security professionals who can be instantly productive in a variety of capacities. As such, while the career type is intellectually challenging, the opportunities are abundant, exciting, and rewarding.

Please note that a criminal records check may be required of potential employers.

Student Success


Students who experience success in this program and profession:

  • Embody curiosity and strong problem solving skills
  • Make their education a priority by demonstrating excellent working habits and focus
  • Have higher secondary and/or post-secondary grades
  • Are dedicated to the life-long learning that is critical to professional success
  • Possess basic literacies in computer networking and ‘C’ language programming (an asset, but not required)

 

Credentials


Upon successful completion of this program, graduates will be awarded a SAIT Information Systems Security diploma.

Accreditation


There are no formal accreditation arrangements at this time. Please contact the School of Information and Communications Technologies (ICT) for more information.

Progression


The progression requirement for students taking credit courses is a Term GPA and Total Institutional GPA of 2.0, with the exception of English Language Foundations and Academic Upgrading programs.

Admission Requirements


Completion of the following courses or their equivalents, including meeting the minimum grade requirements for each as indicated:

  • 65% in Math 30-1, or, 70% in Math 30-2 or Applied Math 30, AND,

  • 60% in English Language Arts 30-1, or, 65% in English Language Arts 30-2

All applicants must demonstrate English Language Proficiency prior to admission, including students educated in Canada.

 

Program Outline


Total Credits 60.0


Program Outcomes


  1. Analyze existing systems for vulnerabilities.
  2. Design exploits to expose vulnerabilities in systems.
  3. Analyze data for exceptions to normal operations.
  4. Deploy a vulnerability response system.
  5. Implement data security systems.
  6. Exercise appropriate legal practices and ethical codes of conduct.
  7. Analyze risks, costs and benefits associated with the security of business processes.
  8. Expose security deficiencies through the use of social engineering.
  9. Demonstrate effective oral, written and presentation skills.

Program Articulation


Return to {$returnto_text} Return to: Programs/Categories in ICT