Apr 19, 2024  
PUBLISHED 2023-2024 Credit Catalog 
    
PUBLISHED 2023-2024 Credit Catalog [ARCHIVED CATALOG]

Information Systems Security


Return to {$returnto_text} Return to: Programs

Program Description


Train to become a computer systems security professional and gain a solid understanding of programming, operating systems, networking and strategy - using practical applications of defensive and offensive technologies.

With technology being a ubiquitous aspect of our everyday lives, computer and system security plays a critical role in protecting users and organizations from cyber attacks. When the systems work our data is protected and secure, but when they fail it can be catastrophic. Businesses know they need systems in place to ensure the security of their data, and nation states are focused on the security of their people.

This program will prepare you to enter the computer system security field with confidence and solid fundamental knowledge. Through a combination of theory and labs, you will use a wide variety of defensive and offensive tools while learning the fundamentals of networking, tool construction, and operating systems. In the first year of Information Systems Security, you will develop a strong base of fundamental skills in programming, operating systems, and networking. In the second year, you will focus more on the practical applications of defensive and offensive strategies. This will lead you to complete your studies with a capstone project in which you can apply the knowledge you gained in the program.

Program Overview


Fast Facts


  • Students participate in e-learning based curriculum, leasing a SAIT laptop computer that comes equipped with a variety of required software applications
  • Internet access (on-site), training, and technical support are provided throughout the program

Your Career


Graduates may find employment in a wide variety of functions, including penetration testing, log analysis, threat analysis, risk management, network security, Internet of Things hardening, physical security, quality assurance, malware analysis, and security audits.

The information security industry is currently experiencing a large deficit in well-trained, entry-level security professionals who can be instantly productive in a variety of capacities. As such, while the career type is intellectually challenging, the opportunities are abundant, exciting, and rewarding.

Please note that a criminal records check may be required of potential employers.

Student Success


Students who experience success in this program and profession:

  • Embody curiosity and strong problem-solving skills
  • Make their education a priority by demonstrating excellent working habits and focus
  • Have higher secondary and/or post-secondary grades
  • Are dedicated to the life-long learning that is critical to professional success
  • Possess basic literacies in computer networking and ‘C’ language programming

Credentials


Upon successful completion of this program, graduates will be awarded a SAIT Information Systems Security diploma.

Accreditation


There are no formal accreditation arrangements at this time. Please contact the School of Information and Communications Technologies (ICT) for more information.

Progression


The progression requirement for students taking credit courses is a Term GPA and Total Institutional GPA of 2.0, with the exception of English Language Foundations and Academic Upgrading programs.

Admission Requirements


Completion of the following courses or their equivalents, including meeting the minimum grade requirements for each as indicated:

  • 65% in Math 30-1, or, 70% in Math 30-2, AND,

  • 60% in English Language Arts 30-1, or, 65% in English Language Arts 30-2

All applicants must demonstrate English Language Proficiency prior to admission, including students educated in Canada.

Program Outline


Total Credits 60.0


Program Outcomes


  1. Analyze existing systems for vulnerabilities.
  2. Design exploits to expose vulnerabilities in systems.
  3. Analyze data for exceptions to normal operations.
  4. Deploy a vulnerability response system.
  5. Implement data security systems.
  6. Exercise appropriate legal practices and ethical codes of conduct.
  7. Analyze risks, costs and benefits associated with the security of business processes.
  8. Expose security deficiencies through the use of social engineering.
  9. Demonstrate effective oral, written and presentation skills.

Return to {$returnto_text} Return to: Programs