Traits, skills and aptitudes
Those in information technology tend to be innovative, methodical and directive.
You need:
- an analytical mindset
- excellent attention to detail
- strong decision-making and problem-solving skills
- an aptitude for math, science and programming
- patience and persistence
- effective teamwork and communication skills, both verbal and written
- to be comfortable adapting to ongoing change
- to consistently learn and upgrade your knowledge and skillset to keep up with evolving trends and technology
- a strong sense of ethics
- to be highly organized and manage your time well
- to work effectively under pressure.
You should enjoy being creative, working with others, always being precise in your work, creating structure for information and processes, and continuously learning.
Academic path
Graduates of one of the following SAIT diploma programs with a minimum cumulative 2.3 GPA (67% or C+) meet the admission requirements to enter this program:
- Information Systems Security
- Information Technology Services
- Information Technology - Network Systems major
- Information Technology - Computer Systems major
- Information Technology - Telecommunications major
Practicum, co-op and work integrated learning opportunities
You can complete an optional 10 - 12-week full-time co-op or work-integrated learning experience between your first and second year of this degree.
You will be expected to find your work placement with support from program administrators who will provide you with resources for finding opportunities. There may be additional costs associated with work placement assistance.
You may be required to temporarily relocate or travel, depending on the employer you secure your work placement with.
Accreditations, designations or certifications
Graduates of this program may pursue the following certifications:
- Certified Information Systems Security Professional (CISSP)
- Certified Ethical Hacker (CEH)
- CompTIA Security+
Credential
Upon successful completion of this program, you will be awarded a Bachelor of Technology degree with a major in Cyber Security
Accepts international applicants - PGWP-eligible
This program accepts international applicants and meets the eligibility criteria for the Post-Graduation Work Permit program, as long as the student is registered in on-campus classes or completes more than 50% of the courses on campus (for blended options).
International students attending all classes online will NOT be eligible for a Post-Graduate Work Permit. International students are responsible for maintaining their eligibility throughout their studies.
Related careers
Our graduates may work in the following occupations. Some careers require additional experience and education.
Potential careers (NOC):
- Business Systems Specialists (21221)
- Computer and Information Systems Managers (20012)
- Computer Network and Web Technicians (22220)
- Cybersecurity Specialists (21220)
- Data Scientists (21211)
- Information Systems Specialists (21222)
- Information Systems Testing Technicians (22222)
Admission requirements - Applicants educated in Canada
Applicants must demonstrate English language proficiency and completion of the following courses or equivalents:
- a SAIT information technology diploma or equivalent from an accredited post-secondary institution, with a minimum 2.3 cumulative GPA (67% or C+), including graduates from the following SAIT diplomas:
- Software Development
- Information Security Systems
- Information Technology Services
- Information Technology
Application process
When applying in the application portal, select Bachelor of Technology. You will be able to select Cyber Security as your major during the application process.
Program outline
The Bachelor of Technology in Cyber Security requires 60 credits (20 courses) to complete.
The program consists of:
- Cyber security core - 30 credits (10 courses)
- Complementary core - 18 credits (6 courses)
- Junior electives - 9 credits (3 courses)
- Senior electives - 3 credits (1 course)
- An optional co-op work placement (0 credits)
The program spans two years, with two semesters each year.
Required courses
You must take all the following courses to complete this program.
Required courses - Cyber security senior core
Required courses - Complementary junior core
Required courses - Complementary senior core
Elective courses
You will choose courses from the following lists.
Elective courses - Junior science elective (Choose one)
Elective courses - Junior humanities elective (Choose one)
Elective courses - Junior social science elective (Choose one)
Elective courses - Senior elective (Choose one)
Suggested schedule of study
Junior social science elective (Choose one)
Co-op work term (optional)
Junior humanities elective (Choose one)
Junior science elective (Choose one)
Senior elective (Choose one)
Progression
You must attain a PGPA and/or a CGPA of 2.0 or better each semester and pass the prerequisite courses to progress through the program.
To qualify for graduation, you must pass all courses, attain a CGPA of 2.0 or better and complete course requirements within the prescribed timelines.
Review our grading and progression procedure >
Books and supplies
Books and supplies are approximately $1,000 per full-time year.
This is a bring-your-own-device program with a power-user hardware and software requirement. See the specific requirements on our computers and laptops page.
Find your booklist on the SAIT Bookstore’s website. The booklist will be available closer to the program start date.
Can’t find your program or course? The bookstore didn’t receive a textbook list. Contact your program directly to determine if they’re still refining course details or if you’re in luck; no textbook purchase is required this term.
General program outcomes
- Business communication: utilize professional communication strategies to convey technical solutions effectively.
- Professional acumen and work ethic: apply problem-solving methodologies to resolve complex business scenarios.
- Scholarly engagement and information literacy: evaluate scholarly sources to support academic research and projects.
- Client experience: demonstrate a service-oriented mindset to enhance client satisfaction.
- Security: evaluate the security of technical solutions used in business operations.
- Solution design: design technical computing solutions that meet business and user requirements, adhering to industry-defined best practices.
- Systems analysis: apply systems analysis methodologies to solve business problems.
- Emerging technologies: assess emerging technologies to improve business operations.
Cyber security major outcomes
- Ethics: critique security best practices of a business in the context of the individual and their potential harm towards society.
- Vulnerability: evaluate systems vulnerabilities to current and emerging cyber security threats.
- Risk assessment: assess the risks to an organization associated with the adoption of technology tools.
- Systems security: anticipate systems integration conflicts caused by the implementation of security practices.
Degree-level outcomes
Depth and breadth of knowledge:
- Demonstrates critical understanding of disciplines and fields of practice.
- Applies knowledge from areas outside the core discipline.
Knowledge of methodologies and research:
- Capacity to engage in independent research and critical evaluation of information.
- Uses methodologies to address scholarly and creative challenges.
Application of knowledge:
- Applies inquiry methods to solve problems, create new works, or comment on scholarship.
Communication skills:
- Communicates effectively to specialists and non-specialists, both orally and in writing.
Awareness of limits of knowledge:
- Appreciates the limits and ambiguities of knowledge.
Professional capacity and autonomy:
- Operates within professional boundaries and regulatory requirements
Program specific outcomes
- Business communication: develops strategies to address technical solutions effectively using critical thinking and consultation.
- Professional acumen: integrates professional skills to navigate complex business scenarios.
- Client experience: focuses on problem-solving with customer satisfaction in mind.
- Security: critiques technical security solutions in business operations.
- Solution design: designs technical computing solutions aligned with industry best practices.
- Systems analysis: applies systems analysis methodologies for business problem-solving.