Traits, skills and aptitudes
People working in the cyber security analysis field tend to be innovative, objective and directive.
You need:
- analytical skills
- speaking and writing skills
- an inquiring and inventive mind
- an eye for details
- patience and an organized approach to troubleshooting
- decision-making and problem-solving skills
- math and science skills
- teaching skills
- time-management skills.
You should enjoy being innovative, working with others or independently and doing your work with precision.
Practicum, co-op and work integrated learning opportunities
You can participate in an optional co-op work term between your first and second year, where you can apply what you’ve learned in a work environment and build relationships with a potential employer.
In your second year, you’ll also participate in a capstone project where you’ll investigate issues across several different areas and propose a solution.
Accreditations, designations or certifications
Once you graduate, you’ll be prepared with the knowledge to challenge the CompTIA Security+ exam and earn your certification.
Specialized intakes
This program is available to international applicants as a stand-alone program or as part of a program bundle - two programs delivered consecutively.
For details on available bundles including this program, see international bundle programs.
Credential
Upon successful completion of this program, you’ll be awarded a SAIT Information Systems Security diploma.
Accepts international applicants - PGWP-eligible
This program accepts international applicants and meets the eligibility criteria for the Post-Graduation Work Permit program, as long as the student is registered in on-campus classes or completes more than 50% of the courses on campus (for blended options).
International students attending all classes online will NOT be eligible for a Post-Graduate Work Permit. International students are responsible for maintaining their eligibility throughout their studies.
Related careers
Our graduates may work in the following occupations. Some careers require additional experience and education.
Potential careers (NOC):
- Computer and information systems managers (20012)
- Data scientists (21211)
- Cybersecurity specialists (21220)
- Business systems specialists (21221)
- Information systems specialists (21222)
- Web designers (21233)
- Computer network and web technicians (22220)
- User support technicians (22221)
- Information systems testing technicians (22222)
Admission requirements - Applicants educated in Canada
Applicants must demonstrate English language proficiency and completion of the following courses or equivalents:
- at least 65% in Math 30-1 or 70% in Math 30-2, and
- at least 60% in English Language Arts 30-1 or 65% in English Language Arts 30-2.
SAIT accepts high school course equivalents for admission for applicants educated outside Alberta.
Program outline
The Information Systems Security diploma requires 60 credits (20 courses) to complete.
The program spans two years, with two semesters each year.
Suggested schedule of study
Co-op work term (optional)
Progression
You must attain a PGPA and/or a CGPA of 2.0 or better each semester and pass the prerequisite courses to progress through the program.
To qualify for graduation, you must pass all courses, attain a CGPA of 2.0 or better and complete course requirements within the prescribed timelines.
Review our grading and progression procedure >
Books and supplies
Books and supplies are approximately $1,000 - $1,500 per full-time year.
This is a bring-your-own-device program with a power-user hardware and software requirement. See the specific requirements on our computers and laptops page.
Your textbooks will be discussed in class. You will not need to purchase them ahead of time.
Required equipment/tools
You’ll require an:
- Electronic kit
- Wireless access point
- Sensor kit
- Computer network port or network dongle
- Cloud computing services subscription (approximately $800 - $1,200 per year.)
Please wait for your instructors to provide further direction before purchasing equipment.
Program outcomes
- Analyze existing systems for vulnerabilities.
- Design exploits to expose vulnerabilities in systems.
- Analyze data for exceptions to normal operations.
- Deploy a vulnerability response system.
- Implement data security systems.
- Exercise appropriate legal practices and ethical codes of conduct.
- Analyze risks, costs and benefits associated with the security of business processes.
- Expose security deficiencies through the use of social engineering.
- Demonstrate effective oral, written and presentation skills.