Students will learn to share technical information in written and spoken form to individuals with varying levels of technical knowledge. Learners will improve their communication and interpersonal skills so that they can collaborate and network to keep their technical expertise up to date and to find solutions. Students will practice presentation skills and will learn to conduct security training sessions. Productivity software will be used to format documents properly and to illustrate data in a way that enhances technical reports.
Students will further develop their abilities to convey technical information to various audiences in verbal and written form, with a focus on using persuasive language. They will also learn to document processes to preserve and share information. They will practice providing feedback to team members, resolving conflicts, mentoring others and teaching people about security best practices.
Learn and practice skills, attitudes, and behaviours that will help you to succeed in your professional career. You will reflect on your past and current learning so that you can confidently write about and discuss your skills and experiences. You will examine the role of culture on your personal and professional interactions. You will start an ePortfolio which you’ll continue to develop during your studies in this program. Most class time will be dedicated to group and class discussions.
You will improve your ability to confidently describe your skills in written and verbal form so that you can clearly convey your abilities to people in your network such as potential employers or clients. You will also continue to develop your intercultural, interpersonal, and academic skills through activities and discussions, which encourage introspection, reflection, and teamwork. Development of your ePortfolio will continue in this course.
Learn professional skills that will help you to succeed in your career. Reflect on yourself and your relationship with others, including your peers, in order to develop your self-awareness and intercultural competence. Practice self-management skills such as prioritizing, time management, goal setting, and self-motivation. Development of your ePortfolio will continue in this course.
This course is a detailed study of project management techniques and issues related to the field of information technology with specific attention to addressing the challenges surrounding software development projects. Using methodologies defined by the Project Management Institute (PMI), the course examines the initiation, planning, control, and closure of projects within the highly dynamic framework of iterative and incremental development methodologies, including agile approaches. Major areas of focus will involve management of communications, human resources, time, procurement, financials, risk, and quality with a guiding principle to deliver results that meet deadlines, budgets, and stakeholder exceptions.
Students will learn the terminology and concepts necessary to be successful in the field of Information Security. Industry specific standards and regulations will be examined. Students will also explore the different roles and certifications that encompass this industry.
Students will learn various aspects of cryptography as it relates to Information Systems. Students will see basic cryptographic algorithms and examples and learn modern one-way encryption and key based cryptographic communication and storage. They will implement various types of encryption on systems with the goal of benchmarking performance versus security.
Students will be prepared to implement hardware security in the network. Focusing on Unified Threat Management (UTM) devices, students will learn how to properly design and implement security architecture and controls. Students will also learn how to implement security management and analytics to monitor the effectiveness of their installation.
Students will learn how to recognize and classify malware, analyze payloads and implement mitigation. Students will see basic malware examples and delivery systems. Students will develop necessary skills to use malware analysis software.
This course introduces a variety of topics to build students’ skills and understanding of networking, Windows Server, and Security Architecture. The course also introduces networking devices and the Cisco IOS software. Students will learn how networks are set up, how devices are configured, how communication takes place on a network and the basics of implementing network security best practices which will enhance the students’ confidence in communicating their knowledge and work in networking-related professions. Students will install and configure Windows Server Active Directory which will include maintaining users and groups. Students will create and secure file shares in a Windows Server environment. Students will install Windows client software and configure the client to be part of the domain which will allow them to perform testing to demonstrate security compliance. Students will design and demonstrate a secure small/medium sized network which will incorporate their knowledge of networks, servers and security best practices.
This course will provide the skills to install, configure and use an instance of Linux in a virtualized environment, with the goal of having the necessary skills to deploy and use Linux for typical information security activities. Further, students will obtain an understanding of modifying and creating the python scripts that are necessary to automate many information security activities.
Students will learn how to conduct a vulnerability assessment using relevant analysis tools. They will also learn to analyze security events and search for and identify anomalies. Usage of penetration testing tools will also be taught to perform the appropriate tests. Students will then create a penetration report from the results of the testing.
This course introduces students to a wide range of security topics such as how website attacks occur and who is attacking. Students will implement cryptography, web security, and understand web exploits. Emphasis will be on real world examples of vulnerabilities and how they will be exploited, as well as how to create more secure web servers and web sites.
Information security risks to organizations and infrastructures will be examined. Students will develop detailed risk analyses, assessments, produce mitigation solutions, and develop policies and procedures needed to help mitigate risk. Case studies, risk management frameworks and practical real-world examples will be used to help students identify, understand and mitigate against risk.
The discipline of security architecture is a systematic, holistic and repeatable process for securing the enterprise. This course will introduce students to what security architecture is, why it is useful, who creates it, and approaches used to create it. Students will become familiar with security architecture in practice through the creation of architectural artifacts.
Students will conduct forensic investigations by learning to analyze forensic artifacts and data. A number of tools will be covered to assist in the investigation, such as event management tools, forensic tools and reverse engineering tools. Students will also learn how to respond to incidents and guide remediation.
Students will learn the four major areas of security management: information security governance, information risk management, information security program development and management, and information security incident management. These topics will be covered from a management perspective to effectively oversee an organization's security environment.
(No description available at this time)