Description
The Information Security program will provide you with the theory and experience required to analyze, evaluate, manage and respond to today’s most complex information security issues. You will learn the fundamentals of designing and analyzing robust personal, enterprise and web-based IT security systems. Students graduating from this program will be well positioned to enter into and succeed in the information security field in Manitoba and across North America.
The Information Security graduate:
DOCUMENT SUBMISSION
Upload Through Your Future Student Account
If you do not have a Future Student Account or require assistance, please contact our Student Service Centre at 204-632-2327.
Internationally Educated Applicants - visit www.rrc.ca/credentials for credential assessment information.
However, if you apply within 6 weeks of the program start date, admission requirements are due within 5 days of applying.
Regular Admission Requirements
Mature Student Admission Requirements
If you are 19 years of age or older on or before September 30 in your year of registration, have been out of high school for a minimum of one year, and you do not meet the regular admission requirements, you may apply under the Mature Student admission requirements.
English Language Assessment | Minimum Scores for Certificates, Diplomas and Advanced Diplomas, and Post Graduate Certificates, Post-graduate Diplomas | Minimum Scores for Bachelor Degrees and Creative Communication (excluding Nursing) | Minimum Scores for Applicable Health Related Programs*** |
---|---|---|---|
CAEL Online or In-Person | Overall band score of 60 | Overall band score of 70 and Writing of 60 | Overall band score of 70 and Writing of 60†† |
IELTS Academic Level | Overall 6.0 and No band below 5.5 | Overall 6.5 and No band below 6.0 | Overall 7.0 and No band below 6.5 |
Password Skills | Overall 6.0 and No band below 5.5 | Overall 6.5 and No band below 6.0 | Overall 7.0 and No band below 6.5†† |
LINC Certificate | 7 | 8 | Successful completion of Communication for Health Care Professions†† |
Duolingo Language Test† | 115 and above+ with a min. of 95 in each section | 125 and above with a min. of 100 in each section | N/A†† |
New English for Academic and Professional Purposes | Successful completion of the program 5 (min 70%) | Successful completion of the program 5 (min 70%) | N/A†† |
PTE | 54 overall Min 50 in each skill |
60 overall Min 55 in each skill band |
N/A†† |
TOEFL-ibt Academic Level | 80 (20L, 20S, 19R, 21W) |
90 (22L, 22S, 22R, 24W) |
98 (24L, 23S, 24R, 27W) |
Academic English Program for University and College Entrance Program (AEPUCE) | Successful Completion | Successful Completion | N/A†† |
CELBAN | N/A | N/A | 8, 8, 8, 7†† |
†The Duolingo Language Test will no longer be an approved English proficiency test for applications to the Bachelor of Nursing and Allied Health Programs
††These English Language Assessments will not be accepted by Medical Laboratory Sciences
***Applicable Health Related Programs:
Students may apply for financial assistance through the Manitoba Student Aid program. For general information on applying please call 204-945-6321 or 1-800-204-1685, or visit their website at www.manitobastudentaid.ca, which also includes an online application. For detailed information, please visit one of the RRC Polytech Student Service Centres or call 204-632-2327. Applicants requiring financial assistance should complete their student loan applications well in advance of the class start date.
Students will learn to share technical information in written and spoken form to individuals with varying levels of technical knowledge. Learners will improve their communication and interpersonal skills so that they can collaborate and network to keep their technical expertise up to date and to find solutions. Students will practice presentation skills and will learn to conduct security training sessions. Productivity software will be used to format documents properly and to illustrate data in a way that enhances technical reports.
Students will further develop their abilities to convey technical information to various audiences in verbal and written form, with a focus on using persuasive language. They will also learn to document processes to preserve and share information. They will practice providing feedback to team members, resolving conflicts, mentoring others and teaching people about security best practices.
Learn and practice skills, attitudes, and behaviours that will help you to succeed in your professional career. You will reflect on your past and current learning so that you can confidently write about and discuss your skills and experiences. You will examine the role of culture on your personal and professional interactions. You will start an ePortfolio which you’ll continue to develop during your studies in this program. Most class time will be dedicated to group and class discussions.
You will improve your ability to confidently describe your skills in written and verbal form so that you can clearly convey your abilities to people in your network such as potential employers or clients. You will also continue to develop your intercultural, interpersonal, and academic skills through activities and discussions, which encourage introspection, reflection, and teamwork. Development of your ePortfolio will continue in this course.
Learn professional skills that will help you to succeed in your career. Reflect on yourself and your relationship with others, including your peers, in order to develop your self-awareness and intercultural competence. Practice self-management skills such as prioritizing, time management, goal setting, and self-motivation. Development of your ePortfolio will continue in this course.
This course is a detailed study of project management techniques and issues related to the field of information technology with specific attention to addressing the challenges surrounding software development projects. Using methodologies defined by the Project Management Institute (PMI), the course examines the initiation, planning, control, and closure of projects within the highly dynamic framework of iterative and incremental development methodologies, including agile approaches. Major areas of focus will involve management of communications, human resources, time, procurement, financials, risk, and quality with a guiding principle to deliver results that meet deadlines, budgets, and stakeholder exceptions.
Students will learn the terminology and concepts necessary to be successful in the field of Information Security. Industry specific standards and regulations will be examined. Students will also explore the different roles and certifications that encompass this industry.
Students will learn various aspects of cryptography as it relates to Information Systems. Students will see basic cryptographic algorithms and examples and learn modern one-way encryption and key based cryptographic communication and storage. They will implement various types of encryption on systems with the goal of benchmarking performance versus security.
Students will be prepared to implement hardware security in the network. Focusing on Unified Threat Management (UTM) devices, students will learn how to properly design and implement security architecture and controls. Students will also learn how to implement security management and analytics to monitor the effectiveness of their installation.
Students will learn how to recognize and classify malware, analyze payloads and implement mitigation. Students will see basic malware examples and delivery systems. Students will develop necessary skills to use malware analysis software.
This course introduces a variety of topics to build students’ skills and understanding of networking, Windows Server, and Security Architecture. The course also introduces networking devices and the Cisco IOS software. Students will learn how networks are set up, how devices are configured, how communication takes place on a network and the basics of implementing network security best practices which will enhance the students’ confidence in communicating their knowledge and work in networking-related professions. Students will install and configure Windows Server Active Directory which will include maintaining users and groups. Students will create and secure file shares in a Windows Server environment. Students will install Windows client software and configure the client to be part of the domain which will allow them to perform testing to demonstrate security compliance. Students will design and demonstrate a secure small/medium sized network which will incorporate their knowledge of networks, servers and security best practices.
This course will provide the skills to install, configure and use an instance of Linux in a virtualized environment, with the goal of having the necessary skills to deploy and use Linux for typical information security activities. Further, students will obtain an understanding of modifying and creating the python scripts that are necessary to automate many information security activities.
Students will learn how to conduct a vulnerability assessment using relevant analysis tools. They will also learn to analyze security events and search for and identify anomalies. Usage of penetration testing tools will also be taught to perform the appropriate tests. Students will then create a penetration report from the results of the testing.
This course introduces students to a wide range of security topics such as how website attacks occur and who is attacking. Students will implement cryptography, web security, and understand web exploits. Emphasis will be on real world examples of vulnerabilities and how they will be exploited, as well as how to create more secure web servers and web sites.
Information security risks to organizations and infrastructures will be examined. Students will develop detailed risk analyses, assessments, produce mitigation solutions, and develop policies and procedures needed to help mitigate risk. Case studies, risk management frameworks and practical real-world examples will be used to help students identify, understand and mitigate against risk.
The discipline of security architecture is a systematic, holistic and repeatable process for securing the enterprise. This course will introduce students to what security architecture is, why it is useful, who creates it, and approaches used to create it. Students will become familiar with security architecture in practice through the creation of architectural artifacts.
Students will conduct forensic investigations by learning to analyze forensic artifacts and data. A number of tools will be covered to assist in the investigation, such as event management tools, forensic tools and reverse engineering tools. Students will also learn how to respond to incidents and guide remediation.
Students will learn the four major areas of security management: information security governance, information risk management, information security program development and management, and information security incident management. These topics will be covered from a management perspective to effectively oversee an organization's security environment.
Co-operative Education (Co-op) integrates related on-the-job experience with classroom theory by incorporating a term of paid employment in the final term of the program. The employer, the student and the College form a partnership to extend the learning process beyond the College into the professional business world and students are given the opportunity to practice and apply the skills gained during the academic semesters of their program as productive full-time employees. It is a proven training system where everyone shares in the benefits. A limited number of Co-op positions are assigned through a competitive process each term. A Co-op tuition fee is charged to all students registered in a Co-op work term to cover work placement development, pre-employment instruction, and employment-related monitoring. Student performance will be monitored and evaluated by both the department and the employer.
Recognition of Prior Learning (RPL) is a process which documents and compares an individual's prior learning gained from prior education, work and life experiences and personal study to the learning outcomes in College courses/programs. For more information, please visit www.rrc.ca/rpl.