Program Overview
Security violations, data breaches, and privacy failures are an ever-growing threat to businesses and individuals. Through classroom theory and hands-on projects in our advanced diploma program, you'll learn how to identify, analyze, and mitigate threats to internal IT systems and/or networks. You'll explore the systems, tools, and concepts used to minimize the risk to an organization's cyberspace, and the standards and procedures to protect the confidentiality, integrity, and availability of information and information systems. As one of the world's fastest growing technology fields, the demand for cybersecurity professionals has never been greater.
Duration
This program can be completed within one academic year.
Admission Requirements
Profile F
Post-secondary diploma in network administration; or
University degree in computer science with coursework in networking; or
Equivalent work experience in computer network administration and applications
Career Possibilities
You will be well prepared for positions in which you will identify and document requirements, assess physical and technical security risks to data, software and hardware, and help develop policies, procedures and contingency plans to minimize the impacts of security breaches. Cybersecurity and information security is an area with a shortage of skilled applicants, and industry demand is expected to continue to grow as cyber threats become more sophisticated.
In 2016, there were 331,535 vacancies across Canada (3,737 in New Brunswick) for positions that required cybersecurity knowledge or training. As a graduate of this program, you may find work in a range of positions such as cyber defence analyst, cyber defence infrastructure support, and vulnerability assessment and management consultant.
NOC Codes
0213 - Computer and information systems managers
2171 - Information systems analysts and consultants
2281 - Computer network technicians
What you will learn
- Network Security
- Operating Systems Security
- Emerging Security Issues, Risks, and Vulnerabilities
- Cryptography
- Risk and Vulnerability Analysis
- Information Assurance
- Data Management
- Identity Management and Authentication
- Business Continuity Planning and Security Models
- Computer Defense Techniques and Tools
- Risk Management Strategies
- Incident Detection and Classification
- Incident Response and Remediation
- Criminal law
- Forensics
Specific Considerations
This program is a Learning Integrated Virtually Everywhere (L.I.V.E) program that requires the use of a notebook computer as part of the learning experience. Your notebook computer should meet minimum technical specifications to ensure the software for your program operates effectively.
Students may be required by host agencies or employers to provide a current criminal records check and/or a reliability or secret clearance from a service recognized by the host agency or employer before they may start their work placement.
Tidak ada komentar:
Posting Komentar