Our Information Security Program recognizes that data and information are critical assets to any organization, so securing and protecting them is everyone’s business. Consider the endless media stories about the loss of confidential information (often customer data) that occurs either because hackers have bypassed the cyber security controls or because employees were not paying enough attention when using their mobile devices, laptops or home computers. The courses in this security program covers a broad range of topics within the realm of information and communications technology (ICT) security management, including infrastructure, systems, applications and information protection. Get an operational understanding of cyber security as it relates to detection, reporting, protection and risk controls. Learn how to plan, deploy and execute security controls to assess and protect an organization’s data and information from cyber threats.
The content covered in this security management program may be of interest to those preparing for the exams for such information security professional designations as Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) and Certified Information Security Manager (CISM).
Career options typically include cyber security analyst, information security analyst, cyber security specialist, information security co-ordinator, information security officer, risk analyst, risk and control officer, compliance analyst, security manager, risk manager and various IT analyst positions (such as operations, business, system and security analyst).
Once you have completed all the requirements of this program, you can request to receive a certificate of completion using the department contact information on this web page.
Core Courses (Three)
This is the recommended completion order:
- Contact Information
- Technology Department