Information Security Management

*Domestic applicants include Canadian citizens, permanent residents, protected persons and Convention refugees.
The Information Security Management post-graduate program will teach you how to manage both the operational and strategic aspects of information security. In just one year, you’ll develop the skills to identify how a business is vulnerable, and how to best safeguard their information. You’ll also learn detailed practical aspects of security such as risk analysis, vulnerability testing, writing security policies, implementing access controls, and performing security audits.
When you graduate, your career options will be as diverse as your future clients. Give your career security while helping companies keep their data safe.
This one-year Ontario Graduate Certificate program is designed to provide students with a holistic approach to information systems security as it applies to business. The program will provide a broad understanding of security concepts and concentrate on industry best practices for information security. Students will gain the knowledge required to manage both the strategic and operational aspects of information security. The focus will be on addressing the following questions:
Students will develop the skills to identify vulnerabilities to business and implement effective safeguards to minimize risks to acceptable levels. They will learn detailed practical aspects of security such as risk analysis, vulnerability testing, writing security policies, implementing access controls and performing security audits. An emphasis will be placed on interpersonal, organizational, technical, communication and problem-solving skills applied to enhance the effective implementation of security in a business environment. A part-time, online version of this program is available.
Fanshawe’s Information Security Management program will prepare graduates to take advantage of the growing opportunities in the information security field. Graduates will be an asset to any information technology department in virtually all sectors of business. Graduates can expect to find opportunities as consultants or in security management roles, including:
Did you know Fanshawe consistently ranks high in graduate employment rates among large colleges in Ontario?
Here are some examples of career opportunities for graduates of Fanshawe’s Information Security Management program:
Cyber Security Analyst
Keep an organization’s data safe by creating and supporting a secure IT infrastructure
Audit and Compliance Analyst
Ideal for well-organized and technically experienced individuals with the ability to understand various compliance requirements and interpret and communicate them to teams
IT Security Specialist
Support the development, implementation, monitoring and maintenance of security controls, processes, procedures and systems.
The graduate has reliably demonstrated the ability to
1. apply knowledge of computer operating systems, networking, and various application software to the simulation of business processes.
2. develop best practices to protect business resources through the application of knowledge of vulnerabilities and exploits.
3. develop security strategies for the deployment of security procedures and protective devices.
4. Integrate information technology strategies that support business functions by employing knowledge of best practices of business processes and systems.
5. develop security plans and strategies to include acceptable use of business information and systems by internal employees, contractors, consultants, business partners and customers.
6. develop security plans and strategies to ensure the integrity of information in compliance with best practices, relevant policies, standards, and regulations.
7. apply project management principles in the deployment of security policies and strategies.
8. perform security audits to ensure compliance with security plans, policies, standards, regulations and best practices.
9. develop and deliver a corporate training program to communicate both orally and in writing the security requirements for compliance with security policies.
10. prepare security documentation for approval by senior management and present results of security audits.
Art Mackiewicz
Cynthia Lessard
Test | Score |
---|---|
TOEFL iBT | 88 |
IELTS Academic | Overall score of 6.5 with no score less than 6.0 in any of the four bands |
CAEL | Overall score of 70 with no score less than 60 in any of the four bands |
PTE Academic | 59 |
Cambridge English | Overall score of 176 with no language skill less than 169 |
ESL4/GAP5 | Minimum grade of 80% in Level 9, 75% in Level 10 |
Duolingo | Overall score of 120, with no score lower than 105 |
Level 1 | ||||
Take all of the following Mandatory Courses: | ||||
INFO-6001 | Information Security | 4 | ||
This course will concentrate on the essential concepts of information security CIA, confidentiality, integrity, and availability. The common vulnerabilities in computer and network systems and the methodology hackers use to exploit these systems will be examined. | ||||
INFO-6003 | O/S & Applications Security | 4 | ||
This course will concentrate on the vulnerabilities of Windows and LINUX operating systems. The best practices and methodologies to ensure that critical security upgrades and system patches are installed will be discussed. Vulnerabilities to web applications will be explored. | ||||
INFO-6008 | I.T. Auditing | 3 | ||
This course will concentrate on the concepts of auditing, controls and security in an IT environment. Topics covered include general and application internal controls, security, governance, standards, guidelines and regulations. Methods and procedures to assess the risks and evaluate controls over information systems in an organization will be examined. | ||||
INFO-6076 | Web Security | 4 | ||
This course will delve into the current scripting and computer languages used by modern web clients and servers, with a focus on the programming methodologies used to prevent exploitation of web security vulnerabilities. | ||||
INFO-6027 | Security Planning | 3 | ||
This course will provide necessary skills to identify essential elements of a Security Management System, and the business processes that require protection. Risk assessments will identify vulnerabilities and required countermeasures to prevent and mitigate system failures. The consequences of data loss and the required safeguards are part of the process. The course will concentrate on the principals of implementing security in an organization. As part of this process Students will prepare and assess various security policies. | ||||
INFO-6070 | Network Management | 3 | ||
In today's technology driven environment end users just want to get work done and networking is an integral part of that effort. This course focuses on managing networks and the network protocols that enable them to function and how they are used to transmit data between senders and receivers. | ||||
ACAD-6002 | Graduate Success Strategies | 1 | ||
This course presents and helps to develop some of the skills required to achieve academic and career success for graduate students. Areas of focus include college resources, study skills, and time management among other skills. The importance of Academic Integrity will be a main focus. |
*Total program costs are approximate, subject to change and do not include the health and dental plan fee, bus pass fee or program general expenses.