Enter an exciting career as a security analyst and security systems engineer - 2021/2022
Without the proper protection, our networks are vulnerable to black-hat hackers, identity thieves and spammers. There are few people who have the skills and education needed to ward off the enemies lurking behind computer screens, ready to thwart firewalls, infiltrate networks and corrupt servers. If you’ve been thinking of a career protecting the systems that run our networks and economy, the Network and Security Architecture program will prepare you for this in-demand field.
You’ll start this eight-month graduate certificate co-op program covering key aspects of designing, deploying, supporting, and securing small, medium, and enterprise network and server infrastructures. It will provide you with the fundamentals in advanced networking and security concepts to work in any situation and meet the security challenges that effect today's business environment.
Quite simply, there are not enough people qualified with this high level skill set. Fanshawe, with its existing relationship with Cisco, Microsoft, Redhat, VMware and many other vendors and specialized knowledge in everything from firewalls to server infrastructure, will put you on the fast-track to a highly in-demand career. When you graduate, you’ll be able to work as a security analyst, security systems analyst, and security architect or security systems engineer.
Admission Requirements - 2021/2022
Network and Security Architecture-2021/2022
|This course will study the theory and procedures required to secure a network from the edge inward. This will provide the students with the skillset to enhance network security to meet consistently changing requirements.|
|In this course, students will learn how to harden servers, implement encryption, manage identities and secure network traffic at the OS level on a large scale. This course will explore in depth other features such as Identity Manager, Certificate Authority, Advanced Threat Detection, Log Analysis, Policies, and File Services.|
|SRTY-6003||Securing the Edge 1||4|
|This course will study the theory and procedures required to secure the edge of a network from potential internal and external threats. The course will provide the students with the skillset to configure and enhance network security to meet consistently changing requirements.|
|In today's technology driven environment end users just want to get work done and networking is an integral part of that effort. This course focuses on managing networks and the network protocols that enable them to function and how they are used to transmit data between senders and receivers.|
|This course will delve into the current scripting and computer languages used by modern web clients and servers, with a focus on the programming methodologies used to prevent exploitation of web security vulnerabilities.|
|ACAD-6002||Graduate Success Strategies||1|
|This course presents and helps to develop some of the skills required to achieve academic and career success for graduate students. Areas of focus include college resources, study skills, and time management among other skills. The importance of Academic Integrity will be a main focus.|
|COOP-1020||Co-operative Education Employment Prep||1|
|This workshop will provide an overview of the Co-operative Education consultants and students' roles and responsibilities as well as the Co-operative Education Policy. It will provide students with employment preparatory skills specifically related to co-operative education work assignments and will prepare students for their work term.|
|SRTY-6004||Securing the Edge 2||4|
|This course will explore the principles of Intrusion Detection (IDS) and Intrusion Detection Prevention Systems (IPS) their implementation and configuration. It will build on the material studied in Securing the Edge 1 by delivering the technical knowledge, insight, and hands-on training needed to defend a network against intrusion.|
|INFO-6043||IT Service Management||3|
|IT service management (ITSM) refers to the activities that are performed by an organization to plan, design, deliver, operate and control information technology services offered to customers. ITIL (Information Technology Infrastructure Library) is the leading standard of IT Service Management, providing a cohesive set of best practices for IT. Students in this course will learn key elements, concepts and terminology used in the ITIL Service Lifecycle, including the linkages between Lifecycle stages, the processes used and their contribution to Service Management practices.|
|This course will cover the various technologies and business models related to virtualization and cloud computing. Students will deploy and manage a virtual infrastructure, taking into account the security considerations. Specific topics will include active directory integration, network security policies, firewall configuration and effective use of privileges, roles and permissions.|
|This course provided students with a comprehensive overview of the domains or areas of study in the CISSP (Certified Information Systems Security Professional) certification. Domains include; Security and Risk Management), Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security. Throughout the course each domain will be studied in more detail covering the topics in the CISSP examination.|
|INFO-6033||Enterprise Network Design||4|
|This course will examine the business-needs based design of enterprise networks. Analysis will focus on selecting technologies to securely implement backbone, distribution and access layers utilizing the most appropriate protocols. Models are used to answer management, security, resiliency, and flexibility concerns in office, mobile, virtual, cloud and data centre environments.|
|SRTY-6011||Securing Wireless Networks||4|
|This vendor-neutral course explores the physical and theoretical aspects of securing wireless networks including wireless network signals, wireless devices, and security protocols.|
More Information - 2021/2022
The graduate has reliably demonstrated the ability to:
1. Design an enterprise network by applying knowledge of networking and routing protocols.
2. Perform network monitoring, analysis and troubleshooting to determine efficient and secure operations.
3. Develop a security architecture plan to incorporate both perimeter and endpoint security controls and devices to provide layers of security.
4. Design multi-site enterprise operating system infrastructures using a security architecture framework.
5. Design a centrally managed wireless network topology that can accommodate remote sites incorporating current security standards.
6. Design and implement a virtualization and cloud computing focused infrastructure specifically addressing security risks associated with incorporating virtualization into an organizations infrastructure.
7. Deploy servers to host web applications, focusing on securing the server and web from identified security risks.
8. Identify and plan IT services that support business goals and objectives, and explain specific activities directly related to the delivery and support of the services.
Program DetailsMore details
2021/2022 academic year: Refer to the More Info tab to view offerings for the 2021/22 academic year. Canadian students can start applying in early October for programs with Sep. 2021, Jan. 2022 and May 2022 start dates through ontariocolleges.ca.
Full Time Offerings
- The Board of Governors of Fanshawe College is seeking applications for membership to fill three vacancies on the Board commencing September 1, 2021.
- Fanshawe's St. Thomas/Elgin Regional Campus encourages adult learners to consider educational options this fall.