Computer Security and Investigations



Similar documents
Computer Engineering Technician

Pharmacy technicians work very closely with pharmacists to achieve optimal drug therapy outcomes for patients.

Practical Nurses have a role in society that offers a range of choices and opportunities. You will make a difference.

Massage Therapy. Program Highlights. Why Choose Fleming

Occupational Therapist Assistant and Physiotherapist Assistant

Network Engineering Technology

Cisco Network Specialist CCNA

BUSINESS HUMAN RESOURCES PROGRAM (B134)

BUSINESS HUMAN RESOURCES PROGRAM (B134)

Information Technology Cluster

DENTAL OFFICE ADMINISTRATION PROGRAM (S115)

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Information & Telecommunication Technology

Computer Information Technology

RESEARCHING AND CHOOSING A SCHOOL

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

BUILDING RENOVATION TECHNICIAN PROGRAM (T110)

Networking and Information Security

Cyber Security. Vision. Mission

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Bachelor of Information Technology

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

COMPUTER NETWORKS AND SECURITY A FUTURE IN

RESEARCHING AND CHOOSING A SCHOOL

Technology Approved Certifications

RESEARCHING AND CHOOSING A SCHOOL

Michelle Govan & Anand Philip Network & Security Engineering

November 2, Dr. Bettie Rose Horne, Chairman, and Members, Committee on Academic Affairs and Licensing

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

BUSINESS HUMAN RESOURCES PROGRAM (B134)

The College of Information and Computer Technology

INDIANAPOLIS, IN 2011 CATALOG Volume 78

Minnesota State Community and Technical College Detroit Lakes Campus

School Reviews - Students Searching, Choosing and Choosing

Information Technology 2015 Programmes

Researching and Choosing a School

Researching and Choosing a School

Associate s Degree Program

BUSINESS HUMAN RESOURCES PROGRAM (B134)

Computer Information Science xxx

Brandman University. School of CCNA

HUMAN RESOURCES MANAGEMENT

Computer Science CATALOG 2014/2015 BINUS UNIVERSITY

Cybersecurity AAS Program

EDUCATION FOR THE FUTURE.

Information Technology Division

COMPUTER PROGRAMMER ANALYST PROGRAM (T127)

Computer and Information Science

Sandhills Community College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Forensic Certifications

New-Age Undergraduate Programme

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK

COLLEGE TEACHERS TRAINING FOR INTERNATIONALLY EDUCATED PROFESSIONALS (ONLINE) - POSTGRADUATE PROGRAM (R413)

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Researching and Choosing a School

Career Paths in Information Security v6.0

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

Cybersecurity Major. College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 3 August 2015.

Information Technology

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Computer Network Engineering

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

BUSINESS ADMINISTRATION - MARKETING PROGRAM (B108)

Connecting PTE to Careers in Idaho

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Computer Information Technology

INFORMATION TECHNOLOGY

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

COLLEGE TEACHERS TRAINING FOR INTERNATIONALLY EDUCATED PROFESSIONALS (ONLINE) - POSTGRADUATE PROGRAM (R413)

PROGRAMME DETAIL SPECIFICATION. Programme Summary

Criminal Justice. Criminal Justice, Computer Forensics. Program Description

Researching and Choosing a School

Career Analysis into Cyber Security: New & Evolving Occupations

COMPUTER AND INTERNETWORKING TECHNOLOGIES

Information Security Systems

ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY COMPUTER INFORMATION SYSTEMS. BS in INFORMATION TECHNOLOGY

CYBER SECURITY TRAINING SAFE AND SECURE

Transcription:

Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09, 2017 Tuition and Ancillary Fees (Domestic): Tuition and Ancillary Fees (International): $4,024.57 per semester* $8,928.35 per semester* PRINTED ON: JUNE 17, 2016 The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. Program Highlights The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. Your classes are regularly reviewed and improved to be the most current subjects demanded by the industry, such as: Advanced Ethical Hacking Threat and Risk Analysis Information Security Advanced Computer Forensics Internet and Hacking Investigations CISCO Network Design and Management Network Security Criminology Justice Studies In addition to these cutting edge subjects, you will also learn how to develop systems, procedures, and human resources to manage the risks associated with information technology - and be capable of providing technical assistance to prevent, investigate, and protect individuals and organizations from cyber-crime. Your studies will be from a security management and law enforcement perspective, with emphasis placed on both the technological and management skills required to implement information technology security, and the investigative skills necessary to respond appropriately to breaches of security. You will have the added benefit of courses in law, justice, and criminology, taking advantage of Fleming College s reputation and experience in these fields, in addition to obtaining the technical training you need to function as a technological consultant. In this three-year program, the final sixth semester is an applied project or co-operative

field placement in partnership with business, industry, a law enforcement agency, or government department. Why Choose Fleming Fleming has a well-known track record of producing talented graduates in both the Applied Computing and Engineering Science, and the Law and Justice fields. As such, you will acquire the best we have to offer--in a new, winning combination that will put you on the road to success as an in-demand computer security specialist. There are no other programs like this in Ontario. The program will provide you with the knowledge and skills to prepare you for industry certification in both the computer forensics and networking disciplines. As you progress through the program you will gain the skills required to become industry certified in a number of areas, including: CCNA Cisco Certified Network Architect CCE Certified Computer Examiner Security+ Network+ A+ Linux+ MCSE Microsoft Certified System Engineer CISSP Certified Information Systems Security Professional (student level qualification) CEH - Certified Ethical Hacker EnCE - Encase Certified Examiner With your diploma, and these top certifications, you will demonstrate your abilities and value to the industry, gaining you the employment advantage. Work Experience In your final semester, you will work on an intensive team project or co-operative field placement. Each student will contribute specialized knowledge, learned in his or her program of study, to the solution of a real world technological problem posed by a sponsoring business or organization. Recent projects include: Co-operative placements within financial and forensic firms, working real cases Co-operative placements within corporate security departments and information security service providers Security and penetration testing of a large Internet Service Provider Forensic analysis and creation of standards for a security corporation Development of a Linux based Darknet and Intrusion Detection system for a professional penetration testing company Development and field deployment of a computer network Intrusion Detection System for a managed security service company to support large commercial clients This applied project or co-operative field placement will enhance problem-solving skills, applied industry knowledge, and the ability to work as part of a team. You'll also learn critical workplace skills such as time management, how to map a critical path, and presentation skills. Since you may be working on sophisticated developmental or research based work, sponsors will often use the project as a testing ground and recruitment opportunity.

Is this You? excellent oral and written communication skills good problem solving skills creative and analytical thinking skills previous computing experience able to keep a cool head in a crisis research and investigative skills and interest desire to learn and be challenged strong time management skills Career Opportunities Career opportunities are available in both public and private sector organizations. Job titles include: Information Technology Security Analyst Information Security Administrator Computer Security Consultant Investigator Network Security Specialist Computer Forensics Examiner Digital Investigative Specialist Starting salaries for many positions are $40,000 to $60,000. Industry surveys identify that IT security professionals, with the security skills you will acquire, consistently earn higher income than others in the industry. Minimum Admission Requirements OSSD with the majority of credits at the College (C) and Open (O) level, including: 2 College (C) English courses (Grade 11 or Grade 12) 2 College (C) Math courses (Grade 11 or Grade 12) When (C) is the minimum course level for admission, (U) or (U/C) courses are also accepted. Mature Students If you are 19 years of age or older before classes start, and you do not possess an OSSD, you can write the Canadian Adult Achievement Test to assess your eligibility for admission. Additional testing or academic upgrading may be necessary to meet specific course requirements for this program. Advanced Standing Do you have another college diploma, or have you completed other technology courses at another college or university? You may be eligible for advanced standing entry to the Computer Security and Investigations program. With this fast track option, you can quickly complete the program and become qualified to enter the field of computer security. Contact the program coordinator to find out how you can take advantage of this opportunity.

Transfer Agreements University of Ontario Institute of Technology Curriculum for Computer Security and Investigations Semester 1 COMP 482 Introduction to Cyber Trends and Digital Evidence 45 COMP 191 Computer Hardware 45 LAWS 245 Introduction to Canadian Justice for Legal Professions 45 COMP 86 Software Fundamentals 60 COMM 201 Communications I 45 MATH 108 Mathematics for Computer Security Investigations 60 Semester 2 COMP 525 Introduction to Networks 60 COMP 497 Concepts of Information Security and Risk Management 45 COMP 91 Operating Systems I 45 COMP 234 PERL 45 LAWS 84 Cyber Law 45 LAWS 18 Criminology 45 ORGB 13 Developing Effective Teams 45 Semester 3 COMP 13 Computer and Network Security 45 COMP 38 Emergency Management & Operational Security 45 COMP 51 Internet Investigations 45 COMP 75 Operating Systems II 45 ELCT 20 Managing Technical Projects 45 COMP 526 Routing and Switching Essentials 60 GENED General Education Elective

Semester 4 COMP 33 Digital Investigation 45 COMP 43 Info Management & Cryptography 45 COMP 527 Scaling Networks 60 COMP 528 Connecting Networks 60 COMP 265 Intro to Pentesting & Intrusion Analysis 45 LAWS 17 Criminal Procedures 45 Semester 5 COMP 3 Advanced Investigations 45 COMP 20 Computer Forensics 45 COMP 85 Security Architecture Data Management 45 COMP 232 Firewalls and Intrusion Detection 45 COMP 357 Advanced Pentesting 45 GNED 42 Working With Business and Industry 45 Semester 6 APST 11 Applied Project - CSI 350 Every attempt is made to ensure the accuracy of the information on our website and in our publications. The College reserves the right to modify or cancel any course, program, fee, timetable, or campus location at any time.