Program Overview
Program Details
Full Time Offerings
Part Time Offerings
Full Time Offerings
Your Learning Experience
The Information Security Management post-graduate program will teach you how to manage both the operational and strategic aspects of information security. In just one year, you’ll develop the skills to identify how a business is vulnerable, and how to best safeguard their information. You’ll also learn detailed practical aspects of security such as risk analysis, vulnerability testing, writing security policies, implementing access controls, and performing security audits.
When you graduate, your career options will be as diverse as your future clients. Give your career security while helping companies keep their data safe.
This one-year Ontario Graduate Certificate program is designed to provide students with a holistic approach to information systems security as it applies to business. The program will provide a broad understanding of security concepts and concentrate on industry best practices for information security. Students will gain the knowledge required to manage both the strategic and operational aspects of information security. The focus will be on addressing the following questions:
- What business assets need protection?
- What are the vulnerabilities and threats to the business and the assets?
- What safeguards need to be implemented to protect the business?
- Did the protection measures or safeguards work?
Students will develop the skills to identify vulnerabilities to business and implement effective safeguards to minimize risks to acceptable levels. They will learn detailed practical aspects of security such as risk analysis, vulnerability testing, writing security policies, implementing access controls and performing security audits. An emphasis will be placed on interpersonal, organizational, technical, communication and problem-solving skills applied to enhance the effective implementation of security in a business environment. A part-time, online version of this program is available.
Career Information
Fanshawe’s Information Security Management program will prepare graduates to take advantage of the growing opportunities in the information security field. Graduates will be an asset to any information technology department in virtually all sectors of business. Graduates can expect to find opportunities as consultants or in security management roles, including:
- Information Security manager
- Information Security Consultant
- Risk analyst/manager
- Security analyst
- Forensic analyst
- Information Security penetration tester
- Information security auditor
- Network security analyst
- IT technical security specialist
- Threat-risk/vulnerability security specialist
Did you know Fanshawe consistently ranks high in graduate employment rates among large colleges in Ontario?
Here are some examples of career opportunities for graduates of Fanshawe’s Information Security Management program:
Cyber Security Analyst
Keep an organization’s data safe by creating and supporting a secure IT infrastructure
Audit and Compliance Analyst
Ideal for well-organized and technically experienced individuals with the ability to understand various compliance requirements and interpret and communicate them to teams
IT Security Specialist
Support the development, implementation, monitoring and maintenance of security controls, processes, procedures and systems.
Learning Outcomes
The graduate has reliably demonstrated the ability to
1. apply knowledge of computer operating systems, networking, and various application software to the simulation of business processes.
2. develop best practices to protect business resources through the application of knowledge of vulnerabilities and exploits.
3. develop security strategies for the deployment of security procedures and protective devices.
4. Integrate information technology strategies that support business functions by employing knowledge of best practices of business processes and systems.
5. develop security plans and strategies to include acceptable use of business information and systems by internal employees, contractors, consultants, business partners and customers.
6. develop security plans and strategies to ensure the integrity of information in compliance with best practices, relevant policies, standards, and regulations.
7. apply project management principles in the deployment of security policies and strategies.
8. perform security audits to ensure compliance with security plans, policies, standards, regulations and best practices.
9. develop and deliver a corporate training program to communicate both orally and in writing the security requirements for compliance with security policies.
10. prepare security documentation for approval by senior management and present results of security audits.
Academic School
Program Coordinator:
Art Mackiewicz
Academic Advisor:
Cynthia Lessard
Admission Requirements
OR
Acceptable combination of related work experience and post-secondary education as judged by the College to be equivalent to the above
International Admission Equivalencies
English Language Requirements
English Language Requirements
Test | Score |
---|---|
TOEFL iBT | 88 |
IELTS Academic | Overall score of 6.5 with no score less than 6.0 in any of the four bands |
CAEL | Overall score of 70 with no score less than 60 in any of the four bands |
PTE Academic | 59 |
Cambridge English | Overall score of 176 with no language skill less than 169 |
ESL4/GAP5 | Minimum grade of 80% in Level 9, 75% in Level 10 |
Duolingo | Overall score of 120, with no score lower than 105 |
Recommended Academic Preparation
Recommended Academic Preparation
- Previous IT post-secondary education and/or training and/or work experience.
Applicant Selection Criteria
Applicant Selection Criteria
Where the number of eligible applicants exceeds the available spaces in the program, the Applicant Selection Criteria will be:- Preference for Permanent Residents of Ontario
- Receipt of Application by February 1st (After this date, Fanshawe College will consider applicants on a first-come, first-served basis until the program is full)
- Achievement in the Admission Requirements
Courses
Level 1 | ||||
INFO-6001 | Information Security | 4 | ||
This course will concentrate on the essential concepts of information security CIA, confidentiality, integrity, and availability. The common vulnerabilities in computer and network systems and the methodology hackers use to exploit these systems will be examined. | ||||
INFO-6003 | O/S & Applications Security | 4 | ||
This course will concentrate on the vulnerabilities of Windows and LINUX operating systems. The best practices and methodologies to ensure that critical security upgrades and system patches are installed will be discussed. Vulnerabilities to web applications will be explored. | ||||
INFO-6008 | I.T. Auditing | 3 | ||
This course will concentrate on the concepts of auditing, controls and security in an IT environment. Topics covered include general and application internal controls, security, governance, standards, guidelines and regulations. Methods and procedures to assess the risks and evaluate controls over information systems in an organization will be examined. | ||||
INFO-6076 | Web Security | 4 | ||
This course will delve into the current scripting and computer languages used by modern web clients and servers, with a focus on the programming methodologies used to prevent exploitation of web security vulnerabilities. | ||||
INFO-6027 | Security Planning | 3 | ||
This course will provide necessary skills to identify essential elements of a Security Management System, and the business processes that require protection. Risk assessments will identify vulnerabilities and required countermeasures to prevent and mitigate system failures. The consequences of data loss and the required safeguards are part of the process. The course will concentrate on the principals of implementing security in an organization. As part of this process Students will prepare and assess various security policies. | ||||
INFO-6070 | Network Management | 3 | ||
In today's technology driven environment end users just want to get work done and networking is an integral part of that effort. This course focuses on managing networks and the network protocols that enable them to function and how they are used to transmit data between senders and receivers. | ||||
ACAD-6002 | Graduate Success Strategies | 1 | ||
This course presents and helps to develop some of the skills required to achieve academic and career success for graduate students. Areas of focus include college resources, study skills, and time management among other skills. The importance of Academic Integrity will be a main focus. |
Tuition Summary
London
Online
*Total program costs are approximate, subject to change and do not include the health and dental plan fee, bus pass fee or program general expenses.