Information Security Management

Courses

Information Security Management-2025/2026

Level 1
Take all of the following Mandatory Courses:
INFO-6001Information Security4
This course will concentrate on the essential concepts of information security CIA, confidentiality, integrity, and availability. The common vulnerabilities in computer and network systems and the methodology hackers use to exploit these systems will be examined.
INFO-6003O/S & Applications Security4
This course will concentrate on the vulnerabilities of Windows and LINUX operating systems. The best practices and methodologies to ensure that critical security upgrades and system patches are installed will be discussed. Vulnerabilities to web applications will be explored.
INFO-6008I.T. Auditing3
This course will concentrate on the concepts of auditing, controls and security in an IT environment. Topics covered include general and application internal controls, security, governance, standards, guidelines and regulations. Methods and procedures to assess the risks and evaluate controls over information systems in an organization will be examined.
INFO-6076Web Security4
This course will delve into the current scripting and computer languages used by modern web clients and servers, with a focus on the programming methodologies used to prevent exploitation of web security vulnerabilities.
INFO-6027Security Planning3
This course will provide necessary skills to identify essential elements of a Security Management System, and the business processes that require protection. Risk assessments will identify vulnerabilities and required countermeasures to prevent and mitigate system failures. The consequences of data loss and the required safeguards are part of the process. The course will concentrate on the principals of implementing security in an organization. As part of this process Students will prepare and assess various security policies.
INFO-6070Network Management3
In today's technology driven environment end users just want to get work done and networking is an integral part of that effort. This course focuses on managing networks and the network protocols that enable them to function and how they are used to transmit data between senders and receivers.
ACAD-6002Graduate Success Strategies1
This course presents and helps to develop some of the skills required to achieve academic and career success for graduate students. Areas of focus include college resources, study skills, and time management among other skills. The importance of Academic Integrity will be a main focus.

Level 2
Take all of the following Mandatory Courses:

Group 1
INFO-6081Monitoring & Incident Response3
This course will cover techniques of the network security management cycle: data collection, threat detection, and analysis. Students will learn the skills necessary to identify and defend the network against intrusion and attack.
INFO-6010CISSP Prep3
This course provided students with a comprehensive overview of the domains or areas of study in the CISSP (Certified Information Systems Security Professional) certification. Domains include; Security and Risk Management), Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security. Throughout the course each domain will be studied in more detail covering the topics in the CISSP examination.
INFO-6139Managing Enterprise Networks3
In this course, students will explore the principles and technologies involved with enterprise network design, management, and security. You will learn the importance of enterprise design, documentation, configuration management, and technologies such as firewall, threat prevention, virtual private networks (VPN), and data loss prevention.
INFO-6065Ethical Hacking & Exploits4
This course will discuss vulnerabilities and exploits and introduce the student to methods of attack that involve the weakest component of the enterprise, the end user. The student will also learn how to identify attacks against the network and defend against them.
RSCH-6016Research Methodology & Capstone Project4
Students will advance their understanding of research through critical exploration of research language, ethics, and approaches. The elements of the research process within quantitative, qualitative, and mixed methods approaches are covered. The project enables the review of relevant literature and how research findings are useful in understanding their work.


Group 2
Take INFO-6079 or INFO-6077
INFO-6079Security Applications4
This course covers secure object-oriented software development using high-level languages such as Python. Along with shell scripting techniques and implementation of shell-scripts to perform system-related tasks. As part of implementing defensive and security analysis applications, students will experience advanced cybersecurity techniques to secure centralized and distributed ecosystems.
INFO-6077Digital Forensics4
This course prepares students to apply the principals of digital forensics to detect, recover, trace, analyze and interpret digital evidence. This course teaches students how files are structured, data recovery techniques, data hiding and how to conduct a digital investigation.

Program Residency
Students Must Complete a Minimum of 11 credits in this
program at Fanshawe College to meet the Program Residency
requirement and graduate from this program

Contact/Questions