Courses
Network and Security Architecture-2025/2026
Level 1 | ||||
SRTY-6002 | Securing Networks | 4 | ||
This course will study the theory and procedures required to secure a network from the edge inward. This will provide the students with the skillset to enhance network security to meet consistently changing requirements. | ||||
INFO-6080 | Securing Servers | 4 | ||
In this course, students will learn how to harden servers, implement encryption, manage identities and secure network traffic at the OS level on a large scale. This course will explore in depth other features such as Identity Manager, Certificate Authority, Advanced Threat Detection, Log Analysis, Policies, and File Services. | ||||
SRTY-6003 | Securing the Edge 1 | 4 | ||
This course will study the theory and procedures required to secure the edge of a network from potential internal and external threats. The course will provide the students with the skillset to configure and enhance network security to meet consistently changing requirements. | ||||
INFO-6070 | Network Management | 3 | ||
In today's technology driven environment end users just want to get work done and networking is an integral part of that effort. This course focuses on managing networks and the network protocols that enable them to function and how they are used to transmit data between senders and receivers. | ||||
INFO-6076 | Web Security | 4 | ||
This course will delve into the current scripting and computer languages used by modern web clients and servers, with a focus on the programming methodologies used to prevent exploitation of web security vulnerabilities. | ||||
ACAD-6002 | Graduate Success Strategies | 1 | ||
This course presents and helps to develop some of the skills required to achieve academic and career success for graduate students. Areas of focus include college resources, study skills, and time management among other skills. The importance of Academic Integrity will be a main focus. | ||||
COOP-1020 | Co-operative Education Employment Prep | 1 | ||
This workshop will provide an overview of the Co-operative Education consultants and students' roles and responsibilities as well as the Co-operative Education Policy. It will provide students with employment preparatory skills specifically related to co-operative education work assignments and will prepare students for their work term. | ||||
Level 2 | ||||
INFO-6140 | Secure Access Service Edge (SASE) | 4 | ||
This course will examine the migration of traditional enterprise infrastructure models to a Secure Access Service Edge. Every business is evolving to a secure anywhere, anytime access model. This course will focus on this evolution and how these technologies and strategies impact securing a business environment. | ||||
INFO-6043 | IT Service Management | 3 | ||
IT service management (ITSM) refers to the activities that are performed by an organization to plan, design, deliver, operate and control information technology services offered to customers. ITIL (Information Technology Infrastructure Library) is the leading standard of IT Service Management, providing a cohesive set of best practices for IT. Students in this course will learn key elements, concepts and terminology used in the ITIL Service Lifecycle, including the linkages between Lifecycle stages, the processes used and their contribution to Service Management practices. | ||||
INFO-6075 | Virtualization Infrastructure | 4 | ||
This course will cover the various technologies and business models related to virtualization and cloud computing. Students will deploy and manage a virtual infrastructure, taking into account the security considerations. Specific topics will include active directory integration, network security policies, firewall configuration and effective use of privileges, roles and permissions. | ||||
INFO-6010 | CISSP Prep | 3 | ||
This course provided students with a comprehensive overview of the domains or areas of study in the CISSP (Certified Information Systems Security Professional) certification. Domains include; Security and Risk Management), Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security. Throughout the course each domain will be studied in more detail covering the topics in the CISSP examination. | ||||
INFO-6033 | Enterprise Network Design | 4 | ||
This course will examine the business-needs based design of enterprise networks. Analysis will focus on selecting technologies to securely implement backbone, distribution and access layers utilizing the most appropriate protocols. Models are used to answer management, security, resiliency, and flexibility concerns in office, mobile, virtual, cloud and data centre environments. | ||||
SRTY-6011 | Securing Wireless Networks | 4 | ||
This vendor-neutral course explores the physical and theoretical aspects of securing wireless and mobile networks including network signals, devices, and security protocols. | ||||