Our Information Security Program recognizes that data and information are critical assets to any organization, so securing and protecting them is everyone’s business. Consider the endless media stories about the loss of confidential information (often customer data) that occurs either because hackers have bypassed the cyber security controls or because employees were not paying enough attention when using their mobile devices, laptops, or home computers. The courses in this security program covers a broad range of topics within the realm of information and communications technology (ICT) security management, including infrastructure, systems, applications and information protection. Get an operational understanding of cyber security as it relates to detection, reporting, protection and risk controls. Learn how to plan, deploy and execute security controls to assess and protect an organization’s data and information from cyber threats. The content covered in this security management program reflects the core body of knowledge (CBK) and subject domains of many professional certification exams on information security, privacy, and risk management (including the CISSP, CISA, CRISC, CISM, CCSP, and CIPP credentials).
For more information, consider an Information Security Program information session.
Career options typically include cyber security analyst, information security analyst, cyber security specialist, information security co-ordinator, information security officer, risk analyst, risk and control officer, compliance analyst, security manager, risk manager and various IT analyst positions (such as operations, business, system and security analyst).
Once you have completed all the requirements of this program, you can request to receive a certificate of completion using the department contact information on this web page.
Core Courses (Three)
This is the recommended completion order:
- Contact Information
- Technology Department