Graduate Certificate in Information Security Management
-
Credentials: Graduate Certificate
-
Program Duration: 4 Months (One Semesters)
-
Internship Integrated Program: No
-
INTAKES January March May September Winter Intake Spring Intake Summer Intake Fall Intake -
Fees Details Total Program Fees: $7,800 Semester 1 Tuition Fee: $6,000
Other Fees (Books, IT, Labs): $1,800
Semester 1 Total Fees: $7,800
Program Requirements
-
1. Two- or three-year college diploma or bachelor's degree in Information Technology, Computer Sciences or a related field OR Two- or three-year college diploma or bachelor's degree in any field PLUS one year of related work experience, as evidenced by a resumé.
-
2. English Language Proficiency Requirements (if applicable)English language proficiency is mandatory for international students. International students can prove their English language proficiency through one of the following methods:
1. TOEFL (Online): 80 or above
2. IELTS: 6.0 with no band score less than 5.5
3. CELPIP: Level 7 or above
4. PTE (Academic): 48 overall, minimum 40 in each skill band
5. International Test of English Proficiency (iTEP): 3.7+
6. Duolingo: 105 or above -
3. Intermediate Level Computer Literacy SkillsSufficient to navigate all digital channels and social media platforms, Microsoft 365 (applications like Word, Excel, PowerPoint, and Outlook).
-
4. Bring Your Own Device (BYOD)Students are required to purchase their own laptops from a vendor of their choice. Know more
- PROGRAM DESCRIPTION
- CERTIFICATION
- LEARNING OUTCOMES
- POTENTIAL CAREER OPPORTUNITIES
This program will prepare students to present the CISSP examination and help them earn their designation. The Certified Information Systems Security Professional (CISSP) certification has been granted a qualification level equal to that of a master’s degree across Europe. The qualification was designated as comparable to Level 7 of the Regulated Qualifications Framework (RQF) by UK NARIC, the UK’s designated national agency responsible for providing information and expert guidance on qualifications from across the world.
This program will provide graduates with the knowledge and skills required to perform the following functions associated with these roles:
- Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.
- Assess IT systems with respect to security threats such as theft, damage, as well as alternation and/or interruption of services.
- Install, configure and troubleshoot system and network enhancements to promote security in an organization.
- Communicate security protocols, policies, and audit results and related documentation to any level of the organization
- Implement and evaluate security solutions for business processes, applications and communications to protect business resources and respond to the needs of all the internal stakeholders.
- Perform vulnerability assessments for infrastructures, web and applications.
This Graduate Certificate of Information Security Management provides graduates with security management knowledge and skills required to perform the following potential roles:
- SOC Analyst
- Cybersecurity Analyst
- InfoSec Solutions Sales Specialist
- IT Security Specialist
- Information Security Analyst/Architect
- Business Continuity Manager
- Information Security Manager
- Information Security Consultant
- Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.
- Assess IT systems with respect to security threats such as theft, damage, as well as alternation and/or interruption of services.
- Install, configure and troubleshoot system and network enhancements to promote security in an organization.
- Communicate security protocols, policies, and audit results and related documentation to any level of the organization
- Implement and evaluate security solutions for business processes, applications and communications to protect business resources and respond to the needs of all the internal stakeholders.
- Perform vulnerability assessments for infrastructures, web and applications.
- SOC Analyst
- Cybersecurity Analyst
- InfoSec Solutions Sales Specialist
- IT Security Specialist
- Information Security Analyst/Architect
- Business Continuity Manager
- Information Security Manager
- Information Security Consultant
Courses
- Semester 1
- Information Security: Principles and Practices
- Digital Forensics and Incident Response
- Security Architecture and Design
- Continuity Planning and Disaster Recovery
- Security Governance and Regulatory Compliance
- CISSP (Certification Training)