Once you have initiated your application, be sure to choose " Network Security - Certificate " from the list of programs offered.
To be considered for admission to the certificate program in data science and analytics, you must meet the requirements outlined in the Academic Calendar.
In case of discrepancies between this page and the Academic Calendar, the Academic Calendar shall prevail. The minimum requirements are the same for all three credentials in the Information Security and Privacy graduate program, as such we recommend that students apply to the highest credential they are interested in.
The expected completion time for full-time for the graduate certificates is 8 months, the maximum time allowed is three years.
Students enrolled in the Network Security Certificate will complete all “required” courses, ISEC 621, 601 and 603, and ONE OF 4 “optional” courses, either ISEC 643, 641, 645, or 651 depending on their preference, for 4 courses or 12 credits total.
The basics of cryptographic algorithms and protocols including encryption and authentication algorithms and key establishment protocols. Security evaluation in computational and information theoretic settings, and attacks on cryptographic applications and systems.
Review of cryptographic algorithms and protocols used in network security. Network security protocols. Network security architecture. Web and Internet security. Wireless security. Approaches and tools for network intrusion detection and prevention. Traffic analysis and privacy enhancing systems. Applications of artificial intelligence and data analytics. Network system virtualization.
Offensive security, including technical and social methods. Legal and ethical frameworks as well as best practices. Automation and tool use, and defensive techniques.
Information security strategy and its alignment with business goals. Business cases for information security investment. Legal and regulatory requirements. Roles and responsibilities in information security management. Security risk assessment and management.
Development of security policies. Policy compliance and enforcement. Policy considerations for social engineering and insider attacks. Information security standards. Security awareness and training programs. Privacy policies and compliance. Privacy Impact Assessment.
Design and implementation of process for identifying, analyzing and responding to information security incidents. Computer forensics. Organization and management of the incident response and forensics team. Tools and best practices.
Advanced topics in information security and privacy.