QUICK FACTS
Credential:
Post-baccalaureate diploma
Duration:
49 credits (14 courses)
Format:
Full time, Part time
Start date:
September
Location:
Abbotsford campus
Cost:
(Details)
FEATURES:
- Some courses may be completed online.
- Complete the program in four semesters if you study full-time or choose to study part-time if needed. Incoming international students can qualify for entrance scholarships based on academic performance.
PROGRAM DESCRIPTION
We live in a digital age where cybersecurity is increasingly important for protecting sensitive data of all kinds. The Cybersecurity post-baccalaureate diploma provides students with core competencies in cybersecurity analysis, ethics, tools, and programming.
As a graduate of this program, you'll be well-positioned to meet local, regional, and national demand for cybersecurity professionals in all industries with valuable information data.
This program may be right for you if:
- you already hold a three/four-year bachelor's degree
- want to diversify your skillset and career opportunities
Program outline — Cybersecurity post-baccalaureate diploma
You'll complete the following courses:
|
Course |
Title |
Credits |
|
CIS 190 |
Systems Hardware Concepts |
3 |
|
CIS 192 |
Introduction to Networking |
4 |
|
CIS 221 |
Principles of Information Systems Security |
4 |
|
CIS 270 |
Analysis & Design |
3 |
|
CIS 291 |
Networking Theory and Applications |
4 |
|
CIS 321 |
Networking Security Architecture |
4 |
|
CIS 341 |
System Administration |
3 |
|
CIS 497 |
Advanced Topics Information Security |
3 |
|
COMP 150 |
Introduction to Programming |
4 |
|
COMP 155 |
Object-oriented Programming |
4 |
|
COMP 230 |
Databases and Database Management Systems |
3 |
|
COMP 325 |
Malicious Software and Attack Prevention |
3 |
|
COMP 390 |
Data Communications |
3 |
|
MATH 125 |
Introduction to Discrete Mathematics |
4 |
See the Program schedules page for a guide to which courses to take in a given semester.
CAREER EXPECTATIONS
This program focuses on skills to protect data, systems, and networks from threats. Graduates can target roles like:
- Cybersecurity Analyst
- Security Consultant
- Network Security Specialist
- Governance, Risk, and Compliance (GRC) Analyst
- Cloud Security Specialist
Wondering which roles are in the highest demand? The BC Labour Market Outlook identifies several computing professions as high opportunity occupations. These roles project excellent employment rates and strong wages:
- Information systems analysts and consultants
- Computer programmers and interactive media developers
- Software engineers and designers
The computing marketplace is always changing. To make sure students graduate with in-demand skills, the School of Computing meets with an advisory committee. This diverse committee includes industry experts from both the private and public sectors. Their expertise helps shape courses and programs to keep them timely and innovative.
ENTRANCE REQUIREMENTS
View entrance requirements in the Academic Calendar.
OTHER ADMISSION CATEGORIES
This program is open for international students: How to apply
LEARNING OUTCOMES
- Use current techniques, skills, and tools necessary for Information Systems and Technology.
- Analyze the local and global impact of computing on individuals, organizations, society, and Indigenous contexts.
- Employ interpersonal, teambuilding, and leadership skills to solve problems independently and in diverse teams.
- Apply ethical considerations in information systems practice.
- Execute an appropriate response to a cybersecurity attack on a system or organization.
- Implement secure Information Technology solutions.
- Apply current techniques, skills, and tools necessary for cyber defense within an organization.
- Demonstrate the challenges involved in the application of cybersecurity.
QUESTIONS?
Phone: 604-504-7441 ext. 4211
Toll free: 1-888-504-7441 ext. 4211
Email: computing.assistant@ufv.ca