COMM 4700 - Professional Practices for IT IV

This course is the final in a suite of four, and as such provides learners with the skills and knowledge to curate a personal, professional portfolio in readiness for employment in the IT industry. Learners will also regularly practice and prepare for numerous interview situations and scenarios by honing the skills and techniques previously acquired. New, essential competencies are introduced focused on diversity and inclusiveness in the workplace and the challenges surrounding ethical decision making processes.

ISEC 3077 - Attack Vectors and Techniques

Students will investigate and analyze the various techniques hackers use to bypass security measures and gain access to corporate data. This course will examine a variety of real-life case studies that include study attack data and analysis of threats.

ISEC 3078 - Incidence Handling and Response

Students will learn to design and manage key business information security functions including incident response, disaster recovery, and business continuity plans. Planning, reporting and budgeting are all addressed. Students will use business case studies to analyze and develop effective plans and solutions for various business scenarios.

ISEC 3079 - Penetration Testing

This course will explore critical phases of an attack. Scanning, enumeration, foot- printing and social engineering will all be covered. Students will also be introduced to the latest ethical hacking tools and techniques to test corporate security systems and examine the legal issues involving ethical hacking to test corporate defence systems.

ISEC 3080 - Enterprise Security

Students will build on concepts and techniques introduced in the Web Security and Operating Systems courses in order to enhance security on servers that handle email and web applications.