University of Calgary : Information Security ISEC


Site Navigation
Welcome
Important Notice and Disclaimer
Academic Schedule
Types of Credentials and Sub-Degree Nomenclature
Undergraduate Degrees with a Major
Combined Degrees
Minor Programs
Student and Campus Services
Admissions
Academic Regulations
Co-operative Education/Internship
Tuition and General Fees
Awards and Financial Assistance
International Foundations Program
Faculty of Arts
Cumming School of Medicine
Faculty of Environmental Design
Faculty of Graduate Studies
Haskayne School of Business
Faculty of Kinesiology
Faculty of Law
Faculty of Nursing
Qatar Faculty
Schulich School of Engineering
Faculty of Science
Faculty of Social Work
Faculty of Veterinary Medicine
Werklund School of Education
Embedded Certificates
Continuing Education
COURSES OF INSTRUCTION
How to Use
Courses of Instruction by Faculty
Course Descriptions
A
B
C
D
E
F
G
H
I
Indigenous Languages INDL
Indigenous Studies INDG
Information Security ISEC
Innovation INNO
International Foundations Program IFPX
International Foundations Program Business IFPB
International Foundations Program Engineering IFPE
International Relations INTR
Internship INTE
Interprofessional Health Education IPHE
Italian ITAL
J, K
L
M
N, O
P
R
S
T, U
V, W, Z
About the University of Calgary
Who's Who
Glossary of Terms
Contact Us
Archives
University of Calgary Calendar 2018-2019 COURSES OF INSTRUCTION Course Descriptions I Information Security ISEC
Information Security ISEC

Instruction is offered by members of the Department of Computer Science.

Registration in all courses requires admission to the Post-Baccalaureate Certificate in Network Security or the Post-Baccalaureate Certificate in Software Security, or the approval of the Department of Computer Science.

Graduate Courses
Information Security 601       Applied Cryptography
The basics of cryptographic algorithms and protocols including encryption and authentication algorithms and key establishment protocols. Security evaluation in computational and information theoretic settings, and attacks on cryptographic applications and systems.
Course Hours:
3 units; H(3-0)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Network Security.  
back to top
Information Security 603       Network Security
Review of cryptographic algorithms and protocols used in network security. Network security protocols. Network security architecture. Web and Internet security. Wireless security. Approaches and tools for network intrusion detection and prevention. Traffic analysis and privacy enhancing systems. Applications of artificial intelligence and data analytics. Network system virtualization.
Course Hours:
3 units; H(3-0)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Network Security.  
back to top
Information Security 605       System and Application Security
Operating systems security. Software vulnerabilities and their exploits. Malware. Computer system virtualization. Application-level security. Access control models. Identity and access management.
Course Hours:
3 units; H(3-0)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Software Security.
back to top
Information Security 621       Ethical Hacking Laboratory
Offensive security, including technical and social methods. Legal and ethical frameworks as well as best practices. Automation and tool use, and defensive techniques.
Course Hours:
3 units; H(1-3-2T)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Network Security.
back to top
Information Security 623       Software Security Laboratory
Practices and tools for preventing vulnerabilities in the software development life cycle, including threat modelling, secure coding idioms and secure design patterns, static analyzers for detecting vulnerabilities, fuzzing and other quality assurance practices.
Course Hours:
3 units; H(1-3-2T)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Software Security.
back to top
Information Security 625       Mobile and Smart Device Security Laboratory
Security architecture of common smartphone platforms and Internet-of-Things environments. Selected topics on threat modelling, penetration testing, and security-aware design for smartphones, home automation, wearables, vehicles and industrial control systems.
Course Hours:
3 units; H(1-3-2T)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Software Security.
back to top
Information Security 641       Governance and Risk Management
Information security strategy and its alignment with business goals. Business cases for information security investment. Legal and regulatory requirements. Roles and responsibilities in information security management. Security risk assessment and management.
Course Hours:
3 units; H(3-0)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Network Security or the Post-baccalaureate Certificate in Software Security.
back to top
Information Security 643       Policies, Standards and Programs
Development of security policies. Policy compliance and enforcement. Policy considerations for social engineering and insider attacks. Information security standards. Security awareness and training programs. Privacy policies and compliance. Privacy Impact Assessment.
Course Hours:
3 units; H(3-0)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Network Security or the Post-baccalaureate Certificate in Software Security.
back to top
Information Security 645       Incident Management and Forensics
Design and implementation of process for identifying, analyzing and responding to information security incidents. Computer forensics. Organization and management of the incident response and forensics team. Tools and best practices.
Course Hours:
3 units; H(3-0)
Prerequisite(s):
Admission to the Post-baccalaureate Certificate in Network Security or the Post-baccalaureate Certificate in Software Security.
back to top