Fanshawe Career Guide
Print
Share

Information Security Management ISM


Heavy workload

  • Seven courses in your first semester
  • 2 - 3 hours of study required for each hour in class
  • 21 hours of class (63 – 84 hours/week commitment)

Holland Code: I (Investigative)

What academic skills do I need to be successful in the program?

This list does not replace the admission requirements you must have for admission to the program. Please see website for details.

General requirements

  • This is a graduate certificate program meaning applicants need to have a business or IT related college diploma or university degree or work experience to enter the program.
  • Strong writing skills are required to compose security policy documents and threat analysis.
  • Be able to understand basic numbering systems as used in cryptography and network protocols.
  • Be able to understand complex protocols used in network communication.
  • Have a broad understanding of networks, applications, operating systems, wireless, system development, understanding technology trends and their impact on business.

What personal qualities should someone interested in this career have?

  • Ability to speak clearly and use excellent communication skills
  • Think logically and analyze complex problems
  • Pay attention to details and use abstract logic at the same time
  • Remain patient and persistent when dealing with frustrating Problems and frustrated users
  • Able to take a methodical approach to work that requires precision
  • A high degree of honesty and integrity
  • Not easily frustrated, adapt to change quickly
  • Work independently as well as in a team environment
  • Get along with all kinds of people
  • Able to take responsibility for projects that require planning, decision making and coordinating the work of others
  • Work well under pressure and meet deadlines
  • An active interest in keeping up with technological advances
  • Good stress management skills

What kind of work could I do when I graduate?

Graduates of this program may go on to become a …

CISO - Chief Information Security Officer; Security Analyst; Chief Security Officer; Information Security Auditor; Network Security Analyst; IT Technical Security Specialist; or Threat-Risk/Vulnerability Security Specialist.

Typical working conditions for this kind of work:

  • Work in an office environment with either regular hours, shift work, or on call depending on place of employment
  • Work is time sensitive
  • Work environment is frequently changing
  • Work requires long periods of sitting at a computer

Places you may find yourself employed include

Consulting firms that provide technical support services for other organizations; information systems departments of large organizations; municipal, provincial and federal governments; or educational and financial institutions.

Tasks a graduate may do in the workplace

  • Configuring and setting up secure networks and networking equipment, auditing procedures, monitoring status of systems, reviewing/writing policies, reviewing network activity for suspicious behaviours, training other employees on security

Auditor

  • Review, evaluate and provide proactive, control related advice regarding the effectiveness of control systems, policy, standards and procedures; performance of computer information systems and software; security and control systems that protect the integrity, confidentiality and availability of information and systems
  • Evaluate the authorization, accuracy, completeness and timeliness of transaction processing and controls in business systems
  • Review application systems and business procedures to determine if they are achieving business objectives
  • Other financial and operational audits and projects

Security

  • Ensuring that authorized users don't do things that might compromise information availability, integrity or confidentiality
  • Preventing hackers from disabling computers or seeing, modifying or destroying the information that servers and media contain
  • Develop plans to safeguard computer files and meet emergency data processing needs
  • Co-ordinate the implementation of computer systems plans with other people in the organization and outside vendors
  • Test systems and procedures to make sure security measures are working
  • Modify data and application files to change user permission, install security updates and remove programs or services not essential to the business operation
  • Monitor the use of information and regulate access to safeguard it
  • Write reports to document computer security and emergency measures policies, procedures and test results

Helpful links for further research into this Fanshawe College program and career opportunity

Websites with good information for further research on the careers associated with this program

  • Security+ (CompTIA)
  • CCNA – Security (Cisco Certified Network Associate – Security)
  • SSCP – Security Systems Certified Practitioner ( ISC2)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Manager (CISM)
  • Global Information Assurance Certification GIAC – GSEC
  • Certified in Risk and Information Systems Control (CRISC)
  • Canadian Association of IT Professionals (CIPS)
  • Information and Communications Technology Council (ICTC)
  • ISC2 (International Information Systems Security Certification Consortium)
  • Fanshawe’s library has prepared a subject guide for current students in this program. You may find the links and information provided very useful in learning more about this career.

Take the next step

View our Admissions Timeline to learn the steps and how to apply.

Ready to apply? Apply now!

Last Modified: January 15, 2024