Our personal data is now digitized and connected, so it is essential to be able to ensure its security.
Businesses, agencies, and individuals require the services of the best experts to design solutions, perform penetration tests, and ensure the overall security of the digital infrastructure of their business operations.
Trebas Institute’s Computer Security Analyst program will train you in best practices in computer security. This will give you the tools and skills to participate in the development of models, systems, or resources to protect computer data.
French Workshops available!
Check out our Student Services page under "Support for Academic Success" section for more info.
Intakes: January, April, July and September
Different schedules available
ACS (Attestation of College Studies)
Program delivered in French or English
Scholarships and Grants are available for a limited time. *T&Cs apply.
During this term you'll learn: Doing workplace research, tasks and responsibilities related to the IT security analyst function, analyzing and solving simple problems using basic algorithms, determining error-correcting strategies, and using debugging tools. You will also learn how to use mathematics applied to solving computer problems. To do this, you will learn to recognize and process the representations of numbers, to represent geometric figures in two dimensions through equations, to model logical reasoning, and to process quantitative data. You will also learn how to prepare and organize computers, devices, and components for different operating systems to ensure their effectiveness in carrying out the tasks required for their use in connection with computer security. Finally, you will learn how to analyze and participate in the development of network infrastructure, to evaluate and choose the hardware and software components wisely, and to produce design documents (wiring plans, diagrams, architecture, etc.).
- Introduction to the computer work function - 45h
- Programming and problem-solving languages - 75h
- Mathematics Applied to Computer Science - 60h
- Software and hardware environment - 60h
- Computer Networks I: Design - 45h
During this term you will learn: How to produce the various elements required (plans, diagrams, tables, etc.) for writing technical quotes and reports; choosing, installing, and monitoring computer monitoring software; applying security intervention procedures and performing computer security prevention operations. You will also learn how to develop and set up interconnection structures, analyze material needs, install devices, and keep track of your work. Finally, you will learn how to provide support to users, how to write and determine documents to help users, how to build trust and help with users, and how to help them resolve their problems.
- Technical writing - 45h
- Preventive surveillance of cyber threats - 45h
- Computer security risk analysis - 45h
- Computer Networks II: Interconnection - 75h
- Training and support for users - 60h
During this term you will learn: Defining the characteristics of a local network; installing, connecting, and configuring interconnection devices; connecting computers to the network; setting up shared services and testing to ensure the network works optimally. You will also learn how to determine input and output data, the nature of simple algorithm processing, and how to use programming language to encode block chain algorithms. You will also learn to test, inspect, and debug the code used for the block chain. Finally, you will learn how to analyze information security risks; apply recognized security measures; test the computer security of your solutions, and improve security measures.
- Computer Networks III: Deployment - 75h
- Block chain technology - 105h
- Cybersecurity and intrusion tests - 105h
During this term you will learn: Recognizing and evaluating the best IT security strategies; using error and exception control techniques and using cryptography utilities. You will also learn how to analyze network architectures in order to discover flaws; Choose and install monitoring software; finding and solving vulnerabilities; quickly recognize signs of intrusion and intervene to ensure the security of the information to be protected. You will eventually learn to recognize crimes and criminal acts in the field of computer science; to develop an ethical professional sense, and prepare for your integration into the labour market.
- Application Security Strategies - 105h
- Cyber-defence of the computer network - 105h
- Computer job integration - 60h
In this final term you will learn: To establish professional relationships with clients and users through your attitudes and behaviors, to work and integrate into an interdisciplinary team, and to understand your ethical and legal responsibilities as a professional analyst. You will have the opportunity, through a 210 internship, to integrate all the learning achieved during your program.
Internship in computer job integration - 210h
Our graduates will be able to pursue successful careers in the following roles:
- analyst - computer systems
- IT Business Analyst (information technology)
- business analyst
- computer application analyst
- systems security analyst
- systems analyst
- computer business systems analyst
- information systems analyst / computer systems
- computer systems analyst
- computer quality assurance analyst
- software quality assurance analyst
- computer systems quality assurance analyst
- information systems analyst
- systems security analyst
- computer security analyst
- internet security analyst
- information technology analyst
- functional analyst in computer systems