Cookie Consent by Trebas Institute Computer Security Analyst Program | Montreal | Trebas Institute

LEA.DU: Computer Security Analyst – Montreal

Our personal data is now digitized and connected, so it is essential to be able to ensure its security. 

Businesses, agencies, and individuals require the services of the best experts to design solutions, perform penetration tests, and ensure the overall security of the digital infrastructure of their business operations.

Trebas Institute’s Computer Security Analyst program will train you in best practices in computer security. This will give you the tools and skills to participate in the development of models, systems, or resources to protect computer data.

Tuition fees

 

French Workshops available!

Check out our Student Services page under "Support for Academic Success" section for more info.

Student Services

 

Key facts

Intakes: January, April, July and September

ELIGIBLE FOR POST-GRADUATION WORK PERMIT

1320 Hours

Domestic Students:
18 Months

International Students:
24 Months

5 Semesters

Full-time

Different schedules available

ACS (Attestation of College Studies)

Program delivered in French or English

Scholarships and Grants

Scholarships and Grants are available for a limited time. *T&Cs apply.

Program Overview

During this term you'll learn:  Doing workplace research, tasks and responsibilities related to the IT security analyst function, analyzing  and solving simple problems using basic algorithms, determining error-correcting strategies, and using debugging tools. You will also learn how to use mathematics applied to solving computer problems. To do this, you will learn to recognize and process the representations of numbers, to represent geometric figures in two dimensions through equations, to model logical reasoning, and to process quantitative data. You will also learn how to prepare and organize computers, devices, and components for different operating systems to ensure their effectiveness in carrying out the tasks required for their use in connection with computer security. Finally, you will learn how to analyze and participate in the development of network infrastructure, to evaluate and choose the hardware and software components wisely, and to produce design documents (wiring plans, diagrams, architecture, etc.).

  • Introduction to the computer work function - 45h
  • Programming and problem-solving languages - 75h
  • Mathematics Applied to Computer Science - 60h
  • Software and hardware environment - 60h
  • Computer Networks I: Design - 45h

During this term you will learn:  How to produce the various elements required (plans, diagrams, tables, etc.) for writing technical quotes and reports; choosing, installing, and monitoring computer monitoring software; applying security intervention procedures and performing computer security prevention operations. You will also learn how to develop and set up interconnection structures, analyze material needs, install devices, and keep track of your work. Finally, you will learn how to provide support to users, how to write and determine documents to help users, how to build trust and help with users, and how to help them resolve their problems.

  • Technical writing - 45h
  • Preventive surveillance of cyber threats - 45h
  • Computer security risk analysis - 45h
  • Computer Networks II: Interconnection - 75h
  • Training and support for users - 60h

During this term you will learn:  Defining  the characteristics of a local network; installing, connecting, and configuring interconnection devices; connecting computers to the network; setting up shared services and testing to  ensure the network works optimally. You will also learn  how to determine input and output data, the nature of simple algorithm processing, and how to use programming language to encode block chain algorithms. You will also learn to test, inspect, and debug the code used for the block chain. Finally, you will learn how to  analyze information security risks; apply recognized security measures; test the computer security of your solutions, and improve security measures.

  • Computer Networks III: Deployment - 75h
  • Block chain technology - 105h
  • Cybersecurity and intrusion tests - 105h

During this term you will learn:  Recognizing and evaluating the best IT security strategies; using error and exception control techniques and using cryptography utilities. You will also learn how to analyze network architectures in order to discover flaws; Choose and install monitoring software; finding and solving vulnerabilities; quickly recognize signs of intrusion and  intervene to ensure the security of the information to be protected. You will eventually learn to recognize crimes and criminal acts in the field of computer science; to develop an ethical professional sense, and prepare for your integration into the labour market.

  • Application Security Strategies - 105h
  • Cyber-defence of the computer network - 105h
  • Computer job integration - 60h

In this final term you will learn: To  establish professional relationships with clients and users through your attitudes and behaviors, to work and integrate into an interdisciplinary team, and to understand your ethical and legal responsibilities as a professional analyst. You will have the opportunity, through a 210 internship, to integrate all the learning achieved during your program.

  • Internship in computer job integration - 210h


Get in touch

Inquire today - classes filling quickly

 

Students Hivan Arvizu Soyhivan Unsplash


Skills and Competencies

Throughout this program, you will develop some of the following skills and competencies:

  • Process information related to work environment in the computer field
  • Install and manage computers
  • Use programming languages
  • Solve IT problems with mathematics
  • Use office software
  • Deploy a local computer network 
  • Security prevention operations on information security 
  • Interact in a professional context 
  • Evaluate software and hardware components 
  • Provide computer support to users
  • Deploy computer network interconnection devices computer networks
  • Monitor computer networks
  • Collaborate in the design of a computer network 

Career Outlook

Our graduates will be able to pursue successful careers in the following roles:

 

  • analyst - computer systems
  • IT Business Analyst (information technology)
  • business analyst
  • computer application analyst
  • systems security analyst
  • systems analyst
  • computer business systems analyst
  • information systems analyst / computer systems
  • computer systems analyst
  • computer quality assurance analyst
  • software quality assurance analyst
  • computer systems quality assurance analyst
  • information systems analyst
  • systems security analyst
  • computer security analyst
  • internet security analyst
  • information technology analyst
  • functional analyst in computer systems
Back to top