Computer Security Analyst – Montreal

IT Security Analyst – Montreal

Puntos Clave

  • Work permit while you study

  • Post Graduation Work Permit

  • Starting dates: January, April, July and September

  • Duration: 2 years

  • Level 9 qualification

  • Type: Full Time
  • Hours: Daytime
  • Enrollment Fee: From € 30,000

Write to us for more information

Our personal data is now digitized and connected, so it is essential to be able to guarantee its security.

Companies, agencies and individuals require the services of the best experts to design solutions, perform penetration tests and ensure the overall security of the digital infrastructure of their business operations.

The Trebas Institute’s Computer Security Analyst program will train you in best practices in computer security. This will give you the tools and skills to participate in the development of models, systems or resources to protect computer data.

Professional Opportunities

Our graduates will be able to pursue successful careers in the following roles:

  • Analyst – computer systems
  • IT Business Analyst (Information Technology)
  • Business Analyst
  • Computer applications analyst
  • Systems Security Analyst
  • Systems analyzer
  • IT Business Systems Analyst
  • Information systems / computer systems analyst
  • Computer Systems Analyst
  • IT quality assurance analyst
  • Software quality assurance analyst
  • Computer systems quality assurance analyst
  • Information systems analyst
  • Systems Security Analyst
  • IT Security Analyst
  • Internet Security Analyst
  • Information Technology Analyst
  • Functional analyst in computer systems

Skills and competences

Throughout this program, you will develop some of the following skills and competencies:

  • Process information related to the work environment in the field of computing.
  • Install and manage computers
  • Use programming languages ​​
  • Solve IT problems with math
  • Use office software
  • Implement a local computer network
  • Security prevention operations on information security
  • Interact in a professional context
  • Evaluate hardware and software components
  • Provide computer support to users
  • Implement computer networks, interconnection devices, computer networks
  • Monitor computer networks
  • Collaborate in the design of a computer network
  • Data manager
  • Computer specialist
  • Database / IT Management Supervisor & lt;

Program structure

During this period, you will learn: Conduct workplace investigations, tasks and responsibilities related to the IT security analyst role, analyze and solve simple problems using basic algorithms, determine error correction strategies, and use debugging tools. You will also learn to use applied mathematics to solve computer problems. To do this, you will learn to recognize and process the representations of numbers, to represent geometric figures in two dimensions using equations, to model logical reasoning and to process quantitative data. You will also learn to prepare and organize computers, devices and components for different operating systems to ensure their effectiveness in performing the tasks required for their use in relation to computer security. Finally,

  • Introduction to the computer work function – 45h
  • Programming Languages ​​and Troubleshooting – 75h
  • Mathematics applied to computer science – 60h
  • Hardware and software environment – 60 h
  • Computer Networks I: Design – 45h

During this term you will learn: How to produce the various necessary elements (plans, diagrams, tables, etc.) to write technical budgets and reports; choose, install and monitor computer monitoring software; applying security intervention procedures and carrying out computer security prevention operations. You will also learn how to develop and configure interconnect structures, analyze material needs, install devices, and track your work. Finally, you will learn how to support users, how to write and determine documents to help users, how to build trust and help users, and how to help them solve their problems.

  • Technical writing – 45h
  • Preventive surveillance of cyber threats – 45h
  • Analysis of computer security risks – 45h
  • Computer Networks II: Interconnection – 75h
  • Training and user support – 60h

During this term you will learn: Define the characteristics of a local network; install, connect and configure interconnect devices; connect computers to the network; configure shared services and perform tests to ensure that the network is operating optimally. You will also learn how to determine input and output data, the nature of simple algorithm processing, and how to use the programming language to code blockchain algorithms. You will also learn how to test, inspect, and debug the code used for the blockchain. Finally, you will learn to analyze information security risks; apply recognized security measures; test the IT security of your solutions and improve security measures.

  • Computer Networks III: Deployment – 75 h
  • Blockchain technology – 105h
  • Cybersecurity and Intrusion Testing – 105h

During this quarter you will learn: Recognize and evaluate the best IT security strategies; using error and exception handling techniques and using cryptography utilities. You will also learn how to analyze network architectures to discover faults; Choose and install monitoring software; find and resolve vulnerabilities; quickly recognize intrusion signals and intervene to guarantee the security of the information to be protected. Eventually you will learn to recognize crimes and criminal acts in the field of computer science; develop an ethical professional sense and prepare for their integration into the labor market.

  • Application security strategies: 105 h
  • Cyber ​​defense of the computer network – 105h
  • Integration of computer work – 60h

In this last quarter you will learn to: Establish professional relationships with clients and users through your attitudes and behaviors, work and join an interdisciplinary team, and understand your ethical and legal responsibilities as a professional analyst. You will have the opportunity, through an internship 210, to integrate all the learnings achieved during your program.

  • Internship in computer work integration – 210h

Admission requirements

Under the provisions of section 4 of the University Education Regulations regarding admission conditions, a person who has received instruction deemed sufficient by the university and meets any of the following conditions may be admitted to a study program leading to a Certification of university studies. :

  1. The person has interrupted full-time studies or has completed full-time post-secondary studies for at least 2 consecutive terms or 1 school year;
  2. The person is covered by an agreement between the university and an employer or by a government study program;
  3. The person has interrupted his studies full-time for a period and has completed post-secondary studies full-time for a period; or
  4. The person has a high school vocational diploma.

Specific admission criteria for an ACS / AEC

A person applying for an ACS / AEC program must have sufficient oral and written proficiency in the language of instruction. A person who has studied outside of Quebec must provide the result of a proficiency test for the language of instruction.

For programs where the language of instruction is English, the accepted language proficiency tests are:

  • International English Language Testing System (IELTS): 5
  • Test of English as a Foreign Language (TOEFL) IBT: 55
  • Cambridge English Language Assessment: 162
  • Canadian Academic English Language (CAEL): 40
  • Academic PTE: 42
  • Duolingo: 85

Learn more about our educational offer

Request your quote

An advisor will contact you by phone and email within the following hours