Skip to main content

School of Computing

Cybersecurity post-baccalaureate diploma

QUICK FACTS

Credential:
Post-baccalaureate diploma

Duration:
49 credits (14 courses)

Format:
Full time, Part time

How to apply

Start date:
September 

Location:
Abbotsford campus

Cost:
(Details)

FEATURES:

  • Some courses may be completed online.
  • Complete the program in four semesters if you study full-time or choose to study part-time if needed
  • Program eligible for financial aid

PROGRAM DESCRIPTION

We live in a digital age where cybersecurity is increasingly important for protecting sensitive data of all kinds. The Cybersecurity post-baccalaureate diploma provides students with core competencies in cybersecurity analysis, ethics, tools, and programming. 

As a graduate of this program, you'll be well-positioned to meet local, regional, and national demand for cybersecurity professionals in all industries with valuable information data.

This program may be right for you if:

  • you already hold a three/four-year bachelor's degree
  • want to diversify your skillset and career opportunities

Program outline — Cybersecurity post-baccalaureate diploma

You'll complete the following courses:

Course   

Title  

Credits  

CIS 190  

Systems Hardware Concepts  

3.00  

CIS 192  

Introduction to Networking  

4.00  

CIS 221  

Principles of Information Systems Security  

4.00  

CIS 270  

Analysis & Design  

3.00  

CIS 291  

Networking Theory and Applications  

4.00  

CIS 321  

Networking Security Architecture  

4.00  

CIS 341  

System Administration  

3.00  

CIS 497 

Advanced Topics Information Security    

3.00  

COMP 150  

Introduction to Programming   

4.00  

COMP 155  

Object-oriented Programming  

4.00  

COMP 230  

Databases and Database Management Systems  

3.00  

COMP 325  

Malicious Software and Attack Prevention  

3.00  

COMP 390  

Data Communications  

3.00  

MATH 125  

Introduction to Discrete Mathematics  

4.00  

 

See the Program schedules page for a guide to which courses to take in a given semester.

CAREER EXPECTATIONS

This program focuses on skills to protect data, systems, and networks from threats. Graduates can target roles like:

  • Cybersecurity Analyst
  • Security Consultant
  • Network Security Specialist
  • Governance, Risk, and Compliance (GRC) Analyst
  • Cloud Security Specialist

Wondering which roles are in the highest demand? The BC Labour Market Outlook identifies several computing professions as high opportunity occupations. These roles project excellent employment rates and strong wages:

  • Information systems analysts and consultants 
  • Computer programmers and interactive media developers 
  • Software engineers and designers 

The computing marketplace is always changing. To make sure students graduate with in-demand skills, the School of Computing meets with an advisory committee. This diverse committee includes industry experts from both the private and public sectors. Their expertise helps shape courses and programs to keep them timely and innovative.

ENTRANCE REQUIREMENTS

  1. Completion of a 3- or 4- year undergraduate degree in any discipline, in any language from a recognized post-secondary institution, with a minimum 60% (C) average in the last 60 credits, or equivalent, taken.
  2. Applicants must meet the degree/diploma level English language proficiency requirement.  For details on how this requirement may be met, see the English language proficiency requirement section of the academic calendar.

Note: Additional courses or waivers may be required to meet course prerequisites. Students should contact an advisor with questions and to discuss their options.

OTHER ADMISSION CATEGORIES

This program is open for international students: How to apply

LEARNING OUTCOMES

  1. Use current techniques, skills, and tools necessary for Information Systems and Technology.
  2. Analyze the local and global impact of computing on individuals, organizations, society, and Indigenous contexts.
  3. Employ interpersonal, teambuilding, and leadership skills to solve problems independently and in diverse teams.
  4. Apply ethical considerations in information systems practice.
  5. Execute an appropriate response to a cybersecurity attack on a system or organization.
  6. Implement secure Information Technology solutions.
  7. Apply current techniques, skills, and tools necessary for cyber defense within an organization.
  8. Demonstrate the challenges involved in the application of cybersecurity.

QUESTIONS?

Phone: 604-504-7441 ext. 4211
Toll free: 1-888-504-7441 ext. 4211
Email: computing.assistant@ufv.ca