Accelerated BSc in IT Security
The Accelerated Online Bachelor in IT-Security (Bachelor of Science in IT-Security) is a focused distance learning degree program that develops a thorough understanding of IT-Security in its manifold aspects.
Delivered via eLearning it is ideal for candidates with practical experience who do not possess the appropriate academic qualifications, aiming to obtain them by expanding and formalizing knowledge in the various fields of IT-Security. The program is strongly oriented towards practical application, rather than theory. It is a combination of academic content adapted for the experienced working professional, coupled with extensive academic and industry related exposure.
Graduates of this program may advance into SMC’s online Master program.
Accelerated online program, which develops a thorough understanding of IT Security in its manifold aspects.
Swiss Management Center
min. 15 months
Secondary School-leaving Certificate
Proficiency in English
This course teaches fundamental concepts of UNIX/Linux and Windows based operating systems. It focuses on system administration, hardware configuration, user management and core networking protocols. This course teaches Server installation, configuration and administration in a networked environment.
Presentation & Communication Skills
This course provides students with the required skills to produce clear written communication which is concise and persuasive and which helps enhance the competitive advantage of the company. Topics include reports, proposals, tenders and letters, commercial correspondence and effective reports. Furthermore, the course examines the seven aspects of a dynamic presentation, shows methods of structuring, visualizing and delivering the message. The class will help you improve your confidence and will examine the theoretical and practical concepts and problems of public speaking. All presentations will be videotaped and handed out to you for analysis.
IT Security Essentials
The course covers the management of core information security challenges such as: attack vectors, detection and prevention techniques, cryptography, firewalls, intrusion detection systems, security policies, risk management and incident response. This course also examines applications necessary to secure a network from intrusion including firewalls, bastion hosts, proxy servers, and honeypots. Applications to perform vulnerability testing to determine network weaknesses are also introduced.
Management & Business
This course explores the basic concepts of managing, planning and controlling an organization. It begins with the process of building leadership skills and lays a solid base for the difficult tasks of human resources management. The course focuses on communication, decision making and leadership for administrative and managerial positions in business and government.
Advanced Network Security
This course addresses the use of various cryptographic techniques for securing data from unauthorized access. The algorithms used for symmetric ciphers, asymmetric ciphers, and cryptographic data integrity are discussed. The students learn the practical use of algorithms for the encryption of data across various application scenarios.
This course introduces students to the basics of computer networking using common network devices. The course covers the OSI model and industry standards, network topologies, IP addressing including subnet masks, and basic network design.
Entrepreneurship is the process of seizing or creating opportunity without regard to the resources controlled. This course is innovative in its curriculum, as it deals with theory and practice of managing and owning your business and how new businesses are started. It shows methods of recognizing opportunities, exploiting them and obtaining the desired business results. The course also deals with the problems of running a family business, working with family members and building larger organizations. It teaches the students the steps in creating a good business plan.
This course includes measures of central tendency and variability, probability, random variables, normal and binomial distributions, confidence intervals, tests of hypotheses, correlation and simple linear regression, descriptive and inferential techniques and concepts.
This course addresses the importance of computer forensics and the procedures and responsibilities related to obtaining digital evidence through the analysis of computers and networks. Topics also include network surveillance and the handling of intrusion events.
This course examines management approach to defining and implementing e-commerce solutions including management and regulatory challenges. Students will explore strategies to address online fraud, payment and mobile application challenges.
Systems Design & Analysis
This course introduces the student to the analysis, design, implementation, and operation of information of systems in a security context. Addressed are various approaches to analyzing information systems, and the steps necessary to gather information on the system requirements and to model business needs accordingly.
Security Policy Design & Administration
This course examines managerial aspects of information security including security management planning, policies, risk assessment and risk management, disaster recovery and HR implications.
Understanding Security Threats
We will cover the basics of security in an IT environment. We will learn how to define and recognize security risks, vulnerabilities and threats. We'll identify the most common security attacks in an organization and understand how security revolves around the "CIA" principle. By the end of this module, you will know the types of malicious software, network attacks, client-side attacks, and the essential security terms you'll see in the workplace.
We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace.
Securing your Networks
We'll learn about secure network architecture. It's important to know how to implement security measures on a network environment, so we'll show you some of the best practices to protect an organization's network. We'll learn about some of the risks of wireless networks and how to mitigate them. We'll also cover ways to monitor network traffic and read packet captures. By the end of this module, you'll understand how VPNs, proxies and reverse proxies work; why 802.1X is a super important for network protection; understand why WPA/WPA2 is better than WEP; and know how to use tcpdump to capture and analyze packets on a network. That's a lot of information, but well worth it for an IT Support Specialist to understand!