fbpx

Cybercrime Investigation & Threat Intelligence Technology (CITIT)

Cybercrime Investigation & Threat Intelligence Technology Program at OCMT

Defending Against Cyber Threats: CITIT's Specialized Program

As a student at CITIT, you'll be part of a dedicated team exploring case studies and applying technology to address Cybercrime challenges, covering areas such as Cyber fraud audit techniques, Identity and Access Management, Enterprise Security Architecture, and Intelligence gathering. The program is designed to build expertise from the ground up, providing students with relevant and in-demand Cyber skills to combat evolving threats in the digital landscape.

Cybercrime has been an integral part of the advancement in technology since the discovery and invention of the internet. The pace at which digitization has outdated the traditional processes has also accelerated the fierceness of cyberattacks and crimes across sectors and industries. The world has since witnessed the flurry of cyberattacks that threaten the fabric of global firms in manners we have never seen before. While the financial impact has endured, and the pain felt across the board, the reputation damages continue to erode the credibility of many firms and displace or dislocate the competition positioning of firms.

This program is geared towards market-centered skills in different areas of Cybercrime investigation, threats gathering techniques, and application of relevant technology. As a student of CITIT, you will be part of a highly dedicated and studious team to unravel case studies and apply technology in various Cybercrime, and investigations. From Cyber fraud audit techniques, Identity and Access Management, Enterprise Security Architecture, Computer Crime, Intelligence gathering, and investigations, this program will build you from ground zero with relevant and in-demand Cyber skills.

Additional Information

Target students (Domestic and International Students)

While we are flexible in our approach to selecting candidates for the CITIT, our experience has shown that candidates with a background in IT, Engineering, Computer Science, Social Science, Management, or Industry credentials would often have a good shot at being considered.

If your credential is in a non-IT related discipline, you can enroll in alternative programs that complement your academic and professional experiences such as Enterprise Resource Planning Systems, Accounting and Business Finance, or Brand Promotion and Media Technology.

Program Details

Duration

16 months

The program delivery schedule might vary in some situations. Please contact the Registrar to learn more.

Delivery

This program is delivered in-class, hybrid, or online. Students who are unable to secure housing in proximity to the college campus may opt in for an online delivery. 
*Students in this program are encouraged to enroll for industry recognized certification(s) alongside their postgraduate Diploma*

Entry Dates

March, June, September, & December

Admission Requirements

Applicants with a prior Degree or a 3-year Diploma in Engineering, Technology, Computer-related programs, Information Systems, Mathematics, or Physics; or holders of professional designations in CISSP, CISM, GIAC, and CCNA are eligible for admission.

Your Career

  • Cybercrime Investigator
  • Cybercrime and Security Specialist
  • Digital Forensics Examiner
  • Threat Intelligence Analyst
  • Incident Responder
  • Security Consultant

and more…

Semester 1

Course Name Learning Outcome
Enterprise Security Architecture
- Development of security strategy and policies
- Create security reference architectures
- Identity Management products
- Access Management products
- Understanding the threat landscape
- Understanding internal and external attacks from technical and behavioral perspectives
Computer Networking and Operating Systems
Server administration, Wire LANs and Wireless LANs, System Administration, Enterprise IDS Implementation and Testing, Security Incidence Response processes, Malware and Compromise Analysis Process and tools, Malware Incident Response process, The Internet of things, Trend of network development, Internet Technology, Security Information and Event Management Configuration, Customization and Support, Network Security, IP architecture, Network Access Control (NAC) solutions, Network security risks, threats, and remediation mechanism, Troubleshooting skills, Network management and analysis tools, Network technologies, architecture principles and design, Network technologies, architecture principles, and design, VMware virtualized infrastructure (vSphere/ESX/vCenter) and distributed network switches, Network security tools, such as firewalls, IPS, VPN, Anti-Virus, and NAC, To gain skills in network security tools, such as firewalls, IPS, VPN, Anti-Virus, and NAC
Computer Crime, Law, and Investigation
Contextualize the concepts of current cybersecurity law and policy, Understand, Analyze, and report on Computer crime scenes, Develop cybersecurity law and policy in the public or non-public sectors, Recognize the restrictions of the current cybersecurity law and policy, and propose the evolving trend for the future ones, Documentation of cybersecurity process requirements and analysis, Understand the cybersecurity laws applicable in Canada and leaner’s jurisdiction, Understand the investigative techniques during a cyber crime investigation, Compliance testing on applicable Cybersecurity laws, Gather data and make analysis, prepare drafts and write final cybersecurity gap analysis reports.

Semester 2

Course Name Learning Outcome
Cyber Fraud and Audit Techniques

-Understand emerging Cyber-threats
-Understand the Principles and trends
-Cyber Threat Landscape
-Fraud in a digitally connected world Investigate cybercrime
-Conduct threat analysis
-Gather intelligence for analysis and future prevention
Secure Application Programming, API & Microservices, and Mobile Security
Static Analysis for secure programming, Programming Faults analytics, Mobile Application development, Writing codes in SQL, developing programs in Java, and C++, performing scripting, Developing simplified Graphical User Interface (GUI), Software development life cycle, Analyzing security gaps in programming and close the coding gaps, Perform security coding for cyberspace, Write and debug software for embedded platforms, Design, implement, test, and debug simple programs in object-oriented programming, Structured Programming concepts, SQL, SHELL Scripting, C++/Java Programming and Scripting Languages, Security logging, debugging, and error handling., Software development, Mobile Application Development, Java Programming, C Programming, Secure Programming with Static Analysis, Loop and Iteration procedures, Avoiding errors specific to Web applications, Web services, and Ajax, Data Types
Ethical Hacking System and Exploit Development
Identify elements of Information Security, Writing tools and test scripts, Debugging programming languages, Cryptography, Operating System - Windows and Linux, HTTP and HTTP proxy tools, Networking, Common application vulnerabilities, Security scanning tools both black-box and white box, Legal and Ethical Issues in IT Security, Network Security and Penetration Testing, Hacker Techniques, Tools, and Incident Handling, Ethical Hacking and Network Defense, Wireless and Mobile Device Security, Operating System Security, Security Policies

Semester 3

Course Name Learning Outcome
Cloud Security and Big Data
Introduction to Cloud Computing, Creating data visualization and analytic diagram, Developing model by using analytic tools such as Revolution R and Spark, Machine learning techniques, Data preparation, and transformation using the popular Hadoop components, Identifying, assess, and solve business problems with big data analytics, Architecture, design and feasibility of Big Data Analytics, Understanding and using of big data analytics, Intrusion Detection and Incident Response in cloud computing, Identity and Access Management (IAM), Securing Data in the Cloud, Compliance issues and Legal Considerations of cloud computing, Understanding Policies, and Governance for Cloud Computing Security, Infrastructure Security in the Cloud, Security Bottlenecks in the Cloud, Apache Hadoop, Data Visualization, SQL, Statistical and Quantitative Analysis, Machine Learning and Data Mining, NoSQL, Apache Spark, Database, Cloud Data Security, Data Migration, Creativity and Problem Solving, General Purpose Programming Languages
Threat Intelligence
Provide a description of the knowledge and skill competencies a student is expected to acquire/perform from this subject for the subject's core objectives to be achieved. At the end of this course, students are expected to demonstrate the knowledge of threat intelligence by using data to analyze the severity of threat levels and interpret the outcome in practical form to prevent cybersecurity incidents.

Semester 4

Course Name Learning Outcome
Business Communication
Reports and Business Proposals, Mechanism; Process Description, Communication Skills, Writing Skills
Inclusive Society
At the end of this course, students are expected to demonstrate (by their actions, narratives, practice, and performance from tests and exams) a good understanding of inclusion, and how to build a culture that organically appreciates everyone as members of one body with a demonstrable approach to promoting equality in policies, and its implementation.
Copyright 2024 © All rights Reserved.
Scroll to top