The need for information systems and security professionals is growing along with increasing reliance of businesses and governments on the technology. The demand for information systems security and assurance professionals shows no end in sight. Our programs maintain a sharp focus on the needs of employers and changes in industry. Make information security and assurance your choice and join a growing field.
One half of the courses in the Master of Information Systems Assurance Management (MISAM) program are from the Master of Information Systems Security Management program (7 required courses and one optional course). Assurance program focuses on business aspect of IT and prospective candidates expected to have background in both technology and accounting/finance. You may be required to take additional courses as a probationary student in the program, if you do not have all of the MISAM prerequisite courses (but are otherwise admissible).
Our program follows the Information Systems Audit and Control Association (ISACA) model curriculum. We use and follow ISACA best practices and normally encourage students to pursue a COBIT 5 Foundation certification during the program and some consider other COBIT 5 certifications and other ISACA certifications.
At the end of the program some students also write the Certified Information Systems Auditor (CISA) exam or related certification exams such as the CISM (also offered by ISACA).
Contact the Department Chair for further details.
For more information on admission requirements, please refer the Academic Calendar.
- To identify sources of risk for the loss of enterprise information and to develop methods of minimizing the identified risks based on the priorities established by senior management and the financial resources available to mitigate these risks.
- To understand the role of information systems security in relation to the other business processes in an enterprise.
- To develop a plan for the enterprise to recover from disasters where information ceases to be available to users. They will also have the skills to test the plan and to ensure that the plan is ready to be implemented when needed.
- To investigate information systems security incidents and develop and implement solutions to recover or minimize the loss of information.
- To securely install operating system software and to use this software to build login servers and application servers which are highly resistant to penetration by unauthorized users (both internal and external).
- To securely install servers on different operating environments.
- To develop an appropriate information security framework for an enterprise, including plans and policies which reflect recognized standards for implementing security policy (based on identifying stakeholders, security teams and infrastructure, data resource owners, and auditing used to ensure compliance).
- To determine legal issues involved in information systems security policy and architecture, and to know when to seek advanced legal help and/or help from law enforcement authorities.
- To manage projects involving cryptographic architectures for security and to implement a variety of solutions involving cryptography.
- To develop strategies for all methods of access control to an organization’s information systems and media containing organizational information (physical methods and network methods).
- To ensure that an organization meets the appropriate federal or provincial privacy legislation.
Concordia University of Edmonton is a member of AACSB International—The Association to Advance Collegiate Schools of Business.