Get Started With Trebas

ContactWhatsapp
Technology

LEA.DU: Computer Security Analyst

data student inside a server room

About this Program

Our personal data is now digitized and connected, so it is essential to be able to ensure its security. Businesses, agencies and individuals require the services of the best experts to design solutions, perform penetration tests and ensure the overall security of the digital infrastructure of their business operations. Trebas Institute Quebec Inc.’s Computer Security Analyst program will train you in the best practices in computer security, giving you the tools and skills to participate in the development of models, systems and resources to protect computer data.

Program Overview

Term 1
Term 2
Term 3
Term 4
Term 5
  • Term 1
  • Term 2
  • Term 3
  • Term 4
  • Term 5

Overview of Term 1

In this term you will   complete workplace research, tasks and responsibilities related to the role of an IT security analyst, analyze and solve simple problems using basic algorithms, determine error-correcting strategies and use debugging tools. You will also learn how to use applied mathematics to solve computer problems. To do this, you will learn to recognize and process the representations of numbers, represent geometric figures in two dimensions through equations, model logical reasoning and process quantitative data. You will also learn how to prepare and organize computers, devices and components for different operating systems to ensure their effectiveness in carrying out the tasks required for their use in connection with computer security. Finally, you will learn how to analyze and participate in the development of network infrastructure, evaluate and choose the hardware and software components wisely and produce design documents (wiring plans, diagrams, architecture, etc.).

  • Introduction to the Computer Work Function – 45 hours
  • Programming and Problem-Solving Languages – 75 hours
  • Mathematics Applied to Computer Science – 60 hours
  • Software and Hardware Environment – 60 hours
  • Computer Networks I: Design – 45 hours

Overview of Term 2

In this term you will learn how to produce the various elements required for writing technical quotes and reports (e.g., plans, diagrams, tables), choose and install computer monitoring software, apply security intervention procedures and perform computer security prevention operations. You will also learn how to develop and set up interconnection structures, analyze material needs, install devices and keep track of your work. Finally, you will learn how to provide support to users, write documents to help users, build trust with users and help users resolve their problems.

  • Technical Writing – 45 hours
  • Preventive Monitoring of Cyber Threats – 45 hours
  • IT Security Risk Analysis – 45 hours
  • Computer Networks II: Interconnection – 75 hours
  • Training and Support for Users – 60 hours

Overview of Term 3

In this term you will learn how to define the characteristics of a local network, install, connect and configure interconnection devices, connect computers to a network, and set up shared services and test to ensure the network works optimally. You will also learn how to determine input and output data, the nature of simple algorithm processing and how to use programming language to encode blockchain algorithms. You will also learn to test, inspect and debug the code used for the blockchain. Finally, you will learn how to analyze information security risks, apply recognized security measures, test the security of your solutions and improve security measures.

  • Computer Networks III: Deployment – 75 hours
  • Blockchain Technology – 105 hours
  • Cybersecurity and Penetration Testing – 105 hours

Overview of Term 4

In this term you will learn how to recognize and evaluate the best IT security strategies, use error and exception control techniques as well as cryptography utilities. You will also learn how to analyze network architectures in order to discover flaws, choose and install monitoring software, find and solve vulnerabilities, quickly recognize signs of intrusion and intervene to ensure the security of the information is protected. Finally, you will learn to recognize crimes and criminal acts in the field of computer science, understand the guiding philosophy behind ethics in cybersecurity and prepare for your transition into the workplace.

  • Application Security Strategies – 105 hours
  • Computer Network Cyber Defense – 105 hours
  • Computer job integration – 60 hours

Overview of Term 5

In this final term you will learn to establish professional relationships with clients and users through your attitudes and behaviors, work with and integrate into an interdisciplinary team and understand your ethical and legal responsibilities as a professional analyst. Through a 210-hour internship, you will have the opportunity to apply all the skills and knowledge gained throughout your program.

  • Internship in computer job integration – 210 hours

Please note that Trebas Institute Quebec Inc. reserves the right to modify the content of this program.

Skills and Competencies

Throughout this program, you will develop the following skills and competencies:

  • Process information related to work environment in the computer field.
  • Install and manage computer networks.
  • Use programming languages.
  • Solve IT problems with mathematics.
  • Use Microsoft Office.
  • Deploy a local computer network.
  • Employ security prevention operations on information security.
  • Interact in a professional context.
  • Evaluate software and hardware components.
  • Provide computer support to users.
  • Deploy computer network interconnection devices on computer networks.
  • Monitor computer networks.
  • Collaborate with others to design a computer network.

Career Outlook

Our graduates will be able to pursue successful careers in the following roles:

  • Analyst – computer systems
  • IT business analyst
  • Business analyst
  • Computer application analyst
  • Systems security analyst
  • Systems analyst
  • Computer business systems analyst
  • Information systems analyst
  • Computer systems analyst
  • Computer quality assurance analyst
  • Software quality assurance analyst
  • Computer systems quality assurance analyst
  • Computer security analyst
  • Internet security analyst
  • Information technology analyst
  • Functional analyst in computer systems
image

Get in touch

Inquire today - classes filling quickly