Concordia University of Edmonton Master of Information Systems Security Management
Concordia University of Edmonton

Concordia University of Edmonton

Master of Information Systems Security Management

Edmonton, Canada

Master degree

2 years

English

Full time

Sep 2026

CAD 49,159 *

On-Campus

* total estimated fees

Key Summary

    About : The Master of Information Systems Security Management equips students with the skills needed to protect information systems. The program covers topics such as risk management, security policy development, and incident response. The curriculum balances technical skills with managerial perspectives, ensuring graduates are well-prepared for the demands of information security roles.
    Career Outcomes : Graduates can pursue opportunities in various fields, including information security management, security analysis, and risk assessment. Potential career paths may include roles such as Chief Information Security Officer (CISO), security consultant, and penetration tester. This program prepares students to tackle complex security challenges in various organizations.

In all sectors of the economy, there is an increasing demand for skilled professionals with expertise in information security. The Master of Information Systems Security Management (MISSM) meets these needs by providing in-depth education in security protocols, design, software, and management. Students explore protection strategies, including the planning, design, implementation, and management of complete network security solutions in multiple operating-system environments and configurations. Graduates will be able to assess and implement necessary safeguards to ensure the security of information systems. Program content includes network security policies, standards, and management; building and maintaining security firewalls; cryptography; information security laws and ethics; disaster and recovery planning; risk management and analysis; and digital forensics.

The MISSM program (a) allows students to meet their educational goals in an efficient and timely manner and (b) enables students who possess a more general IT or business-related degree to focus on the specific knowledge and skills required in the emerging field of information systems security. The program is open to both full- and part-time students.

A Mature Forward-Thinking Program

Concordia University of Edmonton is proud to bring you a unique, mature and much-needed Information Systems Security program.

The need for security professionals is growing along with the increasing reliance of businesses and governments on IT. The employer demand for information systems security professionals shows no end in sight. The program maintains a sharp focus on the needs of employers and changes in the industry.

Objectives

  • To identify sources of risk for the loss of enterprise information and to develop methods of minimizing the identified risks based on the priorities established by senior management and the financial resources available to mitigate these risks.
  • To understand the role of information systems security in relation to the other business processes in an enterprise.
  • To develop a plan for the enterprise to recover from disasters where information ceases to be available to users. They will also have the skills to test the plan and to ensure that the plan is ready to be implemented when needed.
  • To investigate information systems security incidents and develop and implement solutions to recover or minimize the loss of information.
  • To securely install operating system software and to use this software to build login servers and application servers which are highly resistant to penetration by unauthorized users (both internal and external).
  • To securely install servers on different operating environments.
  • To develop an appropriate information security framework for an enterprise, including plans and policies which reflect recognized standards for implementing security policy (based on identifying stakeholders, security teams and infrastructure, data resource owners, and auditing used to ensure compliance).
  • To determine legal issues involved in information systems security policy and architecture, and to know when to seek advanced legal help and/or help from law enforcement authorities.
  • To manage projects involving cryptographic architectures for security and to implement a variety of solutions involving cryptography.
  • To develop strategies for all methods of access control to an organization’s information systems and media containing organizational information (physical methods and network methods).
  • To ensure that an organization meets the appropriate federal or provincial privacy legislation.