Master of Information Technology Security (MITS)
UOIT's Master of Information Technology Security (MITS) degree program is an innovative program and one of only a few specialized information technology (IT) security graduate degrees available in the world. Through theory and applied learning, the MITS program will enable you to develop an extensive understanding of business and IT security in a team learning environment.
The curriculum contains most of the domains found in the Certified Information Systems Security Professional (CISSP) exam as well as most of the domains found in the SysAdmin, Audit, Networking and Security (SANS) Essentials course.
The MITS program length is 12 months based upon full-time study.
Your competitive edge: Hands-on learning opportunities
Students in the MITS program complete laboratory assignments that simulate a variety of attack-and-defence scenarios. One student team may attempt to secure an information system using available hardware and software tools, while another student team endeavours to compromise the system as it was designed. Alternatively, a team may be assigned to undertake a forensic analysis of a compromised system. This simulated network environment provides you with an opportunity to gain exposure to different aspects of IT security.
The MITS program prepares you to work in an assortment of high-tech positions and in a variety of professions including:
- small and large corporations
- financial institutions
- health-care agencies
- all levels of government
The Faculty of Business and Information Technology houses a wide collection of leading-edge laboratories to enhance the learning experience and provide students with the hands-on skills and knowledge they will need in the world of IT security.
Of particular relevance to the MITS program is the Hacker Research Laboratory, which hosts a variety of network settings specifically configured for the MITS curriculum. Faculty members conduct various IT security research projects in this laboratory, including:
- business process integration
- electronic negotiation and agreement
- interconnection protocols
- mitigation of denial-of-service attacks
- network intrusion prevention, detection and reaction
- security and privacy
- services computing