Program Description
The Bachelor of Technology in Computer Systems (CST BTech) is an applied career-enhancement degree, designed to increase the breadth and depth of knowledge and practical skills of computer professionals; assisting them in widening their career opportunities and advancing along their career paths. Graduates are awarded a credential that is highly valued by the industry.
The CST BTech full-time program is a two-year degree completion program for students who have graduated from a two-year diploma in computing such as the BCIT Computer Systems Technology (CST) or Computer Information Technology (CIT) program. Students who have completed other computing diploma or degree programs at an accredited college or university, whether locally or internationally, may be admitted into the program by completing pre-entry assessment and a few bridging courses.
The Network Security Applications Development Option is designed to prepare graduates to plan, manage and secure network infrastructures in business environments. The program includes knowledge and skill development in business communications and leadership, as well as the essential technical knowledge components.
Students will establish a set of advanced skills encompassing three key areas of network administration and network security.
- Network Infrastructure: Addresses the basic issues of network infrastructure, including the configuration, deployment and management of key network components, such as servers and control devices. Additional topics covered are the practices of securing systems and services, system monitoring for performance, and customizing kernels for specialized applications.
- Deploying Network Defenses: Topics covered are the design and implementation of firewalls, intrusion detection/ prevention systems, and perimeter designs. Courses will provide practical skills in the area of network forensics and "real-world" network traffic analysis, using a variety of tools.
- Network Vulnerabilities and Exploits: Students will acquire hands-on experience with network penetration tools and frameworks. Topics include: Network reconnaissance techniques, identifying vulnerabilities, and carrying out network penetration exercises; Attacks and exploits, such as packet sniffing, social engineering, phishing, malware, covert channels, and Trojans.; and The use of Honeynets and Wargames in understanding how to mitigate network threats and vulnerabilities.