If you answered yes to the above, please complete the following additional proposals to show course placement on program pages in the calendar:
Complete one proposal for each impacted program, specialization or minor. Note: If the new course is for a new program, you do not need to show course placement as it will be captured in the new program proposal.
1. Ph.D. in Cybersecurity
2. MITS-Governance
Visit the files section of the toolbox on the right-hand side of the form to attach any supporting documentation.
Important note: Please verify that the course code has not been previously used.
This course introduces a concise review of the foundations of IT Security. It is designed as a collection of six modules using asynchronous online delivery method, covering the following topics:
Module 1: Fundamentals of Networking
Module 2: Foundations of Cryptography
Module 3: Authentication and Identity Management
Module 4: Network attacks and malicious codes
Module 5: Intrusion Detection and Protection
Module 6: IT Forensics
Each module includes approximately 8-10 hours of video lectures and reading material, and expected to be completed over four weeks.
Contact hours describe the amount of time students spend engaging directly with the course and are listed in the Graduate Academic Calendar.Please indicate the total number of hours for each component.
Instructional method describes the ways in which the contact hours of a course may be taught; all instructional methods that may apply to the contact hour should be selected. Note that instructional methods (and scheduling information) are not listed in the Academic Calendar.
Each of the modules in the course will have an asynchronous online exam. Students must receive at least 70% in each module to pass it.
For assistance with developing your course learning outcomes, please refer to the Teaching and Learning website or contact them at teachingandlearning@ontariotechu.ca
On successful completion of the course, students will be able to:
-Describe the architecture of today’s Internet; identify and differentiate TCP/IP layers and protocols; and analyze various communication technologies.
- Explain the basic concepts and theoretical underpinnings of symmetric cryptography, public-key cryptography and hash functions.
- Explain the basic concepts of authentication and access control, and differentiate various techniques.
- Describe different types of malicious software, and explain how OS and software vulnerabilities can be exploited by malware and network attacks.
- Understand Intrusion Detection Systems (IDSs), Anomaly Detection and Behavior Analysis, Security Information and Event Management Systems and Deception Technologies.
- Describe how to implement a computer forensics incident-response strategy, and how to conduct proper IT forensics and investigation.
If the course DOES NOT contain any experiential learning components, then no further action is required in this section. If the course DOES contain experiential learning components, please select 'Yes' above, then enter a 'Yes' or 'No' value for each of the experiential components below as appropriate.
Consultation within the MITS/PhD Cybersecurity area. It is expected that this course will be offered as a core course every year.
For more information on how Indigenous content is defined at Ontario Tech University and how to consult with the Indigenous Education Advisory Circle, please refer to the Protocol for Consultation with the Indigenous Education Advisory Circle.
This course aligns with Ontario Tech's equity, diversity and inclusion policies
None
Important note: it is imperative that you choose the correct routing path as it cannot be changed once a proposal has been launched. If you have made a routing error after launching the proposal, the proposal will be cancelled and a new proposal will be required. If you require assistance with routing, please contact ciqe@ontariotechu.ca.
Please note that new courses included in joint or collaborative programs do require approval at Faculty Council of each faculty involved in the program. You do not need to include other faculties in the routing, however, consultation with other faculties should be noted and any required approval by other Faculty Councils (and date of approval) should be noted in the comments section as approval is logged on the home Faculty Council step.
As the originator, you must approve the proposal to send it on to the next step. To approve, navigate to the decisions section of the toolbox on the right-hand side of the form.
Help: Show Original: This option displays the proposal as it appeared at launch. No markup will be visible on the form. There will be no differentiation between fields that contain imported content and content that was created or selected by the originator by hand.
Help: Show Current: This option displays the proposal as it appears currently. No markup will be visible on the form. There will be no differentiation between fields that contain imported content and content that was created or selected by the originator by hand.
Help: Show Current with Markup: This option displays the proposal with all of its current content marked to show different editors. Text fields that include imported content are indicated by a blue highlight, and may also include additional changes within, indicated by each editor’s unique color. Fields containing selects, checkboxes, radio buttons, or widgets (such as the curriculum) provide an activity log above the field, indicating each editor’s selection and unique color.
You have not saved your changes to all the assessment fields you edited. You have the following options:
What would you like to do?
You must be logged in, in order to approve.
Please upload the form that you just printed and signed.
This will be used as your signature to sign this proposal upon approval.
Please login to view your personal dashboard.
Login or password is incorrect. Please Try Again.
Listed below are the symbols and colors utilized in Curriculum:
#{text}