The Bachelor of Technology in Computer Systems (CST B.Tech) is an applied career-enhancement degree designed to increase the depth of knowledge and practical skills of computer system technologists, and to assist them in widening their career opportunities or advancing in their career paths. Graduates are awarded a credential that is highly valued by the industry.
The CST B.Tech full-time program is also a two-year degree completion program for students who have graduated from a two-year diploma program in computing such as the BCIT Computer Systems Technology (CST) or Computer Information Technology (CIT) program. Students who have completed other computing diploma or degree programs in an accredited college or university, whether locally or internationally, can usually be admitted into the program with only a few bridging courses.
The specialty areas for the September 2014 Intake are:
The Network Security Administration Option is designed to prepare graduates to plan, manage and secure network infrastructures in business environments. The program includes knowledge and skill development in business communications and leadership, as well as the essential technical knowledge components, with a focus on establishing a set of advanced skills encompassing three key areas of network administration and network security.
The first component addresses the basic issues of network infrastructure, including the configuration, deployment and management of key network components such as servers and control devices. Also covered are the practices of securing systems and services, system monitoring for performance, and customizing kernels for specialized applications.
The second general component addresses the more advanced issues of deploying network defenses. Topics covered are the design and implementation of firewalls, Intrusion Detection/Prevention Systems, and perimeter designs. Courses will provide practical skills in the area of network forensics and "real-world" network traffic analysis using a variety of tools.
The third general component primarily deals with network vulnerabilities and exploits. Students will acquire hands-on experience with network penetration tools and frameworks. Topics include network reconnaissance techniques, identifying vulnerabilities, and carrying out network penetration exercises. Attacks and exploits such as packet sniffing, social engineering, phishing, malware, covert channels, and Trojans will be covered. The use of Honeynets and Wargames in understanding how to mitigate network threats and vulnerabilities will be covered.
This program is also offered in a part-time format.
Do you have credits from another BC/Yukon post-secondary school? Do you want to know if they transfer to courses here at BCIT? Check out BCIT's Transfer Equivalency Database to find out.
There are two sets of course components, followed by a practicum, also known as the Major Project(s).
1.Technical courses in Computer Systems
2.A wide variety of General Education courses
In the Major Project(s), students apply their specialty knowledge in a real-life project, or complete an applied-research project, under the supervision of a committee. Our full-time format offers students mentoring, and practical software development experience. Courses are taught during the day, but evening courses or Web-based courses may be included. Delivery is cohort-based offering opportunities for ongoing interaction and collaboration.
The Network Security Administration Option focuses on establishing a set of advanced skills encompassing the key areas of network administration and security on the Internet and in-depth coverage of perimeter protection and firewall designs. It prepares graduates to plan, manage and secure the network infrastructure in a business environment. The program includes knowledge and skill development in business communications and leadership as well as the essential technical knowledge. The technology focus is network operating system software, with an emphasis on Windows environments, Linux environments, hardware tools, networking protocols and infrastructure, project management, network security and intrusion detection.
Please ensure you have reviewed the detailed information on this site, using the navigation to the right, before submitting the form below.
As well, if you meet any of the following criteria, please follow the links for more information, instead of sending the form:
Sign up to receive updates, invitations to events, and information about BCIT and your program.
We promise not to spam you, we won’t share your personal information, and you can unsubscribe at any time.
Programs and courses are subject to change without notice.