The MEng in Information Systems Security trains students to design, implement and manage the security of real-life information systems. Through applied research and academic coursework, you will examine the theories and practices currently used in the security of information systems. You will have access to state-of-the-art laboratories and research centres in a faculty whose areas of study include cyber forensics, database security and cryptography, among many other categories. Some examples of current research projects include quantitative models of network vulnerabilities, analysis and design of stream ciphers and security evaluations of open-source softwares.
Bachelor’s degree or equivalent in Computer Engineering, Electrical Engineering, Software Engineering, or Computer Science.
Proficiency in English
Proficiency in English. Applicants whose primary language is not English must demonstrate that their knowledge of English is sufficient to pursue graduate studies in their chosen field. Please refer to the English language proficiency page for further information on requirements and exemptions.
All applicants: Canadian / International / Permanent Resident
February 1 (all applicants)
July 1 (all applicants)
Priority will be given to complete applications submitted by the deadline. In some cases, programs may continue to accept applications as long as there is space available.
International students: Considering the waiting period involved in meeting the entry requirements to Canada and Quebec, we strongly encourage international applicants to apply early and submit supporting documents prior to the deadline.
Tuition & funding
The tuition fees of the program may differ depending on your student status. To estimate the cost of your education at Concordia, go through five (5) easy steps.
Funding packages are generally available for students in thesis-based programs. Course-based students may be eligible for a number of donor awards, and may consult with their department for program-specific opportunities.
Engage in cutting-edge research in state-of-the-art laboratories for IT security ethics, digital copyright, computer fraud and abuse, infrastructure protection and espionage laws, privacy laws, business records, and digital forensics.