STUDY LEVEL
Certificate
EXPERIENCE
Jan/Apr/Jul/Oct
TUITION
$25,626 CAD
DURATION
8 months
INTAKES
September
DELIVERY MODE
On Campus
School Video
The demand for cybersecurity professionals is increasing more now than ever due to growing technological developments. This course is ideal for those wanting to expand their knowledge on previous education or experience in cybersecurity. Core concepts taught include operating systems, introductory computer forensics, and network protocols.
Career opportunities in this field include roles as a cybersecurity analyst, IT security specialist, or systems administrator.
student gallery
Graduate with an outstanding portfolio
Term 1
In this course, learners develop a security mission to meet an organization’s requirements. Learners map the architecture of a network in anticipation of constructing security plans. Focus falls on the major components within a typical network as well as the tools and techniques fundamental to information security.
Learners address the balance between security needs and the needs of the organization while protecting organizations from intrusion. Focus is on security architecture, filing systems, authentication, password management, account management, access control, end-point protection, antivirus protection, and endpoint detection and response.
In this course, learners use the tools and techniques of cryptography. Focus is on encryption types, digital signatures, data integrity, authentication, protocols, and key management.
In this course, learners use the tools and techniques needed to safeguard organizations from threats to business activities such as network attacks, natural disasters, or unplanned disruptions to essential services. Focus is on business recovery planning as well as disaster recovery planning and how these impact cybersecurity.
In this course, learners focus on the alignment of security practices with organizational policy and business practices. Topics include security governance, continuity planning, security strategies, mitigation, and security training.
In this course, learners practice the fundamental network security tasks, such as rights and permissions, local and remote network authentication, identification, and network monitoring. Focus is on network architecture, information transmission, e-mail and web security, attack countermeasures, and hacking.
Term 2
Learners will take what they have learned in their previous courses and will apply the principles of security to cloud computing. Topics will cover an introduction to cloud computing, security challenges, infrastructure security in the cloud, policy and governance for cloud computing, compliance and legal considerations, identity and access management, and data security.
While the main focus of cybersecurity is the prevention of security breaches, these breaches can still happen. This course will equip learners with the principles of computer forensics, to detect, track and analyze digital evidence. Using real-world examples, learners will cover topics of program execution, file opening, the security life cycle, and network usage using multiple open source forensic tools.
Learners will be introduced to the most common and current vulnerabilities and how to defend against them for applications. Topics will include testing applications for vulnerabilities and testing applications for misconfigurations, cloud applications, and scanner and the interpretation of their output. Additionally, learners will use manual and automated tools for both clients and servers to map, discover, exploit and secure web applications.
This course will provide learners with techniques to find, assess, and correct vulnerabilities in information systems using industry best practices. Upon completion of this course learners will be able to find cyber-attack vulnerabilities, and will understand the importance of protecting data from attack with penetration testing methodologies.
This course builds on the skills learned in ISEC3201 and advances knowledge of the security architecture used in server operating systems and mobile devices. Learners explore the tools used to control, access, and secure networks and devices to prevent cybersecurity breaches.
This course expands on the skills studied in Introduction to Network Security to include intrusion prevention and virtual private networks. Learners will cover topics on existing security technologies, products and solutions. They will learn firewall design, IPv6, installation and configuration, intrusion prevention using routers, and virtual private network implementation.
In this course, learners develop a security mission to meet an organization’s requirements. Learners map the architecture of a network in anticipation of constructing security plans. Focus falls on the major components within a typical network as well as the tools and techniques fundamental to information security.
Learners address the balance between security needs and the needs of the organization while protecting organizations from intrusion. Focus is on security architecture, filing systems, authentication, password management, account management, access control, end-point protection, antivirus protection, and endpoint detection and response.
In this course, learners use the tools and techniques of cryptography. Focus is on encryption types, digital signatures, data integrity, authentication, protocols, and key management.
In this course, learners use the tools and techniques needed to safeguard organizations from threats to business activities such as network attacks, natural disasters, or unplanned disruptions to essential services. Focus is on business recovery planning as well as disaster recovery planning and how these impact cybersecurity.
In this course, learners focus on the alignment of security practices with organizational policy and business practices. Topics include security governance, continuity planning, security strategies, mitigation, and security training.
In this course, learners practice the fundamental network security tasks, such as rights and permissions, local and remote network authentication, identification, and network monitoring. Focus is on network architecture, information transmission, e-mail and web security, attack countermeasures, and hacking.
ENTRY REQUIREMENTS
- Completion of a post-secondary diploma or degree in information technologies, computer engineering, software development, management information systems, or equivalent.
- English language proficiency.
start your creative career today
APPLY NOW
Because you are interested in this course
You might also like…
Do you need help from one of our student counselors?
Book a FREE consultation with one of our friendly Student Enrolment Advisors

Privacy Overview
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |