Newnham, Seneca Downtown, Hybrid Delivery
2 Semesters (8 Months)
Ontario College Graduate Certificate
About the Program
As digital innovation continues to rapidly advance, it is becoming increasingly difficult for organizations to keep up with the changing nature of cybersecurity threats.
With a shortage of cybersecurity professionals across Canada, this program was designed and developed with leading financial services organizations to meet the need for individuals with the specialized skills to secure, protect and defend mobile and network infrastructures, preventing fraud, data breaches and other vulnerabilities.
As a graduate of this eight-month Cybersecurity and Threat Management program, you will be equipped with cutting-edge best practices and skills in communication, information security, project management, problem-solving and more. The industry capstone project and optional work term will give you hands-on experience and position you for a career in one of the world’s fastest-growing fields.
Students in this program will be required to attend courses at both Newnham Campus and Seneca Downtown, as well as online.
16 GB RAM minimum
256 GB SSD Hard Drive (500+ GB would be better)
Quad-core i7 2.4GHz or better
Video card (2GB RAM minimum/4GB RAM recommended)
Part-time option is available >
Throughout this program you will develop the following skills:
Secure a successful IT career with our cybersecurity courses
This three-year advanced diploma in Cyber Security will provide students with the foundational information security (InfoSec) skills and knowledge necessary to be successful in the IT security industry.
Foundational topics in our cybersecurity courses include information security, ethics, network management/analysis, programming and scripting, operating systems, and database management. Building on those foundational topics, the curriculum will also develop students’ skills in the areas of risk analysis, cryptography, vulnerability testing, access control implementation, and security audit performance. Graduates of this program will be able to proactively implement sound security practices to mitigate security risks and respond quickly to security breaches and issues that may have occurred.
How this cybersecurity program is delivered
Through hands-on laboratory activities, case study analyses, and research projects, students will enhance their information security understanding and develop their interpersonal, communication, organizational, and problem-solving skills. This program will also include three cooperative education work placements to further enhance all of those skills.
This program will be delivered face-to-face (web-facilitated).
- A laptop computer is to be purchased by the student at approximately $1600.00. The cost of the laptop is included in the General Expenses stated in the Fee Schedule.
- A CONNECT lab fee of $50.00 per academic term is included in the Additional Program Fees stated in the Fee Schedule. This fee helps cover costs associated with the delivery of the CONNECT mobile computing program.
- Students should not purchase a laptop computer or software until the College publishes the recommended configuration, models, software titles and versions for that academic year.
This three-year program has three co-op work terms. Students who fulfil both the academic and co-op requirements of the program will be eligible to graduate with a Co-op Endorsed Diploma.
- Configure, implement, and manage security devices and equipment considering the unique features of the computer operating systems, networks, applications and software.
- Implement and evaluate security solutions for business processes, applications and communications to protect business resources and respond to the needs of all the internal stakeholders.
- Use project management principles to implement security strategies and processes that address the organization’s information security requirements.
- Develop, implement and evaluate organizational security policies, standards and regulations to promote internal security.
- Perform vulnerability assessments and penetration testing for infrastructures, web and applications, using both manual and automated techniques.
- Evaluate and apply tools and techniques to formulate countermeasures to secure information systems against security threats.
- Perform security audits and forensic analysis to evaluate the effectiveness of a security system, and identify and correct security vulnerabilities.
- Monitor and analyze logs and alerts from security devices to determine the extent of a security breach and what data has been compromised.
- Identify, collect and log relevant data as evidence for a sample case within a business or in the Canadian Justice System.