Campus: Newnham, Seneca Downtown, Hybrid Delivery
Duration: 2 Semesters (8 Months)
Credential Awarded: Ontario College Graduate Certificate
About the Program
It is becoming more and more challenging for organizations to keep up with the evolving nature of cybersecurity risks as digital innovation continues to grow quickly.
This program was created in collaboration with top financial services organizations to address the need for people with the specialized skills to secure, protect, and defend mobile and network infrastructures, preventing fraud, data breaches, and other vulnerabilities. There is a shortage of cybersecurity professionals across Canada.
You’ll be prepared with cutting-edge best practices and skills in communication, information security, project management, problem-solving, and more once you complete this eight-month program in cybersecurity and threat management. You will gain practical experience and be prepared for a job in one of the industries with the fastest rate of growth thanks to the optional work term and industry capstone project.
Students in this program must attend classes online, at Seneca Downtown and Newnham Campus, as well as in person.
16 GB RAM minimum
256 GB SSD Hard Drive (500+ GB would be better)
Quad-core i7 2.4GHz or better
Video card (2GB RAM minimum/4GB RAM recommended)
Part-time option is available >
Throughout this program you will develop the following skills:
Secure a successful IT career with our cybersecurity courses
Students will graduate with the foundational information security (InfoSec) skills and knowledge required to succeed in the IT security business after completing this three-year advanced diploma in cyber security program.
Information security, ethics, network administration/analysis, programming and scripting, operating systems, and database management are among the core subjects covered in our cybersecurity courses. The program will enhance students’ abilities in the areas of risk analysis, cryptography, vulnerability testing, access control implementation, and security audit performance by building on these fundamental subjects. The program’s graduates will be able to proactively implement strong security practices to reduce security risks and react rapidly to potential security breaches and problems.
How this cybersecurity program is delivered
Students will improve their knowledge of information security and advance their interpersonal, communication, organizational, and problem-solving abilities through practical laboratory exercises, case study analyses, and research projects. To further develop all of those skills, this program will also involve three cooperative education work assignments.
Face-to-face instruction for this program will be provided (web-facilitated).
- The cost of the student’s laptop computer will be around $1600. The cost of the laptop is accounted for in the Fee Schedule’s General Expenses.
- The Additional Programme Fees listed in the Fee Schedule also include a $50.00 lab fee for CONNECT. The CONNECT mobile computing program’s delivery costs are partially covered by this fee.
- Before the College releases the suggested configuration, models, software titles, and versions for that academic year, students shouldn’t buy a laptop computer or any software.
Three co-op work terms are included in this three-year program. Students who complete the program’s academic and co-op requirements will be qualified to receive a Co-op Endorsed Diploma upon graduation.
- Consider the special characteristics of computer operating systems, networks, applications, and software when configuring, implementing, and managing security apparatus and equipment.
- Implement and assess security solutions for business communications, apps, and processes to safeguard company assets and satisfy the demands of all internal stakeholders.
- Implement security policies and procedures that meet the organization’s information security needs using project management principles.
- To promote internal security, develop, implement, and assess organizational security policies, standards, and regulations.
- Perform manual and automated infrastructure, web, and application penetration testing and vulnerability assessments.
- In order to create countermeasures to protect information systems from security risks, evaluate and put into practice various tools and procedures.
- To assess a security system’s efficacy and find and fix security flaws, conduct security audits and forensic analysis.
- To assess the severity of a security breach and identify the data that has been compromised, monitor and analyze logs and alarms from security equipment.
- Find, gather, and record pertinent information as evidence for a hypothetical company or Canadian justice system case.