- September 01, 2020
- In Class
Tuition & Fees
International: CAD $33,044
The need for cybersecurity expertise is only going to increase as the technological industry continues to evolve and expand. Working professionals and recent graduates can advance their career goals by building on their previous education and experience with a Cybersecurity Post-Diploma Certificate. By focusing on operating system concepts, introductory computer forensics and network protocols, this program will prepare learners to design and implement secure computation solutions. In addition, graduates will enhance their business acumen with stronger communication, technical and problem-solving skills.
Potential graduate career opportunities
This in-demand industry is experiencing a shortage, opening the door to a range of exciting career opportunities including:
|Cybersecurity analyst||Data security analyst|
|Cyberdefense solutions sales specialist||Cloud portfolio architect|
|IT security specialist||Information security analyst|
|Security analyst||IT security architect|
|Network technician||Quality assurance|
|IT developer||IT architect|
|Solutions architect||Test analyst|
|Systems administrator||IT security advisor|
|IT asset management|
- Intel quad core CPU (i5 or i7)
- 8GB RAM (16GB recommended)
- 13-inch 1080p screen (15 inches recommended)
- Adedicated graphics card with 2GB of VRam
- 128GB solid state hard drive (256GB recommended)
- Portable hard drive (for data backup)
- Windows 10
** Equivalent specification in an Apple MacBook Pro is acceptable.
- Completion of a post-secondary diploma or degree in information technologies, computer engineering, software development, management information systems, or equivalent.
English Proficiency Requirements
- For applicants whose first language is not English, please review our English language proficiency requirements.
In this course, learners develop a security mission to meet an organization's requirements. Learners map the architecture of a network in anticipation of constructing security plans. Focus falls on the major components within a typical network as well as the tools and techniques fundamental to information security.
In this course, learners focus on the alignment of security practices with organizational policy and business practices. Topics include security governance, continuity planning, security strategies, mitigation, and security training.
In this course, learners use the tools and techniques needed to safeguard organizations from threats to business activities such as network attacks, natural disasters, or unplanned disruptions to essential services. Focus is on business recovery planning as well as disaster recovery planning and how these impact cybersecurity.
In this course, learners use the tools and techniques of cryptography. Focus is on encryption types, digital signatures, data integrity, authentication, protocols, and key management.
In this course, learners practice the fundamental network security tasks, such as rights and permissions, local and remote network authentication, identification, and network monitoring. Focus is on network architecture, information transmission, e-mail and web security, attack countermeasures, and hacking.
This course expands on the skills studied in Introduction to Network
Security to include intrusion prevention and virtual private networks.
Learners will cover topics on existing security technologies, products and
solutions. They will learn firewall design, IPv6, installation and
configuration, intrusion prevention using routers, and virtual private
Learners will be introduced to the most common and current
vulnerabilities and how to defend against them for applications. Topics
will include testing applications for vulnerabilities and testing
applications for misconfigurations, cloud applications, and scanner and
the interpretation of their output. Additionally, learners will use manual
and automated tools for both clients and servers to map, discover, exploit and secure web applications.
This course will provide learners with techniques to find, assess, and
correct vulnerabilities in information systems using industry best
practices. Upon completion of this course learners will be able to find
cyber-attack vulnerabilities, and will understand the importance of
protecting data from attack with penetration testing methodologies.
Learners will take what they have learned in their previous courses and
will apply the principles of security to cloud computing. Topics will
cover an introduction to cloud computing, security challenges,
infrastructure security in the cloud, policy and governance for cloud
computing, compliance and legal considerations, identity and access
management, and data security.
This course will give learners the understanding of the security
architecture used in server operating systems, and for mobile devices.
Topics will include tuning kernel and operating system parameters,
deactivating components, mobile operating systems and tightening
While the main focus of cybersecurity is the prevention of security
breaches, these breaches can still happen. This course will equip learners with the principles of computer forensics, to detect, track and analyze digital evidence. Using real-world examples learners will cover topics of program execution, file opening, the security life cycle, and network usage using multiple open source forensic tools.
Software Development Post-Diploma Certificate
Prepare for a career in computer programming, web application development, software testing, and quality control.
Digital Marketing Post-Diploma Certificate
Enhance your existing diploma or degree. Add vital marketing and communication skills in the area of digital marketing.