Location
Start Dates

  • January 07, 2020
  • September 01, 2020
Duration

2Terms

Course Delivery

  • In Class
Tuition & Fees

Domestic: CAD $11,444
International: CAD $33,044

Program Description

The need for cybersecurity expertise is only going to increase as the technological industry continues to evolve and expand. Working professionals and recent graduates can advance their career goals by building on their previous education and experience with a Cybersecurity Post-Diploma Certificate. By focusing on operating system concepts, introductory computer forensics and network protocols, this program will prepare learners to design and implement secure computation solutions. In addition, graduates will enhance their business acumen with stronger communication, technical and problem-solving skills.

  

Potential graduate career opportunities

This in-demand industry is experiencing a shortage, opening the door to a range of exciting career opportunities including:

Cybersecurity analyst Data security analyst
Cyberdefense solutions sales specialist Cloud portfolio architect
IT security specialist Information security analyst
Security analyst IT security architect
Network technician Quality assurance
IT developer IT architect
Solutions architect Test analyst
Systems administrator IT security advisor
IT asset management
 

Laptop Specifications

  • Intel quad core CPU (i5 or i7)
  • 8GB RAM (16GB recommended)
  • 13-inch 1080p screen (15 inches recommended)
  • Adedicated graphics card with 2GB of VRam
  • 128GB solid state hard drive (256GB recommended)
  • Portable hard drive (for data backup)
  • Windows 10

** Equivalent specification in an Apple MacBook Pro is acceptable.

Course Listings Request More Information How to Apply

Domestic Applicants

Prospective Student Centre
South Campus – Main Floor
info@bowvalleycollege.ca
403-410-1402


International Learner Applicants

International Education
North Campus – Third Floor
international@bowvalleycollege.ca
403-410-3476


Admission Requirements

  • Completion of a Diploma or Degree in Information Technologies, Computer Engineering, Software Development, Management Information Systems or equivalent.  
English language proficiency requirements

For applicants whose first language is not English, please review our English language proficiency requirements.

Course Listings Request More Information How to Apply

Domestic Applicants

Prospective Student Centre
South Campus – Main Floor
info@bowvalleycollege.ca
403-410-1402


International Learner Applicants

International Education
North Campus – Third Floor
international@bowvalleycollege.ca
403-410-3476

Course Listing


Term 1

Required CoursesCredit

Learners will study how to develop and implement a security mission to meet an organization's overall goals and objectives. They will develop controls through identifying roles and responsibilities of organization members, to provide security without limiting access to information to members of the organization. Topics will include employment practices, policy formation, security awareness training, and data classification.

Course Delivery

Learners in this course will study the design and implementation of
operating systems including basic structure, synchronization,
implementation of processes, memory organization, security architecture and I/O device management. Topics will include communication mechanisms, process management, virtual memory, secondary storage, and filing systems. Learners will learn to balance between security needs and the needs of the organization and will learn how to protect from attacks and scan for known security problems.

Course Delivery

This course will provide the basic theory of cryptography. Learners will
study topics of encryption, digital signatures, data integrity,
authentication, key management, and zero-knowledge protocols. The
course will be structured in a way that delivers the real-world application
of these cryptographic techniques.

Course Delivery

Learners will begin to the learn the fundamentals of network security
through skills and techniques in network access control, rights and
permissions, local and remote network authentication, and identification. Topics will include the transmission of information, protection of information, email and web security, attacks and countermeasures, and fraud.

Course Delivery

Term 2

Required CoursesCredit

This course expands on the skills studied in Introduction to Network
Security to include intrusion prevention and virtual private networks.
Learners will cover topics on existing security technologies, products and
solutions. They will learn firewall design, IPv6, installation and
configuration, intrusion prevention using routers, and virtual private
network implementation.

Course Delivery

Learners will be introduced to the most common and current
vulnerabilities and how to defend against them for applications. Topics
will include testing applications for vulnerabilities and testing
applications for misconfigurations, cloud applications, and scanner and
the interpretation of their output. Additionally, learners will use manual
and automated tools for both clients and servers to map, discover, exploit and secure web applications.

Course Delivery

This course will provide learners with techniques to find, assess, and
correct vulnerabilities in information systems using industry best
practices. Upon completion of this course learners will be able to find
cyber-attack vulnerabilities, and will understand the importance of
protecting data from attack with penetration testing methodologies.

Course Delivery

Learners will take what they have learned in their previous courses and
will apply the principles of security to cloud computing. Topics will
cover an introduction to cloud computing, security challenges,
infrastructure security in the cloud, policy and governance for cloud
computing, compliance and legal considerations, identity and access
management, and data security.

Course Delivery

This course will give learners the understanding of the security
architecture used in server operating systems, and for mobile devices.
Topics will include tuning kernel and operating system parameters,
deactivating components, mobile operating systems and tightening
remaining components.

Course Delivery

While the main focus of cybersecurity is the prevention of security
breaches, these breaches can still happen. This course will equip learners with the principles of computer forensics, to detect, track and analyze digital evidence. Using real-world examples learners will cover topics of program execution, file opening, the security life cycle, and network usage using multiple open source forensic tools.

Course Delivery
Related Programs

Your cart is currently empty.

Browse Available Courses