Cyber Security

Acknowledgement of Completion
Two professionals working together with many monitors

The growing internet security sector requires an in-depth understanding of cyber security issues and fundamental internal architecture and protocols. Gain a broad understanding of cyber security concepts that will protect an organization against fraud, data breaches and other vulnerabilities.

View courses available this term under Program of Studies.

You do not need to apply to begin this program, simply ensure you meet the admission requirements (listed on the Admission & Registration tab) and then you may register for any available courses.

Interested in taking a single course? No problem. Provided you have the appropriate prerequisites, these courses can be taken individually or as part of the full program.

Contact Continuing Education

Technology and Skills Development

Ontario Secondary School Diploma (OSSD) or equivalent (Mohawk Academic Upgrading, GED) OR 19 years of age or older.

You do not need to apply to begin this program. Start by ensuring you meet the admission requirements listed above and then register for the courses listed in the Program of Studies when they are offered.  Some courses have prerequisites, so please check the Program of Studies for details. Find out how to register for a course.

The program of studies displayed below applies to students starting the program in the current academic year. Students who began in other academic years may require different courses to be eligible to graduate. If you have questions regarding a strategy for completion contact Continuing Education - Technology and Skills.

Visit the Textbooks page for information on ordering your course materials.

Completion Requirement: Choose any 10 courses 

Click on the course number below to check current availability and for registration information

Options - Choose 10 Courses

Course Number Course Name Course Description
INFO10222 Ethical Hacking and Network Defense Learn to assess and correct vulnerabilities in information systems. Discover the tools and penetration testing methodologies used by ethical hackers, discuss what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Investigate methods and tools used in attacks, countermeasures, available security resources and attack types. 42 hours.
INFO10223 IT Security Policies Study key structure elements and terms of written information protection policy and review typical policy contents. Develop the related standards, procedures, and guidelines for implementing the policy. Evaluate the tools needed to select, develop, and apply a security program that meets business goals. 42 hours.
INFO10224 Legal & Ethical Issues in IT Security Explore legal and ethical issues in information technology as they relate to internal organizational relationships, customers, partners, and society. Discover the requirements of information systems security and legal compliance to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations, and any information which should be protected from unreasonable intrusion. 42 hours.
INFO10225 Operating Systems Security - Windows and Linux Recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications. Discover defense strategies through system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies. 42 hours.
INFO10226 Principles of Information Security Provides a background in information security, security management, and the technical components of security. Includes the entire field of information security: history, terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management. 42 hours.
INFO10221 Wireless and Mobile Device Security Explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security. 45 hours.
INFO10238 Mobile Application Security Design Discover and exploit flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. 45 hours.
INFO10239 Network Security and Penetration Testing Examine the realm of network security, spotlighting the latest threats and vulnerabilities. Address how and why people attack computers and networks, and gain the knowledge and techniques to successfully consider methods of combatting hackers. 45 hours.
INFO10244 Firewalls and VPNs Explore network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Focus on managerial and technical aspects of security. Covers packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. 60 hours.
INFO10245 Hacker Techniques, Tools, and Incident Handling Analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Examine how attacks target networks and the methodology they follow. 60 hours.
COMP10223 Computer Forensics and Investigation Examine and discover computer forensics, operating systems and how they function. Introduces forensic tools and concepts such as chain of custody and documentation of evidence/procedures. Evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings. 45 hours.

The list of scheduled course offerings for this program is below. Please note that all offerings are subject to change. 

Course Code Course Name Fall
(Sep to Dec)
(Jan to Apr)
(May to Aug)
INFO10222 Ethical Hacking and Network Defense




INFO10223 IT Security Policies OntarioLearn OntarioLearn OntarioLearn
INFO10224 Legal & Ethical Issues in IT Security OntarioLearn OntarioLearn OntarioLearn
INFO10225 Operating Systems Security - Windows and Linux OntarioLearn OntarioLearn OntarioLearn
INFO10226 Principles of Information Security OntarioLearn OntarioLearn OntarioLearn
INFO10221 Wireless and Mobile Device Security OntarioLearn OntarioLearn OntarioLearn
INFO10238 Mobile Application Security Design OntarioLearn OntarioLearn OntarioLearn
INFO10239 Network Security and Penetration Testing OntarioLearn OntarioLearn OntarioLearn
INFO10244 Firewalls and VPNs OntarioLearn OntarioLearn OntarioLearn
INFO10245 Hacker Techniques, Tools, and Incident Handling OntarioLearn OntarioLearn OntarioLearn
COMP10223 Computer Forensics and Investigation




Getting Started

Visit CE Get Started, your go-to online resource for getting started. You’ll find information on online tools and the wide range of student services available to you to support your success as a Mohawk College student and to help you achieve your future goals!

Login to MyMohawk
MyMohawk is the college portal used to access your student account information, email, grades and more. Your username and password can be found on the Continuing Education Acknowledgement of Registration & Student Account form that was sent to you after you registered for your course. Visit the Getting Started - MyMohawk Guide for step-by-step instructions.

Access Mohawk Email
On the MyMohawk Home screen you will see a link to Mohawk email. Visit the Getting Started – Mohawk Email Guide to learn how to set up your account on your devices.

Access OntarioLearn
Visit OntarioLearn to access your course. Visit the OntarioLearn Course page for step-by-step instructions. Please note your course will not appear in OntarioLearn until the scheduled start date.

Find your Textbook
Use the Mohawk College Textbook Search to find your course materials.

Explore Contacts and Services

Online learning courses provide you with the opportunity to learn online, anywhere, at your convenience!  You can study at home or at work - wherever you like, whenever you like, within a predetermined time frame.

Courses are delivered over a set time period and are led by instructors. Most courses do not require that you be online at a certain time of day or night, but that you are active in the course during the schedule. There are scheduled start and end dates and you cannot start courses late nor finish early.

Visit the OntarioLearn Course page to discover how to get started on OntarioLearn. Please note your course will not appear in OntarioLearn until the scheduled start date.

Visit Exams for Online Courses for everything you need to know about booking and writing your online learning exam.