The growing internet security sector requires an in-depth understanding of cyber security issues and fundamental internal architecture and protocols. Gain a broad understanding of cyber security concepts that will protect an organization against fraud, data breaches and other vulnerabilities.
View courses available this term under Program of Studies.
You do not need to apply to begin this program, simply ensure you meet the admission requirements (listed on the Admission & Registration tab) and then you may register for any available courses.
Interested in taking a single course? No problem. Provided you have the appropriate prerequisites, these courses can be taken individually or as part of the full program.
Admission & Registration
Ontario Secondary School Diploma (OSSD) or equivalent (Mohawk Academic Upgrading, GED) OR 19 years of age or older.
You do not need to apply to begin this program. Start by ensuring you meet the admission requirements listed above and then register for the courses listed in the Program of Studies when they are offered. Some courses have prerequisites, so please check the Program of Studies for details. Find out how to register for a course.
Program of Studies
The program of studies displayed below applies to students starting the program in the current academic year. Students who began in other academic years may require different courses to be eligible to graduate. If you have questions regarding a strategy for completion contact Continuing Education - Technology and Skills.
Visit the Textbooks page for information on ordering your course materials.
Completion Requirement: Choose any 10 courses
Click on the course number below to check current availability and for registration information
Options - Choose 10 Courses
|Course Number||Course Name||Course Description|
|INFO10222||Ethical Hacking and Network Defense||Learn to assess and correct vulnerabilities in information systems. Discover the tools and penetration testing methodologies used by ethical hackers, discuss what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Investigate methods and tools used in attacks, countermeasures, available security resources and attack types. 42 hours.|
|INFO10223||IT Security Policies||Study key structure elements and terms of written information protection policy and review typical policy contents. Develop the related standards, procedures, and guidelines for implementing the policy. Evaluate the tools needed to select, develop, and apply a security program that meets business goals. 42 hours.|
|INFO10224||Legal & Ethical Issues in IT Security||Explore legal and ethical issues in information technology as they relate to internal organizational relationships, customers, partners, and society. Discover the requirements of information systems security and legal compliance to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations, and any information which should be protected from unreasonable intrusion. 42 hours.|
|INFO10225||Operating Systems Security - Windows and Linux||Recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications. Discover defense strategies through system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies. 42 hours.|
|INFO10226||Principles of Information Security||Provides a background in information security, security management, and the technical components of security. Includes the entire field of information security: history, terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management. 42 hours.|
|INFO10221||Wireless and Mobile Device Security||Explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security. 45 hours.|
|INFO10238||Mobile Application Security Design||Discover and exploit flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. 45 hours.|
|INFO10239||Network Security and Penetration Testing||Examine the realm of network security, spotlighting the latest threats and vulnerabilities. Address how and why people attack computers and networks, and gain the knowledge and techniques to successfully consider methods of combatting hackers. 45 hours.|
|INFO10244||Firewalls and VPNs||Explore network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Focus on managerial and technical aspects of security. Covers packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. 60 hours.|
|INFO10245||Hacker Techniques, Tools, and Incident Handling||Analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Examine how attacks target networks and the methodology they follow. 60 hours.|
|COMP10223||Computer Forensics and Investigation||Examine and discover computer forensics, operating systems and how they function. Introduces forensic tools and concepts such as chain of custody and documentation of evidence/procedures. Evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings. 45 hours.|
The list of scheduled course offerings for this program is below. Please note that all offerings are subject to change.
|Course Code||Course Name||Fall
(Sep to Dec)
(Jan to Apr)
(May to Aug)
|INFO10222||Ethical Hacking and Network Defense||
|INFO10223||IT Security Policies||OntarioLearn||OntarioLearn||OntarioLearn|
|INFO10224||Legal & Ethical Issues in IT Security||OntarioLearn||OntarioLearn||OntarioLearn|
|INFO10225||Operating Systems Security - Windows and Linux||OntarioLearn||OntarioLearn||OntarioLearn|
|INFO10226||Principles of Information Security||OntarioLearn||OntarioLearn||OntarioLearn|
|INFO10221||Wireless and Mobile Device Security||OntarioLearn||OntarioLearn||OntarioLearn|
|INFO10238||Mobile Application Security Design||OntarioLearn||OntarioLearn||OntarioLearn|
|INFO10239||Network Security and Penetration Testing||OntarioLearn||OntarioLearn||OntarioLearn|
|INFO10244||Firewalls and VPNs||OntarioLearn||OntarioLearn||OntarioLearn|
|INFO10245||Hacker Techniques, Tools, and Incident Handling||OntarioLearn||OntarioLearn||OntarioLearn|
|COMP10223||Computer Forensics and Investigation||
Visit CE Get Started, your go-to online resource for getting started. You’ll find information on online tools and the wide range of student services available to you to support your success as a Mohawk College student and to help you achieve your future goals!
Login to MyMohawk
MyMohawk is the college portal used to access your student account information, email, grades and more. Your username and password can be found on the Continuing Education Acknowledgement of Registration & Student Account form that was sent to you after you registered for your course. Visit the Getting Started - MyMohawk Guide for step-by-step instructions.
Access Mohawk Email
On the MyMohawk Home screen you will see a link to Mohawk email. Visit the Getting Started – Mohawk Email Guide to learn how to set up your account on your devices.
Visit www.ontariolearn.com to access your course. Visit the OntarioLearn Course page for step-by-step instructions. Please note your course will not appear in OntarioLearn until the scheduled start date.
Find your Textbook
Use the Mohawk College Textbook Search to find your course materials.
Explore Contacts and Services
Online learning courses provide you with the opportunity to learn online, anywhere, at your convenience! You can study at home or at work - wherever you like, whenever you like, within a predetermined time frame.
Courses are delivered over a set time period and are led by instructors. Most courses do not require that you be online at a certain time of day or night, but that you are active in the course during the schedule. There are scheduled start and end dates and you cannot start courses late nor finish early.
Visit the OntarioLearn Course page to discover how to get started on OntarioLearn. Please note your course will not appear in OntarioLearn until the scheduled start date.
Visit Exams for Online Courses for everything you need to know about booking and writing your online learning exam.