The growing internet security sector requires an in-depth understanding of cyber security issues and fundamental internal architecture and protocols. Gain a broad understanding of cyber security concepts that will protect an organization against fraud, data breaches and other vulnerabilities.
Admission & Registration
Ontario Secondary School Diploma (OSSD) or equivalent (Mohawk Academic Upgrading, GED) OR 19 years of age or older.
You do not need to apply to begin this program. Start by ensuring you meet the admission requirements listed above and then register for the courses listed in the Program of Studies when they are offered. Some courses have prerequisites, so please check the Program of Studies for details. Find out how to register for a course.
Program of Studies
Below is the current Program of Study. To see which courses are currently being offered this term please visit the Course Catalogue.
For information on the textbooks needed for the upcoming term please visit our Textbook Search site.
Completion Requirement: Choose any 10 courses
Click on the course number below to check current availability and for registration information
|Course Number||Course Title||Description|
|INFO10222||Ethical Hacking and Network Defense||Learn to assess and correct vulnerabilities in information systems. Discover the tools and penetration testing methodologies used by ethical hackers, discuss what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Investigate methods and tools used in attacks, countermeasures, available security resources and attack types.|
|INFO10223||IT Security Policies||Study key structure elements and terms of written information protection policy and review typical policy contents. Develop the related standards, procedures, and guidelines for implementing the policy. Evaluate the tools needed to select, develop, and apply a security program that meets business goals.|
|INFO10224||Legal & Ethical Issues in IT Security||Explore legal and ethical issues in information technology as they relate to internal organizational relationships, customers, partners, and society. Discover the requirements of information systems security and legal compliance to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations, and any information which should be protected from unreasonable intrusion.|
|INFO10225||Operating Systems Security-Windows and Linux||Recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications. Discover defense strategies through system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies.|
|INFO10226||Principles of Information Security||Provides a background in information security, security management, and the technical components of security. Includes the entire field of information security: history, terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management.|
|INFO10221||Wireless and Mobile Device Security||Explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.|
|INFO10238||Mobile Application Security Design||Discover and exploit flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks.|
|INFO10239||Network Security and Penetration Testing||Examine the realm of network security, spotlighting the latest threats and vulnerabilities. Address how and why people attack computers and networks, and gain the knowledge and techniques to successfully consider methods of combatting hackers.|
|INFO10244||Firewalls and VPNs||Explore network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Focus on managerial and technical aspects of security. Covers packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.|
|INFO10245||Hacker Techniques, Tools, and Incident Handling||Analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Examine how attacks target networks and the methodology they follow.|
|COMP10223||Computer Forensics and Investigation||Examine and discover computer forensics, operating systems and how they function. Introduces forensic tools and concepts such as chain of custody and documentation of evidence/procedures. Evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.|