Cyber Security Analytics - 557
- Design cyber security solutions to protect business resources.
- Create best practices in protecting mobile devices, smart homes and Industry 4.0 factories from cyber attacks.
- Participate in simulation labs where you will defend against cyber attacks.
- Engage in hands on experiential learning in our state of the art cyber labs facilitated by our expert faculty
- Study using extensive online learning and night classes to fit your busy schedule
What you'll learn
- Develop, implement and evaluate cyber security strategies and solutions for various operating systems, networks, application software, and packages.
- Respond to the cyber security needs of all the internal stakeholders.
- Recommend processes and procedures for maintenance and deployment of cyber security solutions.
- Design and implement cyber security solutions in compliance with current security policies, ethical standards, and industry regulations.
- Project management principles to effectively respond to the needs of the organization’s information security requirements.
- Risk mitigation and auditing of information systems.
- Develop and deliver appropriate internal cyber security training.
- Communicate security policies, audit results and related documentation to any level of the organization.
- Design and implement vulnerability assessment procedures to find and solve existing security issues in a network through monitoring and analyzing different attackers’ tactics, strategies and techniques.
Admission & Registration
- Prior approval for this certificate is necessary.
- University degree or college diploma (two year or longer) including most Business programs, Computer Science, or Humanities and Social Sciences OR an acceptable combination of related work experience and postsecondary education (as determined by the college).
- Please complete the application page and include either a copy of online course marks or a digital transcript to receive a conditional offer.
- Original, official transcripts (in a sealed envelope from the issuing institution) must be submitted in order to receive an official, and final, offer for the program.
- Applicants declaring permanent resident or Convention Refugee status in Canada, must submit a copy of their Permanent Resident Card (PR card) along with their application.
- All applicants submitting international transcripts must also provide an official and sealed credential evaluation report. This can be coordinated through any of the following:
- International Credential Assessment Service of Canada (ICAS) (opens new window)
- University of Toronto Comparative Education Service (CES) (opens new window)
- World Education Services (WES) (opens new window)
- An official English Language Proficiency score report outlining a minimum grade of 7 in all components.
- Other information or documents may be requested to determine your eligibility.
Program of Studies
The program of studies displayed below applies to students starting the program in the current academic year. Students who began in other academic years may require different courses to be eligible to graduate. If you have questions regarding a strategy for completion contact Continuing Education - Technology and Skills Development. Please note this same program is offered through both Full Time Studies and Continuing Education at Mohawk College.
Click on the Course number for more information on each course, including courses marked Special Approval.
Visit the Textbooks page for information on ordering your course materials.
It is highly recommended that CYBR10007 be taken after completion of first semester courses (CYBR10000, CYBR10001, CYBR10002, CYBR10003, CYBR10004 and CYBR10005).
|Course Number||Course Name||Course Description|
|CYBR10000||Security Operations (Foundations)||Discuss the foundations of cyber security operations using a variety of architecture models. Explain concepts of Investigation, e-discovery, reporting and documenting, forensics, logging and monitoring, and vulnerability management to be able to make recommendations for cyber security within organizations. 56 hours.|
|CYBR10001||Cyber Security Assessment and Testing||Design assessment and test strategies to analyze security structure. Evaluate cyber security control testing in relationship to quality assurance processes, and assess security architectures' vulnerabilities. 56 hours.|
|CYBR10002||Identity and Access Management Personal Security||Develop processes for the identification and authentication of people and devices. Analyze risks associated with identity services (cloud identity, third-party, etc.). Analyze access control attacks throughout the identity and access provisioning lifecycle. Recommend physical and logical asset management structure. 56 hours.|
|CYBR10003||Asset Security||Recommend handling requirements, data security controls, and asset retention to protect privacy. Investigate issues of ownership and information & asset classification. 56 hours.|
|CYBR10004||Auditing and Security Review||Examine the relationship between standard audit procedures and cyber security policies, including legal and regulatory requirements. 56 hours.|
|CYBR10005||Communication and Network Security||Analyze and design the requirements necessary to secure network architectures and its components. Secure communication channels and prevent network attacks. 56 hours.|
|CYBR10006||Cyber Security and Risk Management and Response||Investigate concepts of confidentiality, integrity, and availability. Examine legal and regulator issues, compliance, and professional ethics. Evaluate security policies, standards, procedures, and guidelines. 56 hours.|
|CYBR10007||Security Strategy Engineering||Evaluate fundamental security model concepts and security capabilities of information systems. Compare and contrast vulnerabilities of web-based systems, cloud systems, mobile systems, embedded devices, and cyber-physical systems. Recommend physical security for site and facility design. 56 hours.|
|CYBR10008||Evolving Threats and Keeping Current||Evaluate a variety of resources designed to diminish threats. Recommend software and cloud resources. Plan staff and user training on cyber security processes. Identify the role of law enforcement and the legal system. 56 hours.|
|CYBR10009||Social Media - Security Best Practices||Evaluate recommended cyber security best practices for social media applications. Recommend social media etiquette, settings, policies, training and procedures for personal privacy. 56 hours.|
|CYBR10010||Software Development - Security Best Practices||Evaluate and recommend cyber security controls to the development environment. Evaluate software security efficacy and the impact of acquired software security. Assess security through the software development lifecycle. 56 hours.|
|CYBR10011||Cyber Security Evaluation Project Management||Plan, analyze, design, and execute a security management process. Initiate, monitor, and resolve a project to manage security of an organization. Plan, initiate, execute, and monitor and control a project plan to implement a cyber security infrastructure. 56 hours.|
The list of scheduled course offerings for this program is below. Please note that all offerings are subject to change. Not every course is offered every semester, so please consider this schedule when planning your academic path.
|Course Code||Course Name||Fall
(Sep to Dec)
(Jan to Apr)
(May to Aug)
|CYBR10000||Security Operations (Foundations)||
|CYBR10001||Cyber Security Assessment and Testing||
|CYBR10002||Identity and Access Management Personal Security||
|CYBR10004||Auditing and Security Review||
|CYBR10005||Communication and Network Security||
|CYBR10006||Cyber Security and Risk Management and Response||
|CYBR10007||Security Strategy Engineering||
|CYBR10008||Evolving Threats and Keeping Current||
|CYBR10009||Social Media - Security Best Practices||
|CYBR10010||Software Development - Security Best Practices||
|CYBR10011||Cyber Security Evaluation Project Management||
Visit CE Get Started, your go-to online resource for getting started. You’ll find information on online tools and the wide range of student services available to you to support your success as a Mohawk College student and to help you achieve your future goals!
Login to MyMohawk
MyMohawk is the college portal used to access your student account information, email, grades and more. Your username and password can be found on the Continuing Education Acknowledgement of Registration & Student Account form that was sent to you after you registered for your course. Visit the Getting Started - MyMohawk Guide for step-by-step instructions.
Access Mohawk Email
On the MyMohawk Home screen you will see a link to Mohawk email. Visit the Getting Started – Mohawk Email Guide to learn how to set up your account on your devices.
On the MyMohawk Home screen you will see a link to MyCanvas, Mohawk College’s Learning Management System. Visit the Getting Started - MyCanvas for step-by-step instructions. Please note your course will not appear in MyCanvas until the scheduled start date.
Find your Textbook
Use the Mohawk College Textbook Search to find your course materials.
Explore Contacts and Services
Frequently Asked Questions
Program Learning Outcomes, often referred to as ‘Program Standards', set out the essential learning that a student must achieve before being deemed ready to graduate.
In many cases these program learning outcomes were developed by the Ministry of Colleges and Universities (MCU) in consultation with employers and educators who are experts in the program field. To ensure the outcomes remain current and in line with industry needs, we invite our employers, graduates working in the field and current students to re-examine and update them during regular, ongoing program review focus groups.
- Develop and implement cyber security solutions considering the affordances of the computer operating systems, networks, application software, and packages available.
- Implement and evaluate security solutions for business processes, applications and communications to protect business resources and respond to the needs of all the internal stakeholders.
- Recommend processes and procedures for maintenance and deployment of cyber security solutions.
- Evaluate and recommend innovative cyber security strategies that provide secure solutions for organizational processes and applications.
- Design and implement cyber security solutions in compliance with the current security policies, ethical standards, and industry regulations.
- Plan, implement, and evaluate cyber security policies and strategies using project management principles to effectively respond to the needs of the organization’s information security requirements.
- Optimize the effectiveness of the information security in a business environment through risk mitigation and auditing of information systems.
- Develop and deliver appropriate internal cyber security training to ensure compliance with security policies.
- Communicate security policies and audit results and relate documentation to any level of the organization.
- Implement and evaluate security policies and strategies by collaborating in cyber security projects as a multidisciplinary team member/leader to deliver effective solutions to the clients.
- Design and implement vulnerability assessment procedures to find and solve existing security issues in a network through monitoring and analyzing different attackers' tactics, strategies and techniques.
- Cybersecurity Operations
- Cybersecurity Threat Assessment and Policy Testing
- Identity and Access Management with Personal Privacy
- Asset Management
- Auditing and Security Review
- Risk Management and Response
- Evolving Threats – How to stay current
- Social Media Best Practices
- Software Development Best Practices
- Retail/ Wholesale
- Federal Government
- Provincial Government
- Research Institutions
- Small and Medium Business
- Law Enforcement
- Computing Services
For more details on related occupations, job market information and career opportunities, visit the Government of Canada Job Bank.