Cyber Security Analytics - 557

Ontario College Graduate Certificate
Online
Courses in this program are normally delivered face-to-face. Some courses have temporarily transitioned to an online delivery. Visit the Programs of Studies or Course Schedule tab for more information.
hands using a mobile device and laptop
Overview

Program Highlights

  • Design cyber security solutions to protect business resources.
  • Create best practices in protecting mobile devices, smart homes and Industry 4.0 factories from cyber attacks.
  • Participate in simulation labs where you will defend against cyber attacks.
  • Engage in hands on experiential learning in our state of the art cyber labs facilitated by our expert faculty
  • Study using extensive online learning and night classes to fit your busy schedule

What you'll learn

  • Develop, implement and evaluate cyber security strategies and solutions for various operating systems, networks, application software, and packages.
  • Respond to the cyber security needs of all the internal stakeholders.
  • Recommend processes and procedures for maintenance and deployment of cyber security solutions.
  • Design and implement cyber security solutions in compliance with current security policies, ethical standards, and industry regulations.
  • Project management principles to effectively respond to the needs of the organization’s information security requirements.
  • Risk mitigation and auditing of information systems.
  • Develop and deliver appropriate internal cyber security training.
  • Communicate security policies, audit results and related documentation to any level of the organization.
  • Design and implement vulnerability assessment procedures to find and solve existing security issues in a network through monitoring and analyzing different attackers’ tactics, strategies and techniques.
Program Contact
Continuing Education Technology
  • Prior approval for this certificate is necessary.
  • University degree or college diploma (two year or longer) including most Business programs, Computer Science, or Humanities and Social Sciences OR an acceptable combination of related work experience and postsecondary education (as determined by the college).
  • Please complete the application page and include either a copy of online course marks or a digital transcript to receive a conditional offer.
  • Original, official transcripts (in a sealed envelope from the issuing institution) must be submitted in order to receive an official, and final, offer for the program.
  • If Applicable:

    • Applicants declaring permanent resident or Convention Refugee status in Canada, must submit a copy of their Permanent Resident Card (PR card) along with their application.
    • All applicants submitting international transcripts must also provide an official and sealed credential evaluation report. This can be coordinated through any of the following:
    • An official English Language Proficiency score report outlining a minimum grade of 7 in all components.
    • Other information or documents may be requested to determine your eligibility.

Apply Now!

The program of studies displayed below applies to students starting the program in the current academic year. Students who began in other academic years may require different courses to be eligible to graduate. If you have questions regarding a strategy for completion contact Continuing Education - Technology and Skills. Please note this same program is offered through both Full Time Studies and Continuing Education at Mohawk College.

Click on the Course number for more information on each course, including courses marked Special Approval. 

Visit the Mohawk College Bookstore Textbook Search (opens in new window) for information on textbooks.

It is highly recommended that CYBR10007 be taken after completion of first semester courses (CYBR10000, CYBR10001, CYBR10002, CYBR10003, CYBR10004 and CYBR10005).

Mandatory Courses

Course Number Course Name Course Description
CYBR10000 Security Operations (Foundations) Discuss the foundations of cyber security operations using a variety of architecture models. Explain concepts of Investigation, e-discovery, reporting and documenting, forensics, logging and monitoring, and vulnerability management to be able to make recommendations for cyber security within organizations. 56 hours.
CYBR10001 Cyber Security Assessment and Testing Design assessment and test strategies to analyze security structure. Evaluate cyber security control testing in relationship to quality assurance processes, and assess security architectures' vulnerabilities. 56 hours.
CYBR10002 Identity and Access Management Personal Security Develop processes for the identification and authentication of people and devices. Analyze risks associated with identity services (cloud identity, third-party, etc.). Analyze access control attacks throughout the identity and access provisioning lifecycle. Recommend physical and logical asset management structure. 56 hours.
CYBR10003 Asset Security Recommend handling requirements, data security controls, and asset retention to protect privacy. Investigate issues of ownership and information & asset classification. 56 hours.
CYBR10004 Auditing and Security Review Examine the relationship between standard audit procedures and cyber security policies, including legal and regulatory requirements. 56 hours.
CYBR10005 Communication and Network Security Analyze and design the requirements necessary to secure network architectures and its components. Secure communication channels and prevent network attacks. 56 hours.
CYBR10006 Cyber Security and Risk Management and Response Investigate concepts of confidentiality, integrity, and availability. Examine legal and regulator issues, compliance, and professional ethics. Evaluate security policies, standards, procedures, and guidelines. 56 hours.
CYBR10007 Security Strategy Engineering Evaluate fundamental security model concepts and security capabilities of information systems. Compare and contrast vulnerabilities of web-based systems, cloud systems, mobile systems, embedded devices, and cyber-physical systems. Recommend physical security for site and facility design. 56 hours.
CYBR10008 Evolving Threats and Keeping Current Evaluate a variety of resources designed to diminish threats. Recommend software and cloud resources. Plan staff and user training on cyber security processes. Identify the role of law enforcement and the legal system. 56 hours.
CYBR10009 Social Media - Security Best Practices Evaluate recommended cyber security best practices for social media applications. Recommend social media etiquette, settings, policies, training and procedures for personal privacy. 56 hours. 
CYBR10010 Software Development - Security Best Practices Evaluate and recommend cyber security controls to the development environment. Evaluate software security efficacy and the impact of acquired software security. Assess security through the software development lifecycle. 56 hours.
CYBR10011 Cyber Security Evaluation Project Management Plan, analyze, design, and execute a security management process. Initiate, monitor, and resolve a project to manage security of an organization. Plan, initiate, execute, and monitor and control a project plan to implement a cyber security infrastructure. 56 hours.

The list of scheduled course offerings for this program is below. Please note that all offerings are subject to change. Not every course is offered every semester, so please consider this schedule when planning your academic path.

Course Code Course Name Fall 2020

(Sep to Dec)

CYBR10000 Security Operations (Foundations)

MyCanvas

CYBR10001 Cyber Security Assessment and Testing

MyCanvas

CYBR10002 Identity and Access Management Personal Security

MyCanvas

CYBR10003 Asset Security

MyCanvas

CYBR10004 Auditing and Security Review

MyCanvas

CYBR10005 Communication and Network Security

MyCanvas

CYBR10006 Cyber Security and Risk Management and Response

 

CYBR10007 Security Strategy Engineering

 

CYBR10008 Evolving Threats and Keeping Current

 

CYBR10009 Social Media - Security Best Practices

 

CYBR10010 Software Development - Security Best Practices

 

CYBR10011 Cyber Security Evaluation Project Management

 

Getting Started

Visit CE Get Started, your go-to online resource for getting started. You’ll find information on online tools and the wide range of student services available to you to support your success as a Mohawk College student and to help you achieve your future goals!

Login to MyMohawk
MyMohawk is the college portal used to access your student account information, email, grades and more. Your username and password can be found on the Continuing Education Acknowledgement of Registration & Student Account form that was sent to you after you registered for your course. Visit the Getting Started - MyMohawk Guide for step-by-step instructions.

Access Mohawk Email
On the MyMohawk Home screen you will see a link to Mohawk email. Visit the Getting Started – Mohawk Email Guide to learn how to set up your account on your devices.

Access MyCanvas
On the MyMohawk Home screen you will see a link to MyCanvas, Mohawk College’s Learning Management System. Visit the Getting Started - MyCanvas Guide for step-by-step instructions. Please note your course will not appear in MyCanvas until the scheduled start date.

Find your Classroom
Room assignments for Continuing Education are available on the WhereEnCampus Portal. Visit Room Listings for more information.

Find your Textbook
Use the Mohawk College Textbook Search to find your course materials.

Explore Contacts and Services 

Learning Outcomes

Program Learning Outcomes, often referred to as ‘Program Standards', set out the essential learning that a student must achieve before being deemed ready to graduate.

In many cases these program learning outcomes were developed by the Ministry of Colleges and Universities (MCU) in consultation with employers and educators who are experts in the program field. To ensure the outcomes remain current and in line with industry needs, we invite our employers, graduates working in the field and current students to re-examine and update them during regular, ongoing program review focus groups.

  • Develop and implement cyber security solutions considering the affordances of the computer operating systems, networks, application software, and packages available.
  • Implement and evaluate security solutions for business processes, applications and communications to protect business resources and respond to the needs of all the internal stakeholders.
  • Recommend processes and procedures for maintenance and deployment of cyber security solutions.
  • Evaluate and recommend innovative cyber security strategies that provide secure solutions for organizational processes and applications.
  • Design and implement cyber security solutions in compliance with the current security policies, ethical standards, and industry regulations. 
  • Plan, implement, and evaluate cyber security policies and strategies using project management principles to effectively respond to the needs of the organization’s information security requirements.
  • Optimize the effectiveness of the information security in a business environment through risk mitigation and auditing of information systems.
  • Develop and deliver appropriate internal cyber security training to ensure compliance with security policies.
  • Communicate security policies and audit results and relate documentation to any level of the organization.
  • Implement and evaluate security policies and strategies by collaborating in cyber security projects as a multidisciplinary team member/leader to deliver effective solutions to the clients.
  • Design and implement vulnerability assessment procedures to find and solve existing security issues in a network through monitoring and analyzing different attackers' tactics, strategies and techniques.

Career Opportunities

  • Cybersecurity Operations
  • Cybersecurity Threat Assessment and Policy Testing
  • Identity and Access Management with Personal Privacy
  • Asset Management
  • Auditing and Security Review
  • Risk Management and Response
  • Evolving Threats – How to stay current
  • Social Media Best Practices
  • Software Development Best Practices

Occupational Categories

  • Consulting
  • Financial/Banking
  • Manufacturing
  • Medical
  • Education
  • Retail/ Wholesale
  • Federal Government
  • Provincial Government
  • Airlines
  • Research Institutions
  • Small and Medium Business
  • Law Enforcement
  • Military
  • Computing Services

For more details on related occupations, job market information and career opportunities, see the Government of Canada website: www.jobbank.gc.ca/home