Conestoga College Logo - Home Page

Part-time Courses - Computer Security

Click on the course code or title below for a full description of the course. If available for registration, clicking on "Details" in the Status column will open a new browser tab or window in the Student Portal.

Courses
Course # Courses Length (Hours) Distance Status
OLRN8280 Computer Forensics and Investigation

Description: Students examine and discover computer forensics, operating systems and how they function. Students are introduced to forensic tools along with concepts such as chain of custody and documentation of evidence/procedures. Students evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.
Hours: 45
Credits: 3
Pre-Requisites:
CoRequisites:

45 Yes Details
OLRN8230 Ethical Hacking and Network Defense

Description: This course prepares students to assess and then correct the vulnerabilities present within information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber-attacks and about the tools and penetration testing methodologies used by ethical hackers. Systems are also investigated.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:

42 Yes Details
OLRN8260 Hacker Techniques, Tools and Incident Handling

Description: Students examine and analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.
Hours: 60
Credits: 4
Pre-Requisites:
CoRequisites:

60 Yes Details
OLRN8240 Legal and Ethical Issues in IT Security

Description: This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:

42 Yes Details
OLRN8250 Linux, Firewalls and VPN's

Description: This course explores Unix, Unix-like OSs, firewalls, and VPNs. Introducing students to the basic concepts of Unix/Linux, different file systems, editors, differences between Linux distributions, creating users, permissions, package managers, man pages, and other places to find help. This course also explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.
Hours: 60
Credits: 4
Pre-Requisites:
CoRequisites:

60 Yes Details
OLRN8270 Mobile Application Security Design

Description: This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Students learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
Hours: 45
Credits: 3
Pre-Requisites:
CoRequisites:

45 Yes Details
OLRN8300 Network Security and Penetration Testing

Description: Students examine the realm of network security, spotlighting the latest threats and vulnerabilities. The students address how and why people attack computers and networks--equipping them with the knowledge and techniques to successfully consider methods of combatting hackers.
Hours: 45
Credits: 3
Pre-Requisites: OLRN8250
CoRequisites:

45 Yes Details
OLRN8220 Operating Systems Security - Windows

Description: Preparing students to recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications, this course introduces defense strategies through understanding of system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:

42 Yes Details
OLRN8200 Principles of Information Security

Description: This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, the terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:

42 Yes Details
OLRN8210 Security Policies

Description: This course explores the key structure elements and terms of written information protection policies and reviews typical policy contents. Students develop the related standards, procedures, and guidelines for implementing policies and evaluate the tools needed to select, develop, and apply a security program that meets business goals.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:

42 Yes Details
OLRN8290 Wireless and Mobile Device Security

Description: Students explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, the student discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
Hours: 45
Credits: 3
Pre-Requisites:
CoRequisites:

45 Yes Details

Contacts for Computer Security.

SEARCH PART-TIME (PT)
Back To Top