Information Technology Network Security
- Ontario College Graduate Certificate
- College Code:
- Engineering & Information Technology
- Program Code:
- Accelerated Delivery:
- Academic Year:
- 2017 / 2018
About the ProgramInformation technology and network infrastructure are targets for malicious activity on a regular basis. News reports about data breaches, security violations, privacy failures and other infrastructure failures highlight a growing threat to business and personal information. This one-year, full-time, graduate certificate program is designed to address this growing threat to our network infrastructure. It will provide students with the security background in network technologies, computing hardware, operating and protocols, to harden and further secure such systems from attack. Students will learn to identify threats through audits and supporting technical methods, as well as evaluate and develop appropriate policies to support a strong organizational security posture. This program offers skills that allow graduates to evaluate risk and design infrastructure solutions that keep a business's code, data and network systems safe.
In the Information Technology Network Security program, students benefit from specialized courses taught by highly qualified industry experts. As a result, students should expect to have classes scheduled up till 8:00 p.m.
Program InformationLength: One-year Ontario College Graduate Certificate program
Doon (Kitchener) - September/2017 - Fall | Winter
Doon (Kitchener) - January/2018 - Winter | Spring/Summer
Doon (Kitchener) - May/2018 - Spring/Summer | Fall
Location: Doon (Kitchener)
Start: September, January and May
First-Year Capacity: 30
- A two- or three-year diploma or a degree from an accredited college or university or a minimum of 5 (five) years of full-time work experience as an IT system or network administrator or in a similar position
- Applicants will be ranked based on an assessment of academic performance, length of degree/diploma, level of degree/diploma, degree/diploma discipline, and level of supporting IT technology experience and/or specific education.
- Supporting technology experience includes any one or all of the following:
- Microsoft operating systems (including directory systems)
- Linux/UNIX operating systems (including directory systems)
- Network technology systems (routers, switches, firewalls, etc.)
Note re: Admission Requirements
- All applicants are expected to have fundamental experience with Microsoft operating systems, Linux/Unix operating systems, and networking concepts including transmission control and Internet protocols (TCP/IP).
- Applicants possessing degrees/diplomas from institutions where the language of instruction was not English will be required to provide test scores as evidence of their English language proficiency. Test scores, if required, would be a minimum of TOEFL iBT 88; IELTS 6.5 with no bands less than 6.0 or IELTS 6.0 with no band less than 5.5 and an overall average grade of B or above (as assessed, by country, to Ontario standards) in the academic program(s) specified in Admissions Requirements; CAEL 70 with no sub-test band scores less than 60; PTE Academic 58; Conestoga English Language Test (CELT) Band 6; or equivalent scores in other recognized standard tests of English.
- We offer a language program for students whose English language skills are below the standard required for admission but all other admission criteria have been met. You will be eligible for admission to the graduate certificate program after completion of level 4 of the General Arts and Science - English Language Studies (ELS) program with an overall grade average of 80% and no grade less than 75%. Your placement in the ELS program is determined by scores on an in-house English language test or TOEFL or IELTS.
Program RequirementsFinal selection is made following an assessment of the admission requirements.
Tuition & Fees
Tuition fee details for the 2017-2018 year are listed below. Books and supplies are additional.
Financial AssistanceThe Ontario Student Assistance Program (OSAP) is a needs-based program designed to help Ontario students cover the cost of post-secondary education. Funded by the federal and provincial governments, OSAP is intended to promote equality of opportunity for post-secondary studies through direct financial assistance for educational costs and living expenses. These interest-free loans are intended to supplement your financial resources and those of your family. The majority of students apply for loan assistance via the OSAP website. Students can also print the application booklet through the OSAP website.
For more information, please visit Financial Services/Awards.
Graduate OpportunitiesGraduates are prepared for opportunities in advanced roles in IT systems and network administration/services, with job titles that may include security administrator/analyst, security systems engineer, security auditor, security architect, and network security analyst.
For more details on related occupations, job market information and career opportunities, see the Government of Canada website: https://www.jobbank.gc.ca/home
Pathways & Credit TransferConestoga pathways enable students to build on their academic achievements in order to earn a degree or additional credential. Pathways are formed through agreements between Conestoga programs or partner institutions.
Often applicants have earned credits from another college or university that may allow a student to be granted advanced standing or exemption. Learn more about credit transfer opportunities at Conestoga.
Prior Learning Assessment and Recognition (PLAR)Conestoga recognizes prior learning of skills, knowledge or competencies that have been acquired through employment, formal and informal education, non-formal learning or other life experiences. Prior learning must be measurable at the required academic level and meet Conestoga standards of achievement for current courses. Challenge exams and portfolio development are the primary methods of assessment. Other methods of assessment may be available depending upon the nature of the course objectives. Successful completion of the assessment results in an official course credit that will be recorded on the student's Conestoga transcript. PLAR cannot be used by registered Conestoga students for the clearance of academic deficiencies, to improve grades or to obtain admission into a program.
Learn more about PLAR.
|Course Code||Course Title and Description|
|INFO8160||Fundamentals of Information Security
Description: This course will cover the three basic tenets that are at the foundation of modern information security practices: confidentiality, integrity, and availability. Topics will include the historical background of Information security, encryption, data classification, and other related technical processes supporting the confidentiality, integrity, and availability of infrastructure and systems.
|INFO8460||Windows Infrastructure and Security
Description: Best practice approaches for hardening Windows-based infrastructure will be explored in this course, with students gaining the skills to apply these methodologies. The use of vulnerability scanning techniques to identify existing issues and the effectiveness of hardening techniques will also be covered. Both topics will be covered in the context of the security architecture theory of Windows and Active Directory-based systems.
|INFO8470||Linux Infrastructure and Security
Description: Best practice approaches for hardening Linux-based infrastructure will be explored in this course, with students gaining the skills to apply these methodologies themselves. The use of vulnerability scanning techniques to identify existing issues and the effectiveness of hardening techniques will also be covered. Both topics will be covered in the context of the security architecture theory of the Linux kernel and widely used distributions.
|INFO8480||IT Security Planning, Audit and Compliance
Description: This course will cover the principles of security planning, audit, governance and controls in the context of IT systems. Topics in this course will reinforce the importance of planning and auditing for compliance to industry and organization standards using best practice methodologies. Supporting monitoring, management, and logging tools will also be covered.
|INFO8490||Network Security I
Description: Fundamental components of network security are introduced in this course, including topics such as network protocols and standards relating to secure network design and operations. Approaches to the security operation of routing and switching infrastructure including virtual private networks will also be included.
|INFO8500||Network Security II
Description: Building from Network Security I this course will provide further coverage of more advanced network security topics, including firewalls, intrusion protection systems (IPS), network access controls (NAC), and other supporting technologies.
Description: To protect against hackers, information technology professionals need to be comfortable with the techniques and approaches that could be used against their infrastructure and systems. Honeypots, viruses. Trojans, considerations regarding IDS and firewalls will all be covered, including human factors / social engineering theory. Through an understanding of the methods and technologies that may be used against an organization, a network security professional can better protect and mitigate these measures.
|INFO8520||Fundamentals of Computer Forensics
Description: Management of investigations of the state of IT systems is a key role for security professionals. Topics for this course will include techniques for evidence collection and required controls thereof for looking at IT data and metadata from both active and inactive sources.
|INFO8530||Virtualization and Cloud Security
Description: With the increasing adoption of virtual and cloud technologies, specific approaches are needed in responding to the security implications of these environments. Topics covered will include supply chain and data residency considerations, network implications of distributed infrastructure, and security risks and opportunities with virtual and cloud systems from Infrastructure-as-a-Service to Software-as-a-Service
|INFO8540||Wireless and Mobile Security
Description: This course will explore the security considerations in wireless technologies and the approaches to optimize and manage security. Options and choices with respect to the design and implementation of wireless networks in the context of security will be covered in the context of industry best practices. Mobile device security considerations and techniques will also be covered, in addition to the impact of the growing “Internet of Things” inside an organization.
|INFO8550||Contingency Planning and Disaster Recovery
Description: Planning to support proactive availability and recovery is a key component of a strong security environment with an organization. Planning for security related technology issues and having the right tools and implementations available when the time arises can make a significant impact to how an organization investigates and mitigates threats. Topics covered will include backup, recovery, and redundancy/replication technologies and approaches.
- Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.
- Comply with security policies, standards, and regulations typical to an organization in the design and implementation of security solutions.
- Plan, implement, and evaluate security policies and strategies using project management principles to effectively respond to the needs of the organization's information security requirements.
- Outline the processes and procedures involved in the maintenance and deployment of security solutions.
- Assess and test networked and virtualized IT systems with respect to security threats such as theft, damage, as well as alternation and/or interruption of services.
- Install, configure and troubleshoot system and network enhancements to promote security in an organization.
- Develop security strategies and processes for business communications that respond to the needs of all stakeholders.
- Evaluate the effectiveness of a security system through security audits to identify and correct security issues.
- Develop and deliver appropriate internal security documentation and training to ensure compliance with security policies.
- Communicate security protocols, policies, and audit results and related documentation to any level of the organization.
Program Advisory CommitteesThe College appoints Program Advisory Committee members for diploma, degree, certificate and apprenticeship programs. Committees are composed of employers, practitioners and recent program graduates. College representatives (students, faculty, and administrators) are resource persons. Each committee advises the Board on the development of new programs, the monitoring of existing programs and community acceptance of programs.
For a list of the current members, please visit our Program Advisory Committees.
Apply NowDomestic students should apply online at www.ontariocolleges.ca or by phone at 1-888-892-2228.
60 Corporate Court
Canada N1G 5J3
Detailed steps on the application process may help you to apply.
International students should apply online using the Conestoga College International Application Portal. Please note: not all programs are open to international students. Interested students should check the listing of open programs on our international students web page before applying.
International students should apply online using a Conestoga College International Application Form. Please note: not all programs are open to international students. Interested students should check the listing of open programs on our international students web page before applying.
The College reserves the right to alter information including requirements and fees and to cancel at any time a program, course, or program major or option; to change the location and/or term in which a program or course is offered; to change the program curriculum as necessary to meet current competencies in the job market or for budgetary reasons; or to withdraw an offer of admission both prior to and after its acceptance by an applicant or student because of insufficient applications or registrations, over-acceptance of offers of admission, budgetary constraints, or for other such reasons. In the event the College exercises such a right, the College’s sole liability will be the return of monies paid by the applicant or student to the College.
Students actively registered in cohort delivered programs who take longer than the designed program length of time to complete their studies are accountable for completing any new or additional courses that may result due to changes in the program of study. Unless otherwise stated, students registered in non-cohort delivered programs must complete the program of study within seven years of being admitted to the program.