Conestoga College Logo - Home Page

Cyber Security (Part-time)

Credential:
Ontario College Graduate Certificate
Program Code:
1436
School:
Continuing Education

About the Program

The Cyber Security Ontario College Graduate Certificate program will provide graduates with the key concepts of information security, technical and practical job skills necessary to secure, protect and defend network infrastructures and an organization's valuable data assets. Students will gain a broad understanding of cyber security concepts, industry best practices for information security and key security concepts to protect an organization against fraud, data breaches and other vulnerabilities. The Cyber Security program is designed to prepare information and digital security professionals with the ability to manage, provide policies, standards, procedures, guidelines, policy framework, assess and mitigate risk and integrate advanced security solutions. The growing internet security sector requires an in-depth understanding of cyber security issues and fundamental internet architecture and protocols. In addition, network security skills such as packet, vulnerability, exploit analysis, and cyber security research will also be discussed. Graduates will develop highly marketable skills as analysts and security specialists in the cyber security field.

Note: Students will be able to register for courses in the program, but will not be permitted to take the Capstone course without applying to the program and having their admission requirements verified and approved.

Program Information

All courses must be completed within 5 years of acceptance into the program.

Admission Requirements

Note re: Admission Requirements

Admission Procedures

How to Apply

Students may obtain a Conestoga College Program Application Form from any Conestoga College campus, OR by writing directly to the Registrar's Office, OR by using the college website at www.conestogac.on.ca/admissions/forms

Send completed applications to:
Conestoga College
Admissions Office
299 Doon Valley Dr
Kitchener, Ontario
Canada N2G 4M4

How to Register for Courses

Go to How to Register for detailed registration information.

Graduate Opportunities

Graduates will develop highly marketable skills as analysts and security specialists in the cyber security field.

For more details on related occupations, job market information and career opportunities, see the Government of Canada website: http://www.workingincanada.gc.ca

Program Outcomes

Program Courses

Click on the course code or title below for a full description of the course. If available for registration, clicking on "Details" in the status column will open a new browser tab or window in the Student Portal.

Course Information
Course Code Course Title Status
OLRN8200 Principles of Information Security
Description: This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, the terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8210 Security Policies
Description: This course explores the key structure elements and terms of written information protection policies and reviews typical policy contents. Students develop the related standards, procedures, and guidelines for implementing policies and evaluate the tools needed to select, develop, and apply a security program that meets business goals.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8220 Operating Systems Security - Windows
Description: Preparing students to recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications, this course introduces defense strategies through understanding of system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8230 Ethical Hacking and Network Defense
Description: This course prepares students to assess and then correct the vulnerabilities present within information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber-attacks and about the tools and penetration testing methodologies used by ethical hackers. Systems are also investigated.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8240 Legal and Ethical Issues in IT Security
Description: This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.
Hours: 42
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8250 Firewalls and VPNs
Description: This course explores Unix, Unix-like OSs, firewalls, and VPNs. Introducing students to the basic concepts of Unix/Linux, different file systems, editors, differences between Linux distributions, creating users, permissions, package managers, man pages, and other places to find help. This course also explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.
Hours: 60
Credits: 4
Pre-Requisites:
CoRequisites:
Details
OLRN8260 Hacker Techniques, Tools and Incident Handling
Description: Students examine and analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.
Hours: 60
Credits: 4
Pre-Requisites:
CoRequisites:
Details
OLRN8270 Mobile Application Security Design
Description: This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Students learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
Hours: 45
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8280 Computer Forensics and Investigation
Description: Students examine and discover computer forensics, operating systems and how they function. Students are introduced to forensic tools along with concepts such as chain of custody and documentation of evidence/procedures. Students evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.
Hours: 45
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8290 Wireless and Mobile Device Security
Description: Students explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, the student discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
Hours: 45
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8300 Network Security and Penetration Testing
Description: Students examine the realm of network security, spotlighting the latest threats and vulnerabilities. The students address how and why people attack computers and networks--equipping them with the knowledge and techniques to successfully consider methods of combatting hackers.
Hours: 45
Credits: 3
Pre-Requisites:
CoRequisites:
Details
OLRN8310 Capstone Project (Cyber Security)
Description: This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity, and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design through presentation of the final product.
Hours: 60
Credits: 4
Pre-Requisites: OLRN8200, OLRN8210, OLRN8230, OLRN8250
CoRequisites:
Closed

Disclaimer

The College reserves the right to alter information including requirements and fees and to cancel at any time a program, course, or program major or option; to change the location and/or term in which a program or course is offered; to change the program curriculum as necessary to meet current competencies in the job market or for budgetary reasons; or to withdraw an offer of admission both prior to and after its acceptance by an applicant or student because of insufficient applications or registrations, over-acceptance of offers of admission, budgetary constraints, or for other such reasons. In the event the College exercises such a right, the College’s sole liability will be the return of monies paid by the applicant or student to the College.

Students actively registered in cohort delivered programs who take longer than the designed program length of time to complete their studies are accountable for completing any new or additional courses that may result due to changes in the program of study. Unless otherwise stated, students registered in non-cohort delivered programs must complete the program of study within seven years of being admitted to the program.

SEARCH PART-TIME (PT)

Program Contact

Amanda Pelley, apelley@conestogac.on.ca, (519) 748-5220 ext. 3454

Videos

Part-time Studies video
More videos

Success Stories

Back To Top