Network Security Investigations (Part-time)
- Program Code:
- Continuing Education
About the ProgramThe Network Security Support College Certificate Program will provide graduates with the practical job skills necessary to support network security in any organization. Students will gain an understanding of security concepts that protect an organization against fraud, data breaches and other vulnerabilities. The Network Security Support program is designed to prepare individuals with the ability to investigate security breaches, assess risk and examine solutions and options. In addition, students will practice network security support skills such as packet vulnerability, exploit analysis, and network security research.
Program InformationAll courses must be completed within 3 years of acceptance into the program.
Admission RequirementsA two or three-year diploma or degree from an accredited college or university in information technology or computer related field OR equivalent work experience as determined by the college.
- Submit a completed Conestoga College Program Application Form.
- If you do not have an Information Technology or Computer-related Degree or Diploma; submit a current resume directly through the Conestoga Admissions Office with your program application form.
- Final selection is made following an assessment of the admission requirements.
How to ApplyStudents may obtain a Conestoga College Program Application Form from any Conestoga College campus, OR by writing directly to the Registrar's Office, OR by using the college website at www.conestogac.on.ca/admissions/forms
Send completed applications to:
299 Doon Valley Dr
Canada N2G 4M4
How to Register for CoursesGo to How to Register for detailed registration information.
Graduate OpportunitiesGraduates will develop highly marketable entry-level skills for the rapidly emerging network security field.
For more details on related occupations, job market information and career opportunities, see the Government of Canada website: http://www.workingincanada.gc.ca
- Examine network security solutions considering the affordances and limitations of networks, application software and packages available.
- Investigate network security breaches in simulated environments using current techniques and approaches.
- Discuss compliance of security solutions with ethics as well as security policies, standards and regulations within the organization.
- Use security audits to evaluate the effectiveness of a security system in identifying and correcting security issues.
Click on the course code or title below for a full description of the course. If available for registration, clicking on "Details" in the status column will open a new browser tab or window in the Student Portal.
|Course Code||Course Title||Status|
|OLRN8230||Ethical Hacking and Network Defense
Description: This course prepares students to assess and then correct the vulnerabilities present within information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber-attacks and about the tools and penetration testing methodologies used by ethical hackers. Systems are also investigated.
|OLRN8250||Firewalls and VPNs
Description: This course explores Unix, Unix-like OSs, firewalls, and VPNs. Introducing students to the basic concepts of Unix/Linux, different file systems, editors, differences between Linux distributions, creating users, permissions, package managers, man pages, and other places to find help. This course also explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.
|OLRN8290||Wireless and Mobile Device Security
Description: Students explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, the student discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
|OLRN8300||Network Security and Penetration Testing
Description: Students examine the realm of network security, spotlighting the latest threats and vulnerabilities. The students address how and why people attack computers and networks--equipping them with the knowledge and techniques to successfully consider methods of combatting hackers.
The College reserves the right to alter information including requirements and fees and to cancel at any time a program, course, or program major or option; to change the location and/or term in which a program or course is offered; to change the program curriculum as necessary to meet current competencies in the job market or for budgetary reasons; or to withdraw an offer of admission both prior to and after its acceptance by an applicant or student because of insufficient applications or registrations, over-acceptance of offers of admission, budgetary constraints, or for other such reasons. In the event the College exercises such a right, the College’s sole liability will be the return of monies paid by the applicant or student to the College.
Students actively registered in cohort delivered programs who take longer than the designed program length of time to complete their studies are accountable for completing any new or additional courses that may result due to changes in the program of study. Unless otherwise stated, students registered in non-cohort delivered programs must complete the program of study within seven years of being admitted to the program.