Information Technology Network Security

Select start date and campus

Close

Applying as a Canadian applicant

Domestic students should apply online or by phone at 1-888-892-2228. For more information, visit Applying to Conestoga.

apply now: Canadian applicants

Applying as an International applicant

International students should apply online. Note: not all programs are open to international students.

apply now: international applicants
Close

Campus tours

Campus tours are one of the best ways to experience Conestoga. During this time, we are offering online guided tours to show you all Conestoga has to offer.

Book your tour

Virtual tours

If you can't make an on-campus tour or attend one of our events, the virtual tour is a great way to visit us.

View our Virtual tour

Courses - May 2023

Level 1

Course Details

Conestoga 101
CON0101

Description:

This self-directed course focuses on introducing new students to the supports, services, and opportunities available at Conestoga College. By the end of this course, students will understand the academic expectations of the Conestoga learning environment, as well as the supports available to ensure their academic success. Students will also be able to identify on-campus services that support their health and wellness, and explore ways to get actively involved in the Conestoga community through co-curricular learning opportunities.

  • Hours: 1
  • Credits: 0
  • Pre-Requisites:
  • CoRequisites:

Fundamentals of Information Security
INFO8160

Description:

This course will cover the three basic tenets that are at the foundation of modern information security practices: confidentiality, integrity, and availability. Topics will include the historical background of Information security, encryption, data classification, and other related technical processes supporting the confidentiality, integrity, and availability of infrastructure and systems.

  • Hours: 42
  • Credits: 3
  • Pre-Requisites:
  • CoRequisites:

Windows Infrastructure and Security
INFO8460

Description:

Best practice approaches for hardening Windows-based infrastructure will be explored in this course, with students gaining the skills to apply these methodologies. The use of vulnerability scanning techniques to identify existing issues and the effectiveness of hardening techniques will also be covered. Both topics will be covered in the context of the security architecture theory of Windows and Active Directory-based systems.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Linux Infrastructure and Security
INFO8470

Description:

Best practice approaches for hardening Linux-based infrastructure will be explored in this course, with students gaining the skills to apply these methodologies themselves. The use of vulnerability scanning techniques to identify existing issues and the effectiveness of hardening techniques will also be covered. Both topics will be covered in the context of the security architecture theory of the Linux kernel and widely used distributions.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

IT Security Planning, Audit and Compliance
INFO8480

Description:

This course will cover the principles of security planning, audit, governance and controls in the context of IT systems. Topics in this course will reinforce the importance of planning and auditing for compliance to industry and organization standards using best practice methodologies. Supporting monitoring, management, and logging tools will also be covered.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Network Security I
INFO8490

Description:

Fundamental components of network security are introduced in this course, including topics such as network protocols and standards relating to secure network design and operations. Approaches to the security operation of routing and switching infrastructure including virtual private networks will also be included.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Level 2

Course Details

Network Security II
INFO8500

Description:

Building from Network Security I this course will provide further coverage of more advanced network security topics, including firewalls, intrusion protection systems (IPS), network access controls (NAC), and other supporting technologies.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites: INFO8490
  • CoRequisites:

Ethical Hacking
INFO8510

Description:

To protect against hackers, information technology professionals need to be comfortable with the techniques and approaches that could be used against their infrastructure and systems. Honeypots, viruses. Trojans, considerations regarding IDS and firewalls will all be covered, including human factors / social engineering theory. Through an understanding of the methods and technologies that may be used against an organization, a network security professional can better protect and mitigate these measures.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites: INFO8460 AND INFO8470
  • CoRequisites:

Fundamentals of Computer Forensics
INFO8520

Description:

Management of investigations of the state of IT systems is a key role for security professionals. Topics for this course will include techniques for evidence collection and required controls thereof for looking at IT data and metadata from both active and inactive sources.

  • Hours: 42
  • Credits: 3
  • Pre-Requisites: INFO8160
  • CoRequisites:

Virtualization and Cloud Security
INFO8530

Description:

With the increasing adoption of virtual and cloud technologies, specific approaches are needed in responding to the security implications of these environments. Topics covered will include supply chain and data residency considerations, network implications of distributed infrastructure, and security risks and opportunities with virtual and cloud systems from Infrastructure-as-a-Service to Software-as-a-Service

  • Hours: 42
  • Credits: 3
  • Pre-Requisites: INFO8460 AND INFO8470 AND INFO8490
  • CoRequisites:

Wireless and Mobile Security
INFO8540

Description:

This course will explore the security considerations in wireless technologies and the approaches to optimize and manage security. Options and choices with respect to the design and implementation of wireless networks in the context of security will be covered in the context of industry best practices. Mobile device security considerations and techniques will also be covered, in addition to the impact of the growing “Internet of Things” inside an organization.

  • Hours: 42
  • Credits: 3
  • Pre-Requisites: INFO8490
  • CoRequisites:

Contingency Planning and Disaster Recovery
INFO8550

Description:

Planning to support proactive availability and recovery is a key component of a strong security environment with an organization. Planning for security related technology issues and having the right tools and implementations available when the time arises can make a significant impact to how an organization investigates and mitigates threats. Topics covered will include backup, recovery, and redundancy/replication technologies and approaches.

  • Hours: 42
  • Credits: 3
  • Pre-Requisites: INFO8460 AND INFO8470 AND INFO8490
  • CoRequisites:

Program outcomes

  1. Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.
  2. Comply with security policies, standards, and regulations typical to an organization in the design and implementation of security solutions.
  3. Plan, implement, and evaluate security policies and strategies using project management principles to effectively respond to the needs of the organization’s information security requirements.
  4. Outline the processes and procedures involved in the maintenance and deployment of security solutions.
  5. Assess and test networked and virtualized IT systems with respect to security threats such as theft, damage, as well as alternation and/or interruption of services.
  6. Install, configure and troubleshoot system and network enhancements to promote security in an organization.
  7. Develop security strategies and processes for business communications that respond to the needs of all stakeholders.
  8. Evaluate the effectiveness of a security system through security audits to identify and correct security issues.
  9. Develop and deliver appropriate internal security documentation and training to ensure compliance with security policies.
  10. Communicate security protocols, policies, and audit results and related documentation to any level of the organization.