Loading...

Cyber Security

Ontario College Graduate Certificate


Overview

The Internet has made it easier than ever for people to bank, shop, connect with others and find the information they need at any time. As Internet use among Canadians continues to increase, so too does online criminal behavior such as fraud and identity theft.

The Cyber Security Ontario College Graduate Certificate Program provides graduates with the key concepts of information security, technical and practical job skills necessary to secure, protect and defend network infrastrustures and an organization's valuable data assets. Students will gain a broad understanding of cyber security concepts, industry best practices for information security and key security concepts to protect an organization against fraud, data breaches and other vulnerabilities.

The growing Internet security sector requires an in-depth understanding of cyber security issues, and fundamental Internet architecture and protocols. In addition, network security skills such as packet, vulnerability, exploit analysis, and cyber security research are also discussed. Graduates will develop highly marketable skills that are required in the rapidly emerging cyber security field.

Entry Requirements

This is a professional program designed for:

  • Information Technology or computer-related University or College graduates OR
  • Mature students with three to five years of related work experience

Filter Classes: In Class     Online     Correspondence     Hybrid     Availability   


Curriculum

CSC200
Principles of Information Security
Availability
 

This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, terminology and the management aspects of information security programs.




Loading availability...
If the availability does not load please click here.

CSC202
Security Policies
Availability
 

This course explores the key structure elements and terms of written information protection policies and reviews typical policy contents. Students develop the related standards, procedures, and guidelines for implementing policies and evaluate the tools needed to select, develop, and apply a security program that meets business goals.




Loading availability...
If the availability does not load please click here.

CSC204
O/S Security - Windows
Availability
 

Students learn to recognize and understand the inherent vulnerabilities of Windows systems by using tools and techniques to decrease the risks arising from vulnerabilities in Microsoft operating systems and applications. This course introduces defense strategies through an understanding of system and file permissions, password and account security, the windows Registry, Malware prevention, encryption, and Directory Service management via policies.




Loading availability...
If the availability does not load please click here.

CSC206
Ethical Hacking and Network Defense
Availability
 

This course prepares students to assess and then correct the vulnerabilities present with information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.




Loading availability...
If the availability does not load please click here.

CSC208
Legal and Ethical Issues in IT Security
Availability
 

This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.




Loading availability...
If the availability does not load please click here.

CSC210
Firewalls & VPN's
Availability
 

This course explores Unix/Linux, Unix-like Operating Systems, firewalls and Virtual Personal Networks (VPNs). Students are introduced to the basic concepts of Unix/Linux, different file systems, editors, differences between Unix.Linux distributions, creating users, permissions, package managers man pages and other places to find help. This course also explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures.




Loading availability...
If the availability does not load please click here.

CSC300
Hacker Techniques, Tools and Incident Handling
Availability
 

Students examine and analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.




Loading availability...
If the availability does not load please click here.

CSC302
Mobile Application Security Design
Availability
 

This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android and Windows Mobile platforms. Students learn a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls and cross-platform apps.




Loading availability...
If the availability does not load please click here.

CSC304
Computer Forensics
Availability
 

Examine and discover computer forensics, operating systems and how they function. Students are introduced to forensic tools along with concepts such as chain of custody and documentation of evidence and procedures and evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.




Loading availability...
If the availability does not load please click here.

CSC306
Wireless & Mobile Device Security
Availability
 

Explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, examine risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place look ahead to the future of wireless and mobile device security.




Loading availability...
If the availability does not load please click here.

CSC308
Network Security and Penetration Testing
Availability
 

Examine the realm of network security with a spotlight on the latest threats and vulnerabilities. Students will address how and why people attack computers and networks and gain the knowledge and techniques to successfully implement methods of combatting hackers.




Loading availability...
If the availability does not load please click here.

CSC310
Capstone Information Security Project
Availability
 

This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity, and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design through presentation of the final product.




Loading availability...
If the availability does not load please click here.

Program Outcomes

  1. Develop and implement cyber security solutions considering the affordances and limitations of the computer operating systems, networks, application software, and packages available
  2. Design cyber security solutions for business processes and applications in order to protect business resources.
  3. Outline the processes and procedures involved in the maintenance and deployment of cyber security solutions
  4. Develop cyber security strategies and processes for business communications that respond to the needs of all the internal stakeholders.
  5. Design and implement cyber security solutions in compliance with security policies, standards, and regulations within the organization.
  6. Plan, implement, and evaluate cyber security policies and strategies using project management principles to effectively respond to the needs of the organization's information security requirements.
  7. Evaluate the effectiveness of a cyber security system through security audits to identify and correct security issues.
  8. Develop and deliver appropriate internal cyber security training to ensure compliance with security policies.
  9. Communicate cyber security protocols, policies, and audit results and related documentation to any level of the organization.

Credit for Prior Learning

Prior Learning Assessment

Earn college credits for what you already know!
Prior Learning Assessment is a method of assessing and recognizing learning that is equal to college level learning, but has been gained outside a traditional classroom (through work experience, volunteering, outside study, etc.). If you can prove that the knowledge you have gained meets the outcomes of a Seneca course, then credit will be awarded.

How does the PLA process work?
Prior Learning is demonstrated through a "challenge" process. The process measures learning through a variety of methods which may include tests, portfolio assessment, interviews, demonstrations, essays, and work samples. The method used will be determined in consultation with a Program Coordinator.
For more information and to determine if you are eligible for PLA, please call the Program Coordinator.

The process may take from 6 to 8 weeks.

Note: Not all courses can be challenged. For more information go to PLA website or contact your Program Coordinator.

Transfer Credit

Transfer Credit (Advanced Standing)

Many students who enter Seneca College will have earned academic credits in post-secondary educational institutions which they may be able to apply toward completion of a Seneca College program.

Requests for Transfer Credit must be for a specific course and must be accompanied by an official transcript and course outline. A minimum grade of "C" (60 percent) is generally required for a course to be considered for Transfer Credit.

Download a Transfer Credit Request form. An official copy of your transcript and applicable detailed course outlines should be attached and submitted. Please note it may take 4 to 6 weeks for a Transfer Credit decision.

More Information

Please visit the Degree and Credit Transfer Office.

Graduation

Graduation/Convocation

When you meet all program requirements and become eligible for a certificate, diploma or degree, you must inform the Registrar by completing a Graduation Application form, and paying the graduation and alumni fee. Forms are available at the Registration Office or can be downloaded from the convocation website below. Certificates, diplomas, and applied degrees are issued twice a year in the Fall (October) and Spring (June). Graduation Application forms must be received no later than July 31 (for Fall Convocation), November 30/ March 31 (for Spring Convocation). Convocation information is mailed out approximately six weeks prior to the ceremony date.

For further information, please contact the Convocation Office at the Markham Campus at 416-491-5050 ext. 77461 or visit Convocation website.

Program Contacts

Sejal Ahir
Program Assistant
Sejal.Ahir@senecacollege.ca
416-491-5050 ext.77290


Glen Steins
Part-time Program Coordinator
Glen.Steins@senecacollege.ca
416-491-5050 ext.33025


Sheri Ladoucier
Program Coordinator
Sheri.Ladoucier@senecacollege.ca
416-491-5050 ext.77306