Secure, protect, and defend network infrastructures and information assets against fraud, hackers, data leaks, identity theft, and other vulnerabilities. Gain a broad understanding of cyber security concepts including: packet vulnerability, cryptography, malware, exploit analysis, mobile platforms (iOS, Android and Windows Mobile), firewalls, VPNs, and fundamental Internet/network security architecture and protocols.

Entry Requirements

This is a professional program designed for:

  • Information Technology or computer-related University or College graduates OR
  • Mature students with three to five years of related work experience

Filter Classes: In Class     Online     Correspondence     Hybrid     Availability   


Principles of Information Security

This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, terminology and the management aspects of information security programs.

Loading availability...
If the availability does not load please click here.

Security Policies

This course explores the key structure elements and terms of written information protection policies and reviews typical policy contents. Students develop the related standards, procedures, and guidelines for implementing policies and evaluate the tools needed to select, develop, and apply a security program that meets business goals.

Loading availability...
If the availability does not load please click here.

O/S Security - Windows

Students learn to recognize and understand the inherent vulnerabilities of Windows systems by using tools and techniques to decrease the risks arising from vulnerabilities in Microsoft operating systems and applications. This course introduces defense strategies through an understanding of system and file permissions, password and account security, the windows Registry, Malware prevention, encryption, and Directory Service management via policies.

Loading availability...
If the availability does not load please click here.

Ethical Hacking and Network Defense

This course prepares students to assess and then correct the vulnerabilities present with information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.

Loading availability...
If the availability does not load please click here.

Legal and Ethical Issues in IT Security

This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.

Loading availability...
If the availability does not load please click here.

Firewalls & VPN's

This course explores Unix/Linux, Unix-like Operating Systems, firewalls and Virtual Personal Networks (VPNs). Students are introduced to the basic concepts of Unix/Linux, different file systems, editors, differences between Unix.Linux distributions, creating users, permissions, package managers man pages and other places to find help. This course also explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures.

Loading availability...
If the availability does not load please click here.

Hacker Techniques, Tools and Incident Handling

Students examine and analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.

Loading availability...
If the availability does not load please click here.

Mobile Application Security Design

This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android and Windows Mobile platforms. Students learn a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls and cross-platform apps.

Loading availability...
If the availability does not load please click here.

Computer Forensics

Examine and discover computer forensics, operating systems and how they function. Students are introduced to forensic tools along with concepts such as chain of custody and documentation of evidence and procedures and evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.

Loading availability...
If the availability does not load please click here.

Wireless & Mobile Device Security

Explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, examine risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place look ahead to the future of wireless and mobile device security.

Loading availability...
If the availability does not load please click here.

Network Security and Penetration Testing

Examine the realm of network security with a spotlight on the latest threats and vulnerabilities. Students will address how and why people attack computers and networks and gain the knowledge and techniques to successfully implement methods of combatting hackers.

Loading availability...
If the availability does not load please click here.

Capstone Information Security Project

This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity, and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design through presentation of the final product.

Loading availability...
If the availability does not load please click here.

Program Outcomes

  1. Develop and implement cyber security solutions considering the affordances and limitations of the computer operating systems, networks, application software, and packages available
  2. Design cyber security solutions for business processes and applications in order to protect business resources.
  3. Outline the processes and procedures involved in the maintenance and deployment of cyber security solutions
  4. Develop cyber security strategies and processes for business communications that respond to the needs of all the internal stakeholders.
  5. Design and implement cyber security solutions in compliance with security policies, standards, and regulations within the organization.
  6. Plan, implement, and evaluate cyber security policies and strategies using project management principles to effectively respond to the needs of the organization's information security requirements.
  7. Evaluate the effectiveness of a cyber security system through security audits to identify and correct security issues.
  8. Develop and deliver appropriate internal cyber security training to ensure compliance with security policies.
  9. Communicate cyber security protocols, policies, and audit results and related documentation to any level of the organization.

Credit for Prior Learning

Prior Learning Assessment

Earn college credits for what you already know!
Prior Learning Assessment is a method of assessing and recognizing learning that is equal to college level learning, but has been gained outside a traditional classroom (through work experience, volunteering, outside study, etc.). If you can prove that the knowledge you have gained meets the outcomes of a Seneca course, then credit will be awarded.

How does the PLA process work?
Prior Learning is demonstrated through a "challenge" process. The process measures learning through a variety of methods which may include tests, portfolio assessment, interviews, demonstrations, essays, and work samples. The method used will be determined in consultation with a Program Coordinator.
For more information and to determine if you are eligible for PLA, please call the Program Coordinator.

The process may take from 6 to 8 weeks.

Note: Not all courses can be challenged. For more information go to PLA website or contact your Program Coordinator.

Transfer Credit

Transfer Credit (Advanced Standing)

Many students who enter Seneca College will have earned academic credits in post-secondary educational institutions which they may be able to apply toward completion of a Seneca College program.

Requests for Transfer Credit must be for a specific course and must be accompanied by an official transcript and course outline. A minimum grade of "C" (60 percent) is generally required for a course to be considered for Transfer Credit.

Download a Transfer Credit Request form. An official copy of your transcript and applicable detailed course outlines should be attached and submitted. Please note it may take 4 to 6 weeks for a Transfer Credit decision.

More Information

Please visit the Degree and Credit Transfer Office.


When you meet all program requirements and become eligible for a certificate, diploma, or degree, you must inform the Registrar by completing a Graduation Application form and paying the graduation and alumni fee. Certificates, diplomas, and applied degrees are issued twice a year in the Fall (October) and Spring (June).

For further information including deadlines and fees, please visit the  Convocation website or contact the Convocation Office at 416-491-5050 ext. 77461.

Program Contacts

Contact us via this form or using the phone number(s) below it.

Rasika De Silva
Program Assistant

416-491-5050 ext.77290

Glen Steins
Part-time Program Coordinator

416-491-5050 ext.33025

Sheri Ladoucier
Academic Program Manager

416-491-5050 ext.77306