As digital innovation continues to rapidly advance, it is becoming increasingly difficult for organizations to keep up with the changing nature of cybersecurity threats.

With a shortage of cybersecurity professionals across Canada, this program was designed and developed with leading financial services organizations to meet the need for individuals with the specialized skills to secure, protect and defend mobile and network infrastructures, preventing fraud, data breaches and other vulnerabilities.

As a graduate of this Cybersecurity and Threat Management program, you will be equipped with cutting-edge best practices and skills in communication, information security, project management, problem-solving and more. The industry capstone project and optional work term will give you hands-on experience and position you for a career in one of the world's fastest-growing fields.

Career Opportunities

When you graduate from this program, these are the types of career options that you can explore:

  • Information security analyst
  • Threat analyst
  • Cybersecurity analyst
  • Ethical hacker
  • IT systems and network administrator

Admissions Requirements

  • Ontario university/college degree, college diploma, advanced diploma or equivalent in an area of Information Technology: computer engineering, software, hardware, networking or a related discipline.
    Applicants with a degree or diploma in another discipline with demonstrated knowledge of IT Networking will be considered for Admission.
    Applicants with significant related work experience that is the equivalent of the above may be considered for Admission. A relevant resume and references must be provided.
  • English proficiency at the postsecondary level.

Canadian citizens or permanent residents educated outside of Canada must provide a World Education Services (WES) or ICAS Canada credential evaluation.

Additional Information

If your credential is in a non-IT related discipline, the networking knowledge requirement can be fulfilled by successfully completing a networking introductory course such as DCF255 - Data Communications Fundamentals through Seneca Continuing Education.

For more information or to inquire about credit for prior learning, contact Rosemare Mariyaseelan, Rosemare.Mariyaseelan@senecacollege.ca


Filter Classes: In Class     Online     Correspondence     Hybrid     Availability   

Due to COVID-19, all Part-time Studies courses are being offered online until further notice, in one of the following two formats: online virtual classroom and online self-directed. Click Availability below to see current offerings.


Semester 1

Information Security Principles and Policies

This course provides students with a foundation and context including information security principles, management of the security infrastructure, and the process for documenting the security policies of an organization. Topic coverage includes the terminology, technology, and management of information security programs as well as the types of attacks threatening security. Upon completion students will be able to contribute to the development of standards, procedures and guidelines for implementing the appropriate security policies.

Loading availability...
If the availability does not load please click here.

Security Architecture; OS, Mobile and Network

This course prepares students to recognize the inherent vulnerabilities with firewalls and the different operating systems whether they are connected or unconnected to the network. Using case studies and real-world events, the students explore the evolution of wired and wireless networks and their impact on the corporate world from both cyber-security and business perspectives. The students will utilize tools and techniques that would help assess risks, threats and vulnerabilities of networked operating systems as well as the security measures that should be put in place to mitigate risks and breaches. This course also introduces defense strategies against vulnerabilities through exploring the internals of operating systems and network infrastructures.

Loading availability...
If the availability does not load please click here.

Ethical Hacking and Vulnerability Testing

This course introduces students to what and who ethical hackers are, how they are different from "non-ethical hackers", and why/how they are essential for protecting data from cyber-attacks. Students will look closely at the different types of tests that can be conducted by "ethical hackers" to assess the readiness of an organization's system to withstand cyber-attacks. The course also investigates the methods and tools used in cyber-attacks and their countermeasures, as well as available security resources that every organization needs to possess to be able to counter the different cyber-attack "types". This will equip the students with the knowledge and techniques to successfully consider the different methods of combating hackers and cyber-attacks.

Loading availability...
If the availability does not load please click here.

IT Security: Ethical and Legal Issues

This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how Information systems security and legal compliance are now required to protect critical infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.
Please note: This is an online course.

Loading availability...
If the availability does not load please click here.

Security for Cloud and Internet of Things

This course introduces students to cloud computing and the internet of things (IoT). Students will learn about different cloud options such as public and private and their applications in various organizations. They will explore important resources required for architecting an application in the cloud to increase efficiencies and reduce costs. Students will also investigate measures that are needed to mitigate risk in the cloud. Students will develop IoT solutions using sensors and components integration. They will use industry examples to implement IoT solutions in Big Data. Students will work with DevOps tools to shorten the systems development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives.

Loading availability...
If the availability does not load please click here.

Data Analytics

In this course students will learn how to draw insights from data. Starting with database basics, students will quickly advance to using the information gathered to support decision making. Students will use real datasets to practice inspecting and transforming data. They will practically explore structured and unstructured databases and use cases for each.

Loading availability...
If the availability does not load please click here.

Semester 2

Communication Skills for Cybersecurity Professionals

Effective communication is a cornerstone of most successful careers. The ability to relate the importance of any information security program to leaders in business terms using accurate and concise written correspondence, reports, and presentations is essential to success. Throughout this course students will develop and put into practice effective communication skills demonstrating appropriate consideration of audience, context, format, tone and media.

Loading availability...
If the availability does not load please click here.

Threat Intelligence

With the growth of data collection emanating from the IoT and the network device data capturing, the management of this data usage becomes more and more challenging. This course focuses on the how to navigate the huge amount of data being collected, to analyze the data and determine which particular data elements can be used to identify the security threats for the systems associated with the collected data. The threats identified can take different forms including attacks that already taken place, attacks that are in progress and vulnerabilities of the existing system that can result in future attacks. The course will address how to detect and how to prevent system attacks based on analysis of the data presented.

Loading availability...
If the availability does not load please click here.

Project Management

This course is an introduction to the terminology, life cycles and core processes involved in the management of cybersecurity-related projects. Students learn the responsibilities that a project manager has during the development and implementation of a project. Students gain the required skill sets the Project Manager needs in order to successfully meet project goals and milestones. Theory is supported by hands-on practice with scheduling tools, software and processes commonly used.

Loading availability...
If the availability does not load please click here.

Authentication and Access Control

Identity verification and access are crucial to the ability of an organization to protect its assets. In this course, students learn how to manage the identification and authentication of people and devices, how to implement and manage authorization mechanisms, and how to mitigate access control attacks while ensuring effective IT collaboration with business units.

Loading availability...
If the availability does not load please click here.

IT Security Forensics

Students will analyze the different characteristics of hackers including types of hackers, their motivations, techniques and attitudes. The students will examine the different types of computer crimes together with how these crimes are related to hacking strategies and techniques. Examining how hackers target networks and the methods followed in these attacks is an essential part of computer forensics. Using computer forensics, students will know how to conduct the appropriate investigations that will uncover and quantify attacks and identify potential vulnerabilities.

Loading availability...
If the availability does not load please click here.

Mobile Application Security Assessment

This course provides students with concepts of discovering and exploiting flaws in mobile applications on a variety of platforms. Students learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

Loading availability...
If the availability does not load please click here.

CYT300: IT Security Capstone Project

Equivalency Courses

Explore virtual options to obtain equivalency credits towards the Cybersecurity & Threat Management graduate certificate.

CYT115 - Security Architecture; OS, Mobile and Network, equivalent to:

  • CSC204 - O/S Security – Windows
  • CSC306 - Wireless & Mobile Device Security

Note: To earn equivalency credit you'll need to complete both courses.

CYT130 - Ethical Hacking and Vulnerability Testing, equivalent to:

  • CSC206 - Ethical Hacking & Network Defense
  • CSC208 - Legal and Ethical Issues in IT Security

Note: To earn equivalency credit you'll need to complete both courses.

Program Outcomes

As a graduate, you will be prepared to reliably demonstrate the ability to:

  • Design and formulate information security solutions for business processes and underlying technologies to protect the organization from internal and external threats.
  • Create and document processes required for the maintenance and deployment of information controls solutions.
  • Apply design thinking to ensure information security solutions are adopted and used within an organization.
  • Devise and implement information security solutions in compliance with security policies, standards, and regulations.
  • Apply project management practices in multidisciplinary teams across an organization to respond to the enterprise's information security requirements.
  • Evaluate the reliability of information security controls through security audits to identify and address risks.
  • Contribute to the development and delivery of internal cybersecurity training to increase awareness and compliance with security policies.
  • Apply presentation and report-writing skills to ensure understanding of information security protocols, policies and audit results.
  • Communicate professionally and collaboratively with internal and external stakeholders in support of business decision-making.
  • Analyze vulnerability using threat intelligence tools to identify and recommend potential solutions to security issues.

Program Contacts

Rosemare Mariyaseelan
Program Specialist, Centre for Graduate & Professional Studies
416-491-5050 ext.22330