Cyber Security and Threat Management

Ontario College Graduate Certificate

More Information



Overview

As digital innovation continues to rapidly advance, it is becoming increasingly difficult for organizations to keep up with the changing nature of cybersecurity threats.

With a shortage of cybersecurity professionals across Canada, this program was designed and developed with leading financial services organizations to meet the need for individuals with the specialized skills to secure, protect and defend mobile and network infrastructures, preventing fraud, data breaches and other vulnerabilities.

As a graduate of this Cybersecurity and Threat Management program, you will be equipped with cutting-edge best practices and skills in communication, information security, project management, problem-solving and more. The industry capstone project and optional work term will give you hands-on experience and position you for a career in one of the world's fastest-growing fields.

Career Opportunities

When you graduate from this program, these are the types of career options that you can explore:

  • Information security analyst
  • Threat analyst
  • Cybersecurity analyst
  • Ethical hacker
  • IT systems and network administrator

Admissions Requirements

  • Ontario university/college degree, college diploma, advanced diploma or equivalent in an area of Information Technology: computer engineering, software, hardware, networking or a related discipline.
    Applicants with a degree or diploma in another discipline with demonstrated knowledge of IT Networking will be considered for Admission.
    Applicants with significant related work experience that is the equivalent of the above may be considered for Admission. A relevant resume and references must be provided.
  • English proficiency at the postsecondary level.

Canadian citizens or permanent residents educated outside of Canada must provide a World Education Services (WES) or ICAS Canada credential evaluation.

Additional Information

If your credential is in a non-IT related discipline, the networking knowledge requirement can be fulfilled by successfully completing a networking introductory course such as DCF255 - Data Communications Fundamentals through Seneca Continuing Education.

For more information or to inquire about credit for prior learning, contact Kiley Bolton, Kiley.Bolton@senecacollege.ca


Filter Classes: In Class     Online     Correspondence     Hybrid     Availability   


Curriculum

Semester 1

CYT100
Information Security Principles and Policies
Availability
 

This course provides students with a foundation and context including information security principles, management of the security infrastructure, and the process for documenting the security policies of an organization. Topic coverage includes the terminology, technology, and management of information security programs as well as the types of attacks threatening security. Upon completion students will be able to contribute to the development of standards, procedures and guidelines for implementing the appropriate security policies.




Loading availability...
If the availability does not load please click here.

CYT115
Security Architecture; OS, Mobile and Network
Availability
 

This course prepares students to recognize the inherent vulnerabilities with firewalls and the different operating systems whether they are connected or unconnected to the network. Using case studies and real-world events, the students explore the evolution of wired and wireless networks and their impact on the corporate world from both cyber-security and business perspectives. The students will utilize tools and techniques that would help assess risks, threats and vulnerabilities of networked operating systems as well as the security measures that should be put in place to mitigate risks and breaches. This course also introduces defense strategies against vulnerabilities through exploring the internals of operating systems and network infrastructures.

Please contact Kiley Bolton at Kiley.bolton@senecacollege.ca if you have questions about this course.




Loading availability...
If the availability does not load please click here.

CYT130
Ethical Hacking and Vulnerability Testing
Availability
 

This course introduces students to what and who ethical hackers are, how they are different from "non-ethical hackers", and why/how they are essential for protecting data from cyber-attacks. Students will look closely at the different types of tests that can be conducted by "ethical hackers" to assess the readiness of an organization's system to withstand cyber-attacks. The course also investigates the methods and tools used in cyber-attacks and their countermeasures, as well as available security resources that every organization needs to possess to be able to counter the different cyber-attack "types". This will equip the students with the knowledge and techniques to successfully consider the different methods of combating hackers and cyber-attacks.

Please contact Kiley Bolton at Kiley.bolton@senecacollege.ca if you have questions about this course.




Loading availability...
If the availability does not load please click here.

CYT145
IT Security: Ethical and Legal Issues
Availability
 

This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how Information systems security and legal compliance are now required to protect critical infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.
Please note: This is an online course.




Loading availability...
If the availability does not load please click here.

CYT160
Security for Cloud and Internet of Things
Availability
 

This course introduces students to cloud computing and the internet of things (IoT). Students will learn about different cloud options such as public and private and their applications in various organizations. They will explore important resources required for architecting an application in the cloud to increase efficiencies and reduce costs. Students will also investigate measures that are needed to mitigate risk in the cloud. Students will develop IoT solutions using sensors and components integration. They will use industry examples to implement IoT solutions in Big Data. Students will work with DevOps tools to shorten the systems development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives.




Loading availability...
If the availability does not load please click here.

CYT175
Data Analytics
Availability
 

In this course students will learn how to draw insights from data. Starting with database basics, students will quickly advance to using the information gathered to support decision making. Students will use real datasets to practice inspecting and transforming data. They will practically explore structured and unstructured databases and use cases for each.




Loading availability...
If the availability does not load please click here.

Semester 2

CYT200: Communication Skills for Cybersecurity
CYT215: IT Security Forensics
CYT230: Mobile Application Security Assessment
CYT245: Threat Intelligence
CYT260: Project Management
CYT275: Authentication and Access Control
CYT300: IT Security Capstone Project

Field Placement/WIL

Optional Work-Integrated Learning term.

Program Outcomes

As a graduate, you will be prepared to reliably demonstrate the ability to:

  • Design and formulate information security solutions for business processes and underlying technologies to protect the organization from internal and external threats.
  • Create and document processes required for the maintenance and deployment of information controls solutions.
  • Apply design thinking to ensure information security solutions are adopted and used within an organization.
  • Devise and implement information security solutions in compliance with security policies, standards, and regulations.
  • Apply project management practices in multidisciplinary teams across an organization to respond to the enterprise's information security requirements.
  • Evaluate the reliability of information security controls through security audits to identify and address risks.
  • Contribute to the development and delivery of internal cybersecurity training to increase awareness and compliance with security policies.
  • Apply presentation and report-writing skills to ensure understanding of information security protocols, policies and audit results.
  • Communicate professionally and collaboratively with internal and external stakeholders in support of business decision-making.
  • Analyze vulnerability using threat intelligence tools to identify and recommend potential solutions to security issues.

Program Contacts

Kiley Bolton
Director, Centre for Graduate & Professional Studies
Kiley.Bolton@senecacollege.ca