Would you like to get more information or apply?
Click on the button below and we’ll get back to you as soon as possible.
Standard Admission
Mature Admission
Increased reliance on computer systems, the internet, connected technologies and smart devices has made cybersecurity a critical concern for organizations and individuals alike. Keeping devices, data, and information secure and protected from risks and vulnerabilities is a critical area of activity for all organizations.
This has led to an ever-growing increase in demand for individuals possessing the skills to assess, plan, and implement a cybersecurity defense strategy. The 76-week Cybersecurity Specialist program can give you the training you need to pursue a career in helping keep networked computer systems and their users secure.
Your courses will cover everything you need to know about managing networks and computers, cybersecurity techniques, and more. You'll also get prepared to write exams for valuable industry certifications, including: Computing Technology Industry Association (CompTIA) A+, Net+, Security+, CySA+, PenTest+; and Cisco Certified Network Associate (CCNA).
Upon graduation, you'll be ready to use your cyber security skills working for organzations of all sizes.
I'm very proud to get a teacher that is as kind and available as mine was. He was very supportive of all of us in the classroom and really helped us make our way throughout education.
The purpose of this course is to optimize learning through equipping students with effective study techniques. This course also provides an introduction to personality styles that will be encountered in the workplace and allows students to practise appropriate and productive interaction between the various styles. Emphasis is placed on the types of communication that work best with each style in order to achieve a good working relationship and to manage and resolve conflicts that arise. Students are also introduced to strategies for setting personal goals, managing time, and managing the stress that results from study or work and builds on positive group dynamics and setting expectations for student success.
This course focuses on the essential IT skills and knowledge needed to perform tasks commonly performed by end-users and entry-level IT professionals. Students will learn to use the features and functions of common operating systems and establishing network connectivity. The course will explore common software applications and their purpose, security and web browsing best practices. By the end of this course students will have gained foundational knowledge in IT concepts and terminology, IT infrastructure, applications, and software development, database fundamentals and security.
This course is the first of two courses that cover the general installation, maintenance and management of computer hardware and software resources. This first course focuses on the hardware resources that make up a computer system course will align to the CompTIA A+ learning objectives. Students will learn about the operation of microcomputer systems, the various hardware components that makeup a computer system and how to troubleshoot common hardware problems.
This course is the second of two consecutive courses that align to the CompTIA A+ certification requirements. This course focuses on the software installation, configuration and troubleshooting as well as system security. Students will gain an understanding of the various network models, standards and protocols. Students will install configure and troubleshoot operating system software as well as application software packages. Finally, the course will explore security issues involving software installations.
The Network+ course will provide students with an introduction to the theory of networks. Students will learn basic networking concepts relating to the types of networks, general networking components, specialized hardware and software associated with networks, and how to set up and configure networks. Students will also learn about network security, wireless networks, as well as Voice over IP network capabilities.
This is the first course covering Windows 10. In addition, skills learned in this course will give students a foundation to build on in Windows Server courses. Topics include installing Windows 10, performing post-installation configuration, implementing Windows in an enterprise environment, configuring networking, storage, data access, implementing applications, configuring updates, monitoring and remote management, configuringsystem recovery, authorization and authentication.
This course focuses on the implementation and support of cloud-based infrastructure services in the context of the broader IT systems operations in a datacenter environment. Students will learn about the deployment, migration, optimization and protection of mission critical applications to the cloud. The course will explore the challenges of multi-cloud environments and the techniques to overcome these challenges. The course will begin with the fundamental concepts of cloud architecture and design with an overview of the foundational technologies and concepts that comprise the cloud. From there students will explore the deployment and managing of cloud networks with a focus on the securing of cloud resources. Finally, the course will conclude with cloud optimization and high availability as important factors for security measures and disaster recovery. Throughout the course, emphasis is placed on the use of automation and orchestration, and troubleshooting.
This course provides the student with the knowledge and skills required to install, configure, manage and maintain server installations. The course will cover the server lifecycle through the following four themes: Server, virtualization and security concepts, managing physical assets, and server hardware and storage configurations; installing, troubleshooting and maintaining server operating systems; and managing data security, service and data availability and decommissioning. Students will learn to install and configure server hardware and server operating systems. The course will then explore the implementation of server hardening and security controls, troubleshooting of common server problems and general server maintenance and upkeep. Finally, students will gain an understanding of key disaster recovery strategies, high availability options, and backup and restore concepts.
This course will provide the students with the knowledge and skills required to configure, manage, operate, and troubleshoot Linux in on-premises and cloud-based server environments. Students will learn to use security best practices, scripting, containerization, and automation. The course aligns its coverage to the CompTIA Linux+ exam objectives into blocks based around the following themes: Linux concepts; Server administration; Network management and security; Scripting, automation, and installation of Linux.
In this course, students will learn to use PowerShell scripting to automate the common tasks and administrative jobs that can be applied on the client or server version of Windows. The course starts with an introduction to the PowerShell language and scripting environment and then proceeds to a thorough explanation of creating functional scripts that can be used for performing common tasks that involve working with files, Internet-connected scripts, user interaction, and solving tasks in systems and enterprise management deployments such as working with Active Directory and the file system.
This course introduces the students to the Python programming language. Students will continue to integrate Object-Oriented programming concepts will learning the features of the Python programming language. This course also explore Internet programming including accessing client-side network protocols and email tools, using CGI scripts, and website implementation techniques using Python.
This course explores the fundamental concepts in internetworking. The focus of this course is TCP/IP. Students will explore the DOD and OSI Reference Models and learn to identify TCP/IP Protocol Suite Components and implement IP addressing and Subnet Masks. Students will learn about name resolution and TCP/IP naming services and how to navigate the Cisco IOS Interface and perform basic operations on Cisco Routers and Switches.
This course explores the configuration and administration of common Cisco network devices. Students will learn about layered internetwork communication, protocols and standards and how to plan and design Internetworked LANsand WANs. This course will allow the students to workwith the Cisco Internetwork Operating System (IOS) in a simulated environment. Students will learn to implement and manage Cisco routers and switches.
This course will explore the installation and administration of Windows Server on-premises, hybrid, and Infrastructure as a Service (IaaS) platform workloads. Students will learn to integrate Windows Server environments with Azure services and manage Windows Server in on-premises and hybrid networks. The course will explore the deployment, packaging, securing, updating, and administration of Windows Server workloads using on-premises, hybrid, and cloud technologies. Students will learn how to implement and manage on-premises and hybrid solutions, such as identity, security, management, compute, networking, storage, monitoring, high availability, and disaster recovery.
This course will continue the development of knowledge and skill in the administering and configuring a Windows Hybrid infrastructure. Students will develop their skill in the five key areas of securing Windows on-premises and hybrid infrastructures, implementing and managing Windows Server high availability, implementing disaster recovery, migration of servers and workloads to Azure, and monitor and troubleshoot Windows Server environments.
This course explores implications of and issues related to computer and network security. Students will learn to recognize security threats and ramifications, identify sources of security threats and major areas of vulnerability. The course will examine ways to detect and neutralize system and network security threats and implement security protection procedures and practices. Methods of security disaster recovery will also be explored in this course.
This course provides the student with an overview of the various risks and security vulnerabilities to which IT systems and infrastructures are commonly exposed to. The course with then explore the tools and techniques used to mitigate those risks. Students will explore the risks and exposures facing web servers and applications, Wi-Fi, Bluetooth, mobile devices and the general IT infrastructure. The course will then cover topics in Penetration testing, system hacking, social and physical security, malware and sniffers, SQL injections and cryptography, session highjacking, denial of service and other types of system attacks. The focus of the course will be to identify the risks and then apply countermeasures and prevention techniques.
The increased reliance on computer systems, the internet, connected technologies and smart devices has made cybersecurity a critical concern for organizations and individuals alike. Keeping devices, data and information secure and protected from vulnerabilities is a critical area of activity for all organizations. This course provides the students with an introduction to the field of cybersecurity. Students will be introduced to the four distinct challenges to creating a cybersecurity defense; securing the infrastructure, securing the devices, securing the local network and securing the perimeter. The course will explore the fundamental concepts of each challenge and the types of vulnerabilities associated with each. Students will learn how to identify the risks and vulnerabilities in each area and describe counteractions to mitigate the risks.
This course will explore the role and responsibilities of the cybersecurity specialist in monitoring, detecting and responding to security incidents in information systems and networks. The course will introduce the tools and tactics used to manage cybersecurity risks, identify various types of common threats, evaluate an organizations security, collect security intelligence and handle incidents as they occur. The course is designed to foster a comprehensive approach to security. This course aligns to the objectives of the CompTIA Cybersecurity Analyst Certification exam (CS0-001).
This course explores the concepts of Penetration testing. The ever-increasing need of organizations to protect themselves from security breaches and risks require them to invest heavily in understanding their vulnerabilities and design measures to counteract them. In order to protect themselves, organizations turn to the conducting of penetration testing. In this course, students will learn the concepts and methodologies related to pen testing. Students will develop their pen testing skills enabling them to identify information system vulnerabilities and design effective remediation for them. This course aligns to the objectives of the CompTIA PenTest+ exam (PT0-002).
This course expands on the fundamental security concepts by teaching students the knowledge and skills in advanced security. Student will learn the concepts of risk management, enterprise security architecture, enterprise security operations, technical integration of enterprise security, research, development and collaboration. The course begins with an overview of governance and risk compliance where students will learn about the role and life cycle of risk management and risk management methods. Students will explore network infrastructure protection, software integration and testing and emerging technologies for secure configuration and system hardening. After exploring the concepts of cryptography, public key infrastructure and vulnerability management, the course will conclude with a review of technical controls and incident responses.
This course looks at the planning, preparation, execution, and follow-up stages of an interview: how people find jobs; employer expectations; presenting an enthusiastic attitude; focusing on the right job; transferable skills; the job interview; effective resume preparation; cover and thank you letters; effective telemarketing; tapping the hidden job market; handling objections; job search management; self-confidence and self-esteem building; mock interviews (video-taped); and individual counselling and coaching.
This program includes a practicum component which consists of 175 hours of work at a job site. The business organization does not pay for the services of the student during the practicum.
This is the capstone project component of the Cybersecurity Specialist program, which is the opportunity for students to apply their knowledge and skills from the classroom portion of the program to practical situations typically encountered in an Information Technology work environment. The variety of tasks to perform as part of the capstone project will be aligned to a typical working environment and real life situations
Click on the button below and we’ll get back to you as soon as possible.