Young man with open laptop looking at the camera.

Cybersecurity Certificate

Excited about boosting your cybersecurity career? In this eight-course Cybersecurity Certificate program, you will learn how to safeguard personal information and IT systems from security threats. Whether you are an entrepreneur or work in an organization, you will be well-equipped to identify security risks and tighten system security to ward off hackers.
Domestic Status:
Open
Certificate of Completion
40 Hours
Part-Time Online

About the Cybersecurity Certificate

Not all heroes wear capes! By enrolling in our Cybersecurity Certificate, you'll have the opportunity to acquire the skills necessary to detect and protect sensitive data and personal information from malicious attacks, theft and damage.  

Recent data breaches in prominent corporations and government agencies have highlighted how vital sound cybersecurity policies are. With the sheer volume of data being stored increasing, and hackers becoming increasingly sophisticated, the demand for cybersecurity specialists has never been more pressing.  

Our courses are readily available on demand, allowing you to learn at your own pace and in your preferred space. This allows you to design a schedule that aligns with your unique needs and preferences. 

So, why not take the first step towards becoming one of these vital heroes? Sign up today! 

Program Content

Course Descriptions 

Communications and Network Security 

It begins with a lesson on the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners interested in gaining an introduction to information technology security. 

 

Asset Security 

Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel to frontline employees. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP). 

 

Security and Risk Management 

This course covers the role of governance and risk management in information security. It looks at the policies and standards needed to operate an effective information security function and oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education. 

 

Security Engineering 

This course introduces the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management are also covered. 

 

Identity and Access Management 

This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defences. The course presents different kinds of authentication techniques, how they work and how they are distinguished. 

 

Security Assessment and Testing 

Focusing on potential disruptions affecting organizations and how they can be addressed with assessments and plans. Learners will have the opportunity to practice how to assess the impact of disasters that may arise, as well as to develop their versions of these plans. 

 

Security Operations 

A detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. 

 

Software Development Security 

While focusing on the systems' development life cycle, operating systems and environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls. 

Completion Requirements

Students must successfully complete all program courses to earn their certificate. 

Admission Requirements

This course requires a basic understanding of IT concepts. 

Additional Requirements

Technology Requirements

In these courses, online learners will require a personal computer (PC) or laptop with a reliable internet connection to access coursework.  

Software Requirements

All software resources are available within each online course. 

Program Cost

Students from Canada
Total Program Cost
$700.00

Funding for Continuing Education Courses

Students enrolled in continuing education programs may qualify for program-dependent funding opportunities, such as awards, scholarships, government funding and grants.