fbpx

Cybersecurity Program with Co-op

There is an increasing demand for cybersecurity specialists in every sector of our economy. This program will provide students with fundamental computing systems knowledge while introducing students to the key principles of data and technology that frame and define cybersecurity, concepts, tools and technologies employed in cybersecurity practice in a changing landscape of digital security challenges.

Students will be presented with problems that will require them to apply their technical, problem-solving, and critical thinking skills. Students will learn to use a variety of intrusion detection and defense methodologies and practices, protect digital assets, conduct threat analysis, and manage and reduce cybersecurity risks.

Students can expect to be presented with a robust learning and assessment environment using real-world examples not only designed to teach cybersecurity methodology and practice but also skills that facilitate interpersonal collaboration and cooperation.

Program graduates can expect to work as cybersecurity specialists responsible for operating and conducting intrusion investigations and exploiting adversarial computing systems. Assist organizations with threat intelligence, cyber defence strategies, threat response, investigation, incident recovery, and continuity.

Students choosing a practicum or coop stream will be able to engage in hands-on and practical training. Graduates will be able to complete certification exams from external assessment agencies.

Cybersecurity Co-op Program Learning Objectives

Upon successful completion of the Cybersecurity program, graduates will be able to:

  • Demonstrate the ability to apply knowledge of cybersecurity concepts, tools, and technologies to computer systems and networks
  • Demonstrate an understanding of cybersecurity risks, threats, and countermeasures
  • Apply an understanding of cybersecurity to the development and implementation of cyber defence policies and procedures
  • Apply an understanding of cybersecurity to the development and implementation of cyber defence strategies
  • Demonstrate the technical knowledge and skills required to protect and defend computer systems and networks
  • Design, develop, and build security systems and protocols to meet organizational needs within a framework of financial, compliance, and social constraints
  • Troubleshoot, maintain, and update enterprise-level security systems

Why Study Cybersecurity At Sprott Shaw?

  • All-inclusive program costs where what you see is what you pay. Our costs include registration fees, assessment fees, tuition, textbooks, supplies, course materials, uniforms, certificates, graduation fees, clinical and practicum fees, and much more
  • Career and professional development success courses to help create a career development marketing plan, learn the cardinal rules of professionalism, and identify the target markets and employment resources for the healthcare industry 
  • Preparation and orientation courses to teach you how to find credible research, write papers, create proper citation formats including APA, and study effectively for exams
  • Access to dedicated Employment Services Specialists (ESS) who can help you with resume and cover letter writing, interview skills, and the overall job search after graduation
  • Monthly intake system so you can start your education when you want to without the wait
  • In-Person, Online, and Hybrid program delivery options are available to maximize the program’s accessibility.

Diploma Program

Total Program Hours:
2040 Hours
Full-Time Program Length:
87 Weeks
(Includes holidays and professional days)
Program content is subject to change.

Contact an Admissions Advisor for More Information Today!

Contact Us Today!

Our advisors are happy to answer any questions.

Career Opportunities

Cybersecurity Specialist
Ethical Hacker
Informatics Security Consultant
IT Security Specialist
Office Assistant
Receptionist
Systems Administrator

Applicants must meet all of the pre-requisites listed below, meet their financial obligations to the college at registration, and acknowledge their understanding of SSC’s policies and procedures provided in the Student Handbook, prior to starting classes.

  • Complete admissions interview
  • Complete short written essay
Educational Level  (one of the following):
  • Grade 12 or equivalent (GED, Adult Basic Education) with evidence of a ‘true certified copy’ or original transcript.
  • Mature student status (age 19 and one year out of high school).
Domestic Student Admission Requirements:
  • Domestic students that can provide a Canadian transcript showing completion of English 11 or 12 (or equivalent) with a passing grade of ‘C’, will be exempt from having to write the English Entrance Assessment.
  • Domestic students that can provide a Canadian transcript showing completion of Math 10, 11 or 12 (or equivalent) with a passing grade of ‘C’, will be exempt from having to write the Math Entrance Assessment.
  • For more information on English Language requirements and equivalencies please click here.
International Student Admission Requirements:
  • International students that can provide a Canadian transcript showing completion of Math 10, 11 or 12 (or equivalent) with a passing grade of ‘C’ will be exempt from having to write the Math Entrance Assessment. The equivalent credential must be evaluated and verified.
  • International students that can provide a Canadian transcript showing completion of English 11 or 12 (or equivalent) with a passing grade of ‘C’ will be exempt from having to write the English Entrance Assessment. The equivalent credential must be evaluated and verified.
  • International students can also meet the English requirement by demonstrating one of the following three options:
    • Sprott Shaw’s English Language Assessment,
      OR
    • Minimum IELTS Score 5.5 overall or iBT TOFEL Score of 70
      OR
    • Completion of an ESL program from one of SSC’s partnered ESL schools
Diploma Requirements:
  • 60% average upon successful completion of all courses, including courses given a complete.
Technology Requirements:

This program can be delivered on campus or in an online format. Online access will require the following minimum hardware requirements.

Minimum Internet up/down data speed should be at be at least 1.5 Mbps.

Windows Devices
Windows 8.1/10 (32/64 bit)
Intel Core i5 processor
250 GB HDD/4 GB RAM
Microsoft Edge

Apple iOS Devices
Mac iOS 10.15 (Catalina)
Intel Core i5
256 GD SSD/8 GB RAM

Google Chrome OS Devices
Google Chrome OS
Intel Celeron N Processor
32 GB Storage/4 GB RAM

uCertify Platform
This platform is the Web-based course integration tool used throughout the Cybersecurity program. It works on almost all
browsers / OS / devices less than two years old.

Browsers
Any current versions of the following can be used:
• Internet Explorer
• Chrome
• Firefox
• Safari
Information on the uCertify site will allow the user to check and update to the most recent version.

Mobile
uCertify Mobile App is the smartphone and tablet version of uCertify LEARN, where students can access every course they
are enrolled in on their mobile devices, to make learning more convenient and efficient

Other Specifications
For using the uCertify courses and the Internet, JavaScript should be enabled and Cookies (and third-party Cookies) should also be enabled.

* Cybersecurity Program with Co-op was reviewed and approved by the Private Training Institutions Branch (PTIB) of the Ministry of Post-Secondary Education and Future Skills.

Contact an Admissions Advisor for More Information Today!

Contact Us Today!

Our advisors are happy to answer any questions.

Courses List

This 87 week Diploma program requires the student to complete the following courses.

Pre-requisite: CYSC110 - Threat Landscape

• An effective cybersecurity defence consists of addressing security issues with respect to infrastructure, devices, local networks, and access points.
• Overcoming the challenges associated with each requires a detailed understanding of the issues, strategies, and practices.
• Students will learn to apply a systematic approach to securing IT infrastructure and networks and then will be introduced to the techniques used to protect data leaving and entering an organisation’s infrastructure.

Pre-requisite: NETW100 - Networking Essentials

• Cyber threats are among the biggest challenges individuals and organisations face today. Threat intelligence represents a multiplier for organisations looking to proactively protect themselves from digital threats.
• This course introduces students to threat intelligence categories and the evolving threat landscape.
• Digital security topics will focus on understanding contemporary categories of cyber threats and implementing basic protection systems by improving network design and security.
• Students will explore the methodologies used to identify and prioritise potential threats to devices, data, and networks.

Pre-requisites: CYSC110 - Threat Landscape

• An ethical hacker finds and communicates the vulnerabilities in a computer system, web application, or
network.
• As organisations become Internet occupants and reply on cloud computing technologies to serve as their data and operational repositories, ethical hacking can proactively shield them against potential security threats and breaches.

Pre-requisites: CYSC150 - Ethical Hacking

• Students will learn the underlying principles and techniques associated with penetration testing and discover how system vulnerabilities can be exploited and fixed.
• Students will develop an understanding of current cybersecurity issues and ways that user, administrator, and programmer errors can lead to device and system intrusion.

Pre-requisites: CYSC151 - Penetration Testing

• Open source intelligence and social engineering is a fundamental component of any cybersecurity toolbox, both from protection and breach perspectives.
• Students will learn the concepts and tools used to find, harvest, corroborate, and analyse data from the Internet and Dark Web sources and how to make sure that this information meets investigative goals.

Pre-requisites: CYSC110 - Threat Landscape

• Students will learn to identify and manage threats to an organisation’s cyber security.
• Students will explore what an organisation and third parties must do to comply with regulations, privacy law, and stakeholder expectations.
• How threats affect project life cycles, how to protect digital assets, involvement in the implementation of a cyber risk framework, prevention of organization intrusions, and rapid breach recovery.

Pre-requisites: CYSC180 - Digital Forensics, CYSC170 - Risk Management

• This course familiarises students with skills and best practices for developing and implementing effective
cybersecurity policies within an organisation-wide cybersecurity framework.

Pre-requisites: CYSC100 - Cybersecurity Issues

• This course addresses the entire life cycle of incident response after a digital breach, including site preparation, data collection, and how to respond and effectively assess and manage future vulnerabilities

  • Skills and strategies conducive to learning in a college atmosphere, orientation to the college environment, using technology, knowing college policies and procedures.
  • Time management, writing and using citations, study strategies, student budgeting, and wellness/self-care/stress management.
  • An orientation to the PCP program and the emergency medicine professions.
  • Prepare for upcoming studies, learning environments, and work experience placements throughout the program.

  • Interview techniques
  • Create a Career Development Marketing Plan
  • Apply aspects of professionalism
  • Identify target markets and employment resources
  • Specialty program coverage in this shortened version

• This course will provide students with the conceptual and practical foundations for understanding how computing hardware and server technology functions. Students will learn how to configure, manage, and troubleshoot computer and digital devices.

Pre-requisites: ITEC110 – Computing Hardware

• This course will introduce students to the concepts, principles, and processes that underlie operating systems. They will be required to apply theory to practice.
• Students will learn about processor management, concurrency and synchronisation, memory management schemes, file systems, secondary storage management, and security and protection.

Pre-requisite: ITEC120 - Operating Systems Concepts

• Students will learn advanced Windows systems software skills, become familiar with other widely used operating systems, and learn to compare the strengths and weaknesses of each.
• Students will be introduced to managing and troubleshooting devices in Windows, Linux, iOS, Mobile,
and Cloud environments.

Pre-requisite: ITEC121 - Operating Systems

• Students will learn programming terminology, become very familiar with pseudocode, gain a solid understanding of the basic mechanics of programming, and will learn to write simple programs.

Pre-requisite: ITEC130 - Introduction to Programming

• This course introduces the basic concepts of procedural programming and learning to understand code.
• Students will learn to use data types, control structures, problem solving strategies, software development methodology, design concepts and principles, and testing and debugging methodologies.

Pre-requisites: ITEC 121 - Operating Systems, ITEC110 - Computing Hardware

• Students will learn how to effectively provide help desk support by learning what services are required, how to prioritise issues, and how to set realistic expectations.
• In this course students will be introduced to self management and soft skills, performance measurement
rubrics, users’ needs, goals, and attitudes.
• Also, how to define, diagnose and solve problems, which tools are required, ensure that value is being received, and how to effectively deal with management.

Pre-requisites: ITEC131 - Programming Fundamentals

• The Linux operating system will be introduced as an alternative to more common platforms because of its security features, cost, and scalability efficiencies. Students will learn how to install and manage a Linux system.

Pre-requisites: ITEC150 - Linux Fundamentals

• This course will continue to familiarise students with the Linux operating system with a focus on security.
• It will address a full range of command-line and shell activities, including managing accounts, developing account security policies, setting file permissions, and managing storage.
• It will also examine scripting and automation, networking configuration, and a variety of security issues, such as software management security policies, footprinting, firewalls, and intrusion detection.

Pre-requisites: ITEC121 - Operating Systems, ITEC110 - Computing Hardware

• The network is essential to the effective management of organizational data, functions, and operations, including cybersecurity; therefore, it is important to understand what the network can do, how it operates, and how to protect it.
• This course is designed to introduce students to the core networking concepts, explain the purpose of networking, and examine how networks are configured across a wide variety of environments.
• This will include a review of network topologies, physical networking, network protocols, network troubleshooting, and security.

Pre-requisites: NETW100 - Networking Essentials, ITEC110 - Computing Hardware

• This course delves into the concepts introduced in Networking Essentials and explores the roles and
responsibilities of a systems administrator.
• Students will explore topics in network administration from a theoretical and practical perspective.
• Learn how to configure, optimise, and manage network configurations (unified, mobile, cloud, virtualisation) and to assess, mitigate, and minimise vulnerabilities.

Pre-requisites: CYSC100 - Cybersecurity Issues

• This course introduces students to essential network security concepts, challenges, and the techniques that can be used to address vulnerabilities and defend against intrusion.
• Students will learn how to select the appropriate security technologies for network environments and use encryption effectively.

Pre-requisites: NETW120 - Network Defence

• This course focuses on the theory and practice of cryptography and network security. Students will be
provided with an overview of some of the fundamental principles of security, encompassing both information security and network security.

Pre-requisite: Successful completion of all theory courses

• In this segment learners will receive practical workplace based learning opportunities within an IT / Cybersecurity setting.
• This will enable learners to practice and reinforce classroom learned concepts, skills and competencies.
• In addition it allows the learner to connect to various industry companies, managers and stakeholders and build a networking foundation for successful post graduate work.

  • This course will provide the student with advanced understanding related to Windows Server in a hybrid, on premise and Azure cloud based environment.
  • Subjects that will be explored include hybrid services including: Active Directory, server workloads, containers, networking infrastructure, storage and file services.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will provide the student with advanced
    understanding related to securing cloud based services
    such as Azure.
  • Subjects that will be explored include advanced topics
    related to: desktop hardware management, network client
    configuration, threat detection and antivirus, user access
    control and policy implementation.
  • The key focus will be on developing an understanding of
    various technologies and providing hands on practice using
    a combination of live environments and virtual lab scenarios

  • This course will introduce students to database. Subjects  that will be explored include: SQL Server components, installation and configuration, monitoring, basic dbase design, high availability architecture, security and backup.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios

  • This course will provide the student with advanced understanding related to securing cloud based services such as Azure.
  • Subjects that will be explored include advanced topics related to: Azure Active Directory identities, Platform protection, security operations, as well as data and application security.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will provide the student with advanced understanding related to Windows Server in a hybrid, on premise and Azure cloud-based environment.
  • Subjects that will be explored include advanced topics related to: securing server environments, high availability, planning disaster recovery, server workloads, and troubleshooting.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will provide the student with foundational knowledge on installing and configuring Windows Server operating systems.
  • Subjects that will be explored include: virtualization, PowerShell, operating system installation, Active Directory, TCP/IP and network services, group policy, and Azure Cloud Services.
  • The key focus will be on developing a practical understanding of various technologies through lecture as well providing hands on practice using a combination of live environments and virtual lab scenarios

  • This course will prepare students to produce instructive, informational, and persuasive documents.
  • These documents provide relevant, reliable information that allow readers to easily understand both context and implications so that informed decisions based on well defined and achievable outcomes can be made.
  • Processes will be taught for analyzing writing contexts and producing effective, clean, and reader-centered documents in an efficient manner.

Contact an Admissions Advisor for More Information Today!

Contact Us Today!

Our advisors are happy to answer any questions.

See All Success Stories
We'd love to connect with you to help you become a Sprott Shaw graduate. Visit a campus, request info or apply today.
Request Info Apply Now

Affiliations and Associations

Contact an Admissions Advisor for More Information Today!