fbpx

Cybersecurity with Practicum

Diploma Program

Total Program Hours:
1460 Hours
Full-Time Program Length:
71 Weeks
Includes holidays and professional days.
Delivery Methods:
  • In-Class Instruction
  • Distance Education / Online
  • Combined Delivery (Both In-Class and Distance)
Program content is subject to change.

There is an increasing demand for cybersecurity specialists in every sector of our economy. This program will provide students with fundamental computing systems knowledge while introducing students to the key principles of data and technology that frame and define cybersecurity, concepts, tools and technologies employed in cybersecurity practice in a changing landscape of digital security challenges.

Students will be presented with problems that will require them to apply their technical, problem solving, and critical thinking skills. Students will learn to use a variety of intrusion detection and defense methodologies and practices, to protect digital assets, to conduct threat analysis, and to manage and reduce cybersecurity risks.

Students can expect to be presented with a robust learning and assessment environment using real-world examples not only designed to teach cybersecurity methodology and practice but also skills that facilitate interpersonal collaboration and cooperation.

Students choosing a practicum or coop stream will be able to engage in hands-on and practical training.

Program graduates can expect to work as cybersecurity specialists responsible for operating and conducting intrusion investigations and exploiting adversarial computing systems.

Graduates will be able to complete certification exams from external assessment agencies.

Cybersecurity with Practicum Learning Objectives

Upon successful completion of Cybersecurity, graduates will be able to:

  • Describe the technologies that support and drive digital communication.
  • Describe and discuss the changing landscape of cybersecurity threats and associated technologies.
  • Explain the most common cyber threats, attacks, and system vulnerabilities.
  • Describe the structural and procedural weaknesses that allow cyber attacks to occur.
  • Analyze and address issues associated with digital infrastructure security and develop practical solutions to minimize and manage risk.
  • Evaluate relevant technical considerations related to the application and use of secure technologies within a variety of contexts.
  • Use digital forensic methodologies to analyze system, network, and device threats.
  • Assist organizations with threat intelligence, cyber defence strategies, threat response, investigation, incident recovery, and continuity.
  • Apply threat intelligence collection processes to manage risk, improve detection, and proactively prevent threats.

Why Study Cybersecurity At Sprott Shaw?

  • All-inclusive program costs where what you see is what you pay. Our costs include registration fees, assessment fees, tuition, textbooks, supplies, course materials, uniforms, certificates, graduation fees, clinical and practicum fees, and much more
  • Career and professional development success courses to help create a career development marketing plan, learn the cardinal rules of professionalism, and identify the target markets and employment resources for the healthcare industry 
  • Preparation and orientation courses to teach you how to find credible research, write papers, create proper citation formats including APA, and study effectively for exams
  • Access to dedicated Employment Services Specialists (ESS) who can help you with resume and cover letter writing, interview skills, and the overall job search after graduation
  • Monthly intake system so you can start your education when you want to without the wait
  • In-Person, Online, and Hybrid program delivery options are available to maximize the program’s accessibility.
  • Grant and scholarship opportunities are available to help you save on tuition. Up to $4000 in scholarships and grants are open to recent high school graduates, Sprott Shaw alumni, military veterans, and more! Click here to browse our full list of grants and scholarships.

Contact an Admissions Advisor for More Information Today!

Contact Us Today!

Our advisors are happy to answer any questions.

Career Opportunities

Cybersecurity Specialist
Ethical Hacker
Informatics Security Consultant
IT Security Specialist
Office Assistant
Receptionist
Systems Administrator
Domestic Student Admission Requirements:
  • Domestic students that can provide a Canadian transcript showing completion of English 11 or 12 (or equivalent) with a passing grade of ‘C’, will be exempt from having to write the English Entrance Assessment.
  • Domestic students that can provide a Canadian transcript showing completion of Math 10, 11 or 12 (or equivalent) with a passing grade of ‘C’, will be exempt from having to write the Math Entrance Assessment.
  • For more information on English Language requirements and equivalencies please click here.
International Student Admission Requirements:
  • International students that can provide a Canadian transcript showing completion of Math 10, 11 or 12 (or equivalent) with a passing grade of ‘C’ will be exempt from having to write the Math Entrance Assessment. The equivalent credential must be evaluated and verified.
  • International students that can provide a Canadian transcript showing completion of English 11 or 12 (or equivalent) with a passing grade of ‘C’ will be exempt from having to write the English Entrance Assessment. The equivalent credential must be evaluated and verified.
  • International students can also meet the English requirement by demonstrating one of the following three options:
    • Sprott Shaw’s English Language Assessment,
      OR
    • Minimum IELTS Score 5.5 overall or iBT TOFEL Score of 70
      OR
    • Completion of an ESL program from one of SSC’s partnered ESL schools
Diploma Requirements:
  • 60% average upon successful completion of all courses, including courses given a complete
* Cybersecurity with Practicum was reviewed and approved by the Private Training Institutions Branch (PTIB) of the Ministry of Post-Secondary Education and Future Skills.

Courses List

This 71 week Diploma program requires the student to complete the following courses.

Pre-requisite: CYSC110 - Threat Landscape

• An effective cybersecurity defence consists of addressing security issues with respect to infrastructure, devices, local networks, and access points.
• Overcoming the challenges associated with each requires a detailed understanding of the issues, strategies, and practices.
• Students will learn to apply a systematic approach to securing IT infrastructure and networks and then will be introduced to the techniques used to protect data leaving and entering an organisation’s infrastructure.

Pre-requisite: NETW100 - Networking Essentials

• Cyber threats are among the biggest challenges individuals and organisations face today. Threat intelligence represents a multiplier for organisations looking to proactively protect themselves from digital threats.
• This course introduces students to threat intelligence categories and the evolving threat landscape.
• Digital security topics will focus on understanding contemporary categories of cyber threats and implementing basic protection systems by improving network design and security.
• Students will explore the methodologies used to identify and prioritise potential threats to devices, data, and networks.

Pre-requisites: CYSC110 - Threat Landscape

• An ethical hacker finds and communicates the vulnerabilities in a computer system, web application, or
network.
• As organisations become Internet occupants and reply on cloud computing technologies to serve as their data and operational repositories, ethical hacking can proactively shield them against potential security threats and breaches.

Pre-requisites: CYSC150 - Ethical Hacking

• Students will learn the underlying principles and techniques associated with penetration testing and discover how system vulnerabilities can be exploited and fixed.
• Students will develop an understanding of current cybersecurity issues and ways that user, administrator, and programmer errors can lead to device and system intrusion.

Pre-requisites: CYSC151 - Penetration Testing

• Open source intelligence and social engineering is a fundamental component of any cybersecurity toolbox, both from protection and breach perspectives.
• Students will learn the concepts and tools used to find, harvest, corroborate, and analyse data from the Internet and Dark Web sources and how to make sure that this information meets investigative goals.

Pre-requisites: CYSC110 - Threat Landscape

• Students will learn to identify and manage threats to an organisation’s cyber security.
• Students will explore what an organisation and third parties must do to comply with regulations, privacy law, and stakeholder expectations.
• How threats affect project life cycles, how to protect digital assets, involvement in the implementation of a cyber risk framework, prevention of organization intrusions, and rapid breach recovery.

Pre-requisites: CYSC180 - Digital Forensics, CYSC170 - Risk Management

• This course familiarises students with skills and best practices for developing and implementing effective
cybersecurity policies within an organisation-wide cybersecurity framework.

Pre-requisites: CYSC100 - Cybersecurity Issues

• This course addresses the entire life cycle of incident response after a digital breach, including site preparation, data collection, and how to respond and effectively assess and manage future vulnerabilities

  • Skills and strategies conducive to learning in a college atmosphere, orientation to the college environment, using technology, knowing college policies and procedures.
  • Time management, writing and using citations, study strategies, student budgeting, and wellness/self-care/stress management.
  • An orientation to the PCP program and the emergency medicine professions.
  • Prepare for upcoming studies, learning environments, and work experience placements throughout the program.

  • Interview techniques
  • Create a Career Development Marketing Plan
  • Apply aspects of professionalism
  • Identify target markets and employment resources
  • Specialty program coverage in this shortened version

• This course will provide students with the conceptual and practical foundations for understanding how computing hardware and server technology functions. Students will learn how to configure, manage, and troubleshoot computer and digital devices.

Pre-requisites: ITEC110 – Computing Hardware

• This course will introduce students to the concepts, principles, and processes that underlie operating systems. They will be required to apply theory to practice.
• Students will learn about processor management, concurrency and synchronisation, memory management schemes, file systems, secondary storage management, and security and protection.

Pre-requisite: ITEC120 - Operating Systems Concepts

• Students will learn advanced Windows systems software skills, become familiar with other widely used operating systems, and learn to compare the strengths and weaknesses of each.
• Students will be introduced to managing and troubleshooting devices in Windows, Linux, iOS, Mobile,
and Cloud environments.

Pre-requisite: ITEC121 - Operating Systems

• Students will learn programming terminology, become very familiar with pseudocode, gain a solid understanding of the basic mechanics of programming, and will learn to write simple programs.

Pre-requisite: ITEC130 - Introduction to Programming

• This course introduces the basic concepts of procedural programming and learning to understand code.
• Students will learn to use data types, control structures, problem solving strategies, software development methodology, design concepts and principles, and testing and debugging methodologies.

Pre-requisites: ITEC 121 - Operating Systems, ITEC110 - Computing Hardware

• Students will learn how to effectively provide help desk support by learning what services are required, how to prioritise issues, and how to set realistic expectations.
• In this course students will be introduced to self management and soft skills, performance measurement
rubrics, users’ needs, goals, and attitudes.
• Also, how to define, diagnose and solve problems, which tools are required, ensure that value is being received, and how to effectively deal with management.

Pre-requisites: ITEC131 - Programming Fundamentals

• The Linux operating system will be introduced as an alternative to more common platforms because of its security features, cost, and scalability efficiencies. Students will learn how to install and manage a Linux system.

Pre-requisites: ITEC150 - Linux Fundamentals

• This course will continue to familiarise students with the Linux operating system with a focus on security.
• It will address a full range of command-line and shell activities, including managing accounts, developing account security policies, setting file permissions, and managing storage.
• It will also examine scripting and automation, networking configuration, and a variety of security issues, such as software management security policies, footprinting, firewalls, and intrusion detection.

Pre-requisites: ITEC121 - Operating Systems, ITEC110 - Computing Hardware

• The network is essential to the effective management of organizational data, functions, and operations, including cybersecurity; therefore, it is important to understand what the network can do, how it operates, and how to protect it.
• This course is designed to introduce students to the core networking concepts, explain the purpose of networking, and examine how networks are configured across a wide variety of environments.
• This will include a review of network topologies, physical networking, network protocols, network troubleshooting, and security.

Pre-requisites: NETW100 - Networking Essentials, ITEC110 - Computing Hardware

• This course delves into the concepts introduced in Networking Essentials and explores the roles and
responsibilities of a systems administrator.
• Students will explore topics in network administration from a theoretical and practical perspective.
• Learn how to configure, optimise, and manage network configurations (unified, mobile, cloud, virtualisation) and to assess, mitigate, and minimise vulnerabilities.

Pre-requisites: CYSC100 - Cybersecurity Issues

• This course introduces students to essential network security concepts, challenges, and the techniques that can be used to address vulnerabilities and defend against intrusion.
• Students will learn how to select the appropriate security technologies for network environments and use encryption effectively.

Pre-requisites: NETW120 - Network Defence

• This course focuses on the theory and practice of cryptography and network security. Students will be
provided with an overview of some of the fundamental principles of security, encompassing both information security and network security.

Pre-requisite: Successful completion of all theory courses

• In this segment learners will receive practical workplace based learning opportunities within an IT/Cybersecurity setting.
• This will enable learners to practice and reinforce classroom learned concepts, skills and competencies.
• In addition it allows the learner to connect to various industry companies, managers and stakeholders and build a networking foundation for successful post graduate work.

  • This course will provide the student with advanced
    understanding related to securing cloud based services
    such as Azure.
  • Subjects that will be explored include advanced topics
    related to: desktop hardware management, network client
    configuration, threat detection and antivirus, user access
    control and policy implementation.
  • The key focus will be on developing an understanding of
    various technologies and providing hands on practice using
    a combination of live environments and virtual lab scenarios

  • This course will introduce students to database. Subjects  that will be explored include: SQL Server components, installation and configuration, monitoring, basic dbase design, high availability architecture, security and backup.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios

  • This course will provide the student with foundational knowledge on installing and configuring Windows Server operating systems.
  • Subjects that will be explored include: virtualization, PowerShell, operating system installation, Active Directory, TCP/IP and network services, group policy, and Azure Cloud Services.
  • The key focus will be on developing a practical understanding of various technologies through lecture as well providing hands on practice using a combination of live environments and virtual lab scenarios

  • This course will provide the student with advanced understanding related to Windows Server in a hybrid, on premise and Azure cloud based environment.
  • Subjects that will be explored include hybrid services including: Active Directory, server workloads, containers, networking infrastructure, storage and file services.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will provide the student with advanced understanding related to Windows Server in a hybrid, on premise and Azure cloud-based environment.
  • Subjects that will be explored include advanced topics related to: securing server environments, high availability, planning disaster recovery, server workloads, and troubleshooting.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will provide the student with advanced understanding related to securing cloud based services such as Azure.
  • Subjects that will be explored include advanced topics related to: Azure Active Directory identities, Platform protection, security operations, as well as data and application security.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will prepare students to produce instructive, informational, and persuasive documents.
  • These documents provide relevant, reliable information that allow readers to easily understand both context and implications so that informed decisions based on well defined and achievable outcomes can be made.
  • Processes will be taught for analyzing writing contexts and producing effective, clean, and reader-centered documents in an efficient manner.
See All Success Stories
We'd love to connect with you to help you become a Sprott Shaw graduate. Visit a campus, request info or apply today.
Request Info Apply Now

Affiliations and Associations

Contact an Admissions Advisor for More Information Today!