There is an increasing demand for cybersecurity specialists in every sector of our economy. This program will provide students with fundamental computing systems knowledge while introducing students to the key principles of data and technology that frame and define cybersecurity, concepts, tools and technologies employed in cybersecurity practice in a changing landscape of digital security challenges.
Students will be presented with problems that will require them to apply their technical, problem solving, and critical thinking skills. Students will learn to use a variety of intrusion detection and defense methodologies and practices, to protect digital assets, to conduct threat analysis, and to manage and reduce cybersecurity risks.
Students can expect to be presented with a robust learning and assessment environment using real-world examples not only designed to teach cybersecurity methodology and practice but also skills that facilitate interpersonal collaboration and cooperation.
Students choosing a practicum or coop stream will be able to engage in hands-on and practical training.
Program graduates can expect to work as cybersecurity specialists responsible for operating and conducting intrusion investigations and exploiting adversarial computing systems.
Graduates will be able to complete certification exams from external assessment agencies.
Cybersecurity with Practicum Learning Objectives
Upon successful completion of Cybersecurity, graduates will be able to:
- Describe the technologies that support and drive digital communication.
- Describe and discuss the changing landscape of cybersecurity threats and associated technologies.
- Explain the most common cyber threats, attacks, and system vulnerabilities.
- Describe the structural and procedural weaknesses that allow cyber attacks to occur.
- Analyze and address issues associated with digital infrastructure security and develop practical solutions to minimize and manage risk.
- Evaluate relevant technical considerations related to the application and use of secure technologies within a variety of contexts.
- Use digital forensic methodologies to analyze system, network, and device threats.
- Assist organizations with threat intelligence, cyber defence strategies, threat response, investigation, incident recovery, and continuity.
- Apply threat intelligence collection processes to manage risk, improve detection, and proactively prevent threats.
Why Study Cybersecurity At Sprott Shaw?
- All-inclusive program costs where what you see is what you pay. Our costs include registration fees, assessment fees, tuition, textbooks, supplies, course materials, uniforms, certificates, graduation fees, clinical and practicum fees, and much more
- Career and professional development success courses to help create a career development marketing plan, learn the cardinal rules of professionalism, and identify the target markets and employment resources for the healthcare industry
- Preparation and orientation courses to teach you how to find credible research, write papers, create proper citation formats including APA, and study effectively for exams
- Access to dedicated Employment Services Specialists (ESS) who can help you with resume and cover letter writing, interview skills, and the overall job search after graduation
- Monthly intake system so you can start your education when you want to without the wait
- In-Person, Online, and Hybrid program delivery options are available to maximize the program’s accessibility.
- Grant and scholarship opportunities are available to help you save on tuition. Up to $4000 in scholarships and grants are open to recent high school graduates, Sprott Shaw alumni, military veterans, and more! Click here to browse our full list of grants and scholarships.