fbpx

Cybersecurity Program

There is an increasing demand for cybersecurity specialists in every sector of our economy. This program will provide students with fundamental computing systems knowledge while introducing students to the key principles of data and technology that frame and define cybersecurity, concepts, tools and technologies employed in cybersecurity practice in a changing landscape of digital security challenges.

Students will be presented with problems that will require them to apply their technical, problem solving, and critical thinking skills. Students will learn to use a variety of intrusion detection and defence methodologies and practices, to protect digital assets, to conduct threat analysis, and to manage and reduce cybersecurity risks.

Students can expect to be presented with a robust learning and assessment environment using real-world examples not only designed to teach cybersecurity methodology and practice but also skills that facilitate interpersonal collaboration and cooperation.

Program graduates can expect to work as cybersecurity specialists responsible for operating and conducting intrusion investigations and exploiting adversarial computing systems.

Students choosing a practicum or coop stream will be able to engage in hands-on and practical training.

Graduates will be able to complete certification exams from external assessment agencies.

Cybersecurity Program Learning Objectives

Upon successful completion of the Cybersecurity program, graduates will be able to:

  • Demonstrate the ability to apply knowledge of cybersecurity concepts, tools, and technologies to computer systems and networks
  • Demonstrate an understanding of cybersecurity risks, threats, and countermeasures
  • Apply an understanding of cybersecurity to the development and implementation of cyber defence policies and procedures
  • Apply an understanding of cybersecurity to the development and implementation of cyber defence strategies
  • Demonstrate the technical knowledge and skills required to protect and defend computer systems and networks
  • Design, develop, and build security systems and protocols to meet organizational needs within a framework of financial, compliance, and social constraints
  • Troubleshoot, maintain, and update enterprise-level security systems

Why Study Cybersecurity At Sprott Shaw?

  • All-inclusive program costs where what you see is what you pay. Our costs include registration fees, assessment fees, tuition, textbooks, supplies, course materials, uniforms, certificates, graduation fees, clinical and practicum fees, and much more
  • Career and professional development success courses to help create a career development marketing plan, learn the cardinal rules of professionalism, and identify the target markets and employment resources for the healthcare industry 
  • Preparation and orientation courses to teach you how to find credible research, write papers, create proper citation formats including APA, and study effectively for exams
  • Access to dedicated Employment Services Specialists (ESS) who can help you with resume and cover letter writing, interview skills, and the overall job search after graduation
  • Monthly intake system so you can start your education when you want to without the wait
  • In-Person, Online, and Hybrid program delivery options are available to maximize the program’s accessibility.

Diploma Program

Total Program Hours:
1340 Hours
Full-Time Program Length:
67 Weeks
(Includes holidays and professional days)
Program content is subject to change.

Contact an Admissions Advisor for More Information Today!

Contact Us Today!

Our advisors are happy to answer any questions.

Career Opportunities

Cybersecurity Analyst
Cybersecurity Risk Member
Cybersecurity Specialist
Ethical Hacker
Incident Response Team
Informatics Security Consultant
IT Security Specialist
Network Security Specialist
Office Assistant
Receptionist
Systems Administrator
Domestic Student Admission Requirements:
  • Domestic students that can provide a Canadian transcript showing completion of English 11 or 12 (or equivalent) with a passing grade of ‘C’, will be exempt from having to write the English Entrance Assessment.
  • Domestic students that can provide a Canadian transcript showing completion of Math 10, 11 or 12 (or equivalent) with a passing grade of ‘C’, will be exempt from having to write the Math Entrance Assessment.
  • For more information on English Language requirements and equivalencies please click here
International Student Admission Requirements:
  • International students that can provide a Canadian transcript showing completion of Math 10, 11 or 12 (or equivalent) with a passing grade of ‘C’ will be exempt from having to write the Math Entrance Assessment. The equivalent credential must be evaluated and verified.
  • International students that can provide a Canadian transcript showing completion of English 11 or 12 (or equivalent) with a passing grade of ‘C’ will be exempt from having to write the English Entrance Assessment. The equivalent credential must be evaluated and verified.
  • International students can also meet the English requirement by demonstrating one of the following three options:
    • Sprott Shaw’s English Language Assessment,
      OR
    • Minimum IELTS Score 5.5 overall or iBT TOFEL Score of 70
      OR
    • Completion of an ESL program from one of SSC’s partnered ESL schools
Diploma Requirements:
  • Successful completion of all on-campus courses with a minimum of a 60% overall average.
  • Successful completion of all industry-certified courses and third-party training provided during the program.
  • Success completion of all practice education (practicum) components.
Technology  Requirements:

This program can be delivered on campus or in an online format. Online access will require the following minimum hardware requirements. Minimum Internet up/down data speed should be at be at least 1.5 Mbps.

Windows Devices
Windows 8.1/10 (32/64 bit)
Intel Core i5 processor
250 GB HDD/4 GB RAM

Microsoft Edge
Apple iOS Devices
Mac iOS 10.15 (Catalina)
Intel Core i5
256 GD SSD/8 GB RAM

Google Chrome OS Devices
Google Chrome OS
Intel Celeron N Processor
32 GB Storage/4 GB RAM

uCertify Platform
This platform is the Web-based course integration tool used throughout the Cybersecurity program. It works on almost all
browsers / OS / devices less than two years old.

Browsers
Any current versions of the following can be used:
• Internet Explorer
• Chrome
• Firefox
• Safari

Information on the uCertify site will allow the user to check and update to the most recent version.

Mobile
uCertify Mobile App is the smartphone and tablet version of uCertify LEARN, where students can access every course they
are enrolled in on their mobile devices, to make learning more convenient and efficient.

Other Specifications
For using the uCertify courses and the Internet, JavaScript should be enabled and Cookies (and third-party Cookies) should also be enabled.

* Cybersecurity Program was reviewed and approved by the Private Training Institutions Branch (PTIB) of the Ministry of Post-Secondary Education and Future Skills.

Contact an Admissions Advisor for More Information Today!

Contact Us Today!

Our advisors are happy to answer any questions.

Courses List

This 67 week Diploma program requires the student to complete the following courses.

• This course will prepare students to produce instructive, informational, and persuasive documents.
• Those documents provide relevant, reliable information that allow readers to easily understand both context and implications so that informed decisions based on well defined and achievable outcomes can be made.
• Processes will be taught for analyzing writing contexts and producing effective, clean, and reader-centred documents in an efficient manner.

Pre-requisite: CYSC110 - Threat Landscape

• An effective cybersecurity defence consists of addressing security issues with respect to infrastructure, devices, local networks, and access points.
• Overcoming the challenges associated with each requires a detailed understanding of the issues, strategies, and practices.
• Students will learn to apply a systematic approach to securing IT infrastructure and networks and then will be introduced to the techniques used to protect data leaving and entering an organisation’s infrastructure.

Pre-requisite: NETW100 - Networking Essentials

• Cyber threats are among the biggest challenges individuals and organisations face today. Threat intelligence represents a multiplier for organisations looking to proactively protect themselves from digital threats.
• This course introduces students to threat intelligence categories and the evolving threat landscape.
• Digital security topics will focus on understanding contemporary categories of cyber threats and implementing basic protection systems by improving network design and security.
• Students will explore the methodologies used to identify and prioritise potential threats to devices, data, and networks.

Pre-requisites: CYSC110 - Threat Landscape

• An ethical hacker finds and communicates the vulnerabilities in a computer system, web application, or
network.
• As organisations become Internet occupants and reply on cloud computing technologies to serve as their data and operational repositories, ethical hacking can proactively shield them against potential security threats and breaches.

Pre-requisites: CYSC150 - Ethical Hacking

• Students will learn the underlying principles and techniques associated with penetration testing and discover how system vulnerabilities can be exploited and fixed.
• Students will develop an understanding of current cybersecurity issues and ways that user, administrator, and programmer errors can lead to device and system intrusion.

Pre-requisites: CYSC151 - Penetration Testing

• Open source intelligence and social engineering is a fundamental component of any cybersecurity toolbox, both from protection and breach perspectives.
• Students will learn the concepts and tools used to find, harvest, corroborate, and analyse data from the Internet and Dark Web sources and how to make sure that this information meets investigative goals.

Pre-requisites: CYSC110 - Threat Landscape

• Students will learn to identify and manage threats to an organisation’s cyber security.
• Students will explore what an organisation and third parties must do to comply with regulations, privacy law, and stakeholder expectations.
• How threats affect project life cycles, how to protect digital assets, involvement in the implementation of a cyber risk framework, prevention of organization intrusions, and rapid breach recovery.

Pre-requisites: CYSC180 - Digital Forensics, CYSC170 - Risk Management

• This course familiarises students with skills and best practices for developing and implementing effective
cybersecurity policies within an organisation-wide cybersecurity framework.

Pre-requisites: CYSC100 - Cybersecurity Issues

• This course addresses the entire life cycle of incident response after a digital breach, including site preparation, data collection, and how to respond and effectively assess and manage future vulnerabilities

  • Skills and strategies conducive to learning in a college atmosphere, orientation to the college environment, using technology, knowing college policies and procedures.
  • Time management, writing and using citations, study strategies, student budgeting, and wellness/self-care/stress management.
  • An orientation to the PCP program and the emergency medicine professions.
  • Prepare for upcoming studies, learning environments, and work experience placements throughout the program.

  • Interview techniques
  • Create a Career Development Marketing Plan
  • Apply aspects of professionalism
  • Identify target markets and employment resources
  • Specialty program coverage in this shortened version

• This course will provide students with the conceptual and practical foundations for understanding how computing hardware and server technology functions. Students will learn how to configure, manage, and troubleshoot computer and digital devices.

Pre-requisites: ITEC110 – Computing Hardware

• This course will introduce students to the concepts, principles, and processes that underlie operating systems. They will be required to apply theory to practice.
• Students will learn about processor management, concurrency and synchronisation, memory management schemes, file systems, secondary storage management, and security and protection.

Pre-requisite: ITEC120 - Operating Systems Concepts

• Students will learn advanced Windows systems software skills, become familiar with other widely used operating systems, and learn to compare the strengths and weaknesses of each.
• Students will be introduced to managing and troubleshooting devices in Windows, Linux, iOS, Mobile,
and Cloud environments.

Pre-requisite: ITEC121 - Operating Systems

• Students will learn programming terminology, become very familiar with pseudocode, gain a solid understanding of the basic mechanics of programming, and will learn to write simple programs.

Pre-requisite: ITEC130 - Introduction to Programming

• This course introduces the basic concepts of procedural programming and learning to understand code.
• Students will learn to use data types, control structures, problem solving strategies, software development methodology, design concepts and principles, and testing and debugging methodologies.

Pre-requisites: ITEC 121 - Operating Systems, ITEC110 - Computing Hardware

• Students will learn how to effectively provide help desk support by learning what services are required, how to prioritise issues, and how to set realistic expectations.
• In this course students will be introduced to self management and soft skills, performance measurement
rubrics, users’ needs, goals, and attitudes.
• Also, how to define, diagnose and solve problems, which tools are required, ensure that value is being received, and how to effectively deal with management.

Pre-requisites: ITEC131 - Programming Fundamentals

• The Linux operating system will be introduced as an alternative to more common platforms because of its security features, cost, and scalability efficiencies. Students will learn how to install and manage a Linux system.

Pre-requisites: ITEC150 - Linux Fundamentals

• This course will continue to familiarise students with the Linux operating system with a focus on security.
• It will address a full range of command-line and shell activities, including managing accounts, developing account security policies, setting file permissions, and managing storage.
• It will also examine scripting and automation, networking configuration, and a variety of security issues, such as software management security policies, footprinting, firewalls, and intrusion detection.

Pre-requisites: ITEC121 - Operating Systems, ITEC110 - Computing Hardware

• The network is essential to the effective management of organizational data, functions, and operations, including cybersecurity; therefore, it is important to understand what the network can do, how it operates, and how to protect it.
• This course is designed to introduce students to the core networking concepts, explain the purpose of networking, and examine how networks are configured across a wide variety of environments.
• This will include a review of network topologies, physical networking, network protocols, network troubleshooting, and security.

Pre-requisites: NETW100 - Networking Essentials, ITEC110 - Computing Hardware

• This course delves into the concepts introduced in Networking Essentials and explores the roles and
responsibilities of a systems administrator.
• Students will explore topics in network administration from a theoretical and practical perspective.
• Learn how to configure, optimise, and manage network configurations (unified, mobile, cloud, virtualisation) and to assess, mitigate, and minimise vulnerabilities.

Pre-requisites: CYSC100 - Cybersecurity Issues

• This course introduces students to essential network security concepts, challenges, and the techniques that can be used to address vulnerabilities and defend against intrusion.
• Students will learn how to select the appropriate security technologies for network environments and use encryption effectively.

Pre-requisites: NETW120 - Network Defence

• This course focuses on the theory and practice of cryptography and network security. Students will be
provided with an overview of some of the fundamental principles of security, encompassing both information security and network security.

  • This course will provide the student with advanced
    understanding related to securing cloud based services
    such as Azure.
  • Subjects that will be explored include advanced topics
    related to: desktop hardware management, network client
    configuration, threat detection and antivirus, user access
    control and policy implementation.
  • The key focus will be on developing an understanding of
    various technologies and providing hands on practice using
    a combination of live environments and virtual lab scenarios

  • This course will introduce students to database. Subjects  that will be explored include: SQL Server components, installation and configuration, monitoring, basic dbase design, high availability architecture, security and backup.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios

  • This course will provide the student with advanced understanding related to Windows Server in a hybrid, on premise and Azure cloud based environment.
  • Subjects that will be explored include hybrid services including: Active Directory, server workloads, containers, networking infrastructure, storage and file services.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will provide the student with advanced understanding related to Windows Server in a hybrid, on premise and Azure cloud-based environment.
  • Subjects that will be explored include advanced topics related to: securing server environments, high availability, planning disaster recovery, server workloads, and troubleshooting.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will provide the student with advanced understanding related to securing cloud based services such as Azure.
  • Subjects that will be explored include advanced topics related to: Azure Active Directory identities, Platform protection, security operations, as well as data and application security.
  • The key focus will be on developing an understanding of various technologies and providing hands on practice using a combination of live environments and virtual lab scenarios.

  • This course will provide the student with foundational knowledge on installing and configuring Windows Server operating systems.
  • Subjects that will be explored include: virtualization, PowerShell, operating system installation, Active Directory, TCP/IP and network services, group policy, and Azure Cloud Services.
  • The key focus will be on developing a practical understanding of various technologies through lecture as well providing hands on practice using a combination of live environments and virtual lab scenarios

Contact an Admissions Advisor for More Information Today!

Contact Us Today!

Our advisors are happy to answer any questions.

See All Success Stories
We'd love to connect with you to help you become a Sprott Shaw graduate. Visit a campus, request info or apply today.
Request Info Apply Now

Affiliations and Associations

Contact an Admissions Advisor for More Information Today!