Learn more about the academic programs we are delivering in Winter 2025. If you have any questions about part-time studies, please contact us.
This Five course Certificate of Completion is designed for Computer Science Graduates and IT professionals to learn about the core concepts of Cyber Security. Students are introduced to Security fundamentals, Organizational Defense Strategies, Testing Methodologies, Forensic Investigative Tools and Vulnerabilities of Wireless networks. Students who complete this program will have earned credits towards the Cyber Security Graduate Certificate.
Part-time Studies courses are being offered in either of the following four formats: Online, Flexible, In-person, Hybrid. Click Availability below to see current offerings.
This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, terminology and the management aspects of information security programs.
Students learn to recognize and understand the inherent vulnerabilities of Windows systems by using tools and techniques to decrease the risks arising from vulnerabilities in Microsoft operating systems and applications. This course introduces defense strategies through an understanding of system and file permissions, password and account security, the windows Registry, Malware prevention, encryption, and Directory Service management via policies.
This course prepares students to assess and then correct the vulnerabilities present with information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.
Examine and discover computer forensics, operating systems and how they function. Students are introduced to forensic tools along with concepts such as chain of custody and documentation of evidence and procedures and evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.
Explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, examine risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place look ahead to the future of wireless and mobile device security.
Upon successful completion of the program requirements, please submit a Request for Certificate of Completion Form to the Faculty of Continuing Education and Training. There is no cost for this and your Certificate of Completion will be sent to you electronically.
Rasika De Silva
Program Assistant
Rasika.DeSilva@senecapolytechnic.ca
416-764-0977
Sheri Ladoucier
Academic Program Manager
Sheri.Ladoucier@senecapolytechnic.ca
416-764-0983
For more information about this program, fill out the following form.