Learn more about the academic programs we are delivering in Winter 2025. If you have any questions about part-time studies, please contact us.
Secure, protect, and defend network infrastructures and information assets against fraud, hackers, data leaks, identity theft, and other vulnerabilities. Gain a broad understanding of cyber security concepts including: packet vulnerability, cryptography, malware, exploit analysis, mobile platforms (iOS, Android and Windows Mobile), firewalls, VPNs, and fundamental Internet/network security architecture and protocols.
This is a professional program designed for:
Part-time Studies courses are being offered in either of the following four formats: Online, Flexible, In-person, Hybrid. Click Availability below to see current offerings.
This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, terminology and the management aspects of information security programs.
This course explores the key structure elements and terms of written information protection policies and reviews typical policy contents. Students develop the related standards, procedures, and guidelines for implementing policies and evaluate the tools needed to select, develop, and apply a security program that meets business goals.
Students learn to recognize and understand the inherent vulnerabilities of Windows systems by using tools and techniques to decrease the risks arising from vulnerabilities in Microsoft operating systems and applications. This course introduces defense strategies through an understanding of system and file permissions, password and account security, the windows Registry, Malware prevention, encryption, and Directory Service management via policies.
This course prepares students to assess and then correct the vulnerabilities present with information systems. Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.
This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.
This course explores Unix/Linux, Unix-like Operating Systems, firewalls and Virtual Personal Networks (VPNs). Students are introduced to the basic concepts of Unix/Linux, different file systems, editors, differences between Unix.Linux distributions, creating users, permissions, package managers man pages and other places to find help. This course also explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures.
Students examine and analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.
This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android and Windows Mobile platforms. Students learn a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls and cross-platform apps.
Examine and discover computer forensics, operating systems and how they function. Students are introduced to forensic tools along with concepts such as chain of custody and documentation of evidence and procedures and evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.
Explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, examine risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place look ahead to the future of wireless and mobile device security.
Examine the realm of network security with a spotlight on the latest threats and vulnerabilities. Students will address how and why people attack computers and networks and gain the knowledge and techniques to successfully implement methods of combatting hackers.
This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity, and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design through presentation of the final product.
Earn college credits for what you already know.
Prior Learning Assessment is a method of assessing and recognizing learning that is equal to
college level learning, but has been gained outside a traditional classroom (through work
experience, volunteering, outside study, etc.). If you can prove that the knowledge you have gained
meets the outcomes of a Seneca course, then credit will be awarded.
How does the PLA process work?
Prior Learning is demonstrated through a "challenge" process. The process measures learning
through a variety of methods which may include tests, portfolio assessment, interviews,
demonstrations, essays, and work samples. The method used will be determined in consultation with a
Program Coordinator.
For more information and to determine if you are eligible for PLA, please call the Program
Coordinator.
The process may take from 6 to 8 weeks.
Note: Not all courses can be challenged. For more information go to PLA website or contact your Program Coordinator.
Many students who enter Seneca Polytechnic will have earned academic credits in postsecondary educational institutions which they may be able to apply toward completion of a Seneca Polytechnic program.
Requests for Transfer Credit must be for a specific course and must be accompanied by an official transcript and course outline. A minimum grade of "C" (60 percent) is generally required for a course to be considered for Transfer Credit.
Download a Transfer Credit Request form. An official copy of your transcript and applicable detailed course outlines should be attached and submitted. Please note it may take 4 to 6 weeks for a Transfer Credit decision.
Please visit the Office of the Registrar.
When you meet all program requirements and become eligible for a certificate, diploma, or degree, you must inform the Registrar by completing a Graduation Application form and paying the graduation and alumni fee. Certificates, diplomas, and applied degrees are issued twice a year in the Fall (October), Spring (June) and Winter (February).
For further information including deadlines and fees, please visit the Convocation website or contact the Convocation Office at theservicehub@senecapolytechnic.ca.
Rasika De Silva
Program Assistant
Rasika.DeSilva@senecapolytechnic.ca
416-764-0977
Glen Steins
Part-time Program Coordinator
Glen.Steins@senecapolytechnic.ca
437-312-0354
Sheri Ladoucier
Academic Program Manager
Sheri.Ladoucier@senecapolytechnic.ca
416-764-0983
For more information about this program, fill out the following form.