Learn more about the academic programs we are delivering in Winter 2025. If you have any questions about part-time studies, please contact us.
As digital innovation continues to rapidly advance, it is becoming increasingly difficult for organizations to keep up with the changing nature of cybersecurity threats.
With a shortage of cybersecurity professionals across Canada, this program was designed and developed with leading financial services organizations to meet the need for individuals with the specialized skills to secure, protect and defend mobile and network infrastructures, preventing fraud, data breaches and other vulnerabilities.
As a graduate of this Cybersecurity and Threat Management program, you will be equipped with cutting-edge best practices and skills in communication, information security, project management, problem-solving and more. The industry capstone project and optional work term will give you hands-on experience and position you for a career in one of the world's fastest-growing fields.
When you graduate from this program, these are the types of career options that you can explore:
Canadian citizens or permanent residents educated outside of Canada must provide a World Education Services (WES) or ICAS Canada credential evaluation.
Additional Information
If your credential is in a non-IT related discipline, the networking knowledge requirement can be fulfilled by successfully completing a networking introductory course such as DCF255 - Data Communications Fundamentals through Seneca Continuing Education.
To apply for the Cybersecurity and Threat Management graduate certificate program, please complete the application form.
In addition to completing the application form, you must also submit supporting transcript(s) per the program's entry requirements to Teresa Artuso at teresa.artuso@senecapolytechnic.ca. Please use "Part-time Cybersecurity & Threat Management Application" as the subject line of your email when submitting your transcript(s).
If you have any questions about the entry requirements or general questions about the program, please contact:
Teresa Artuso
Manager, Academic Programs
teresa.artuso@senecapolytechnic.ca
Part-time Studies courses are being offered in either of the following four formats: Online, Flexible, In-person, Hybrid. Click Availability below to see current offerings.
Admission into the Cybersecurity and Threat Management Program.
This course provides students with a foundation and context including information security principles, management of the security infrastructure, and the process for documenting the security policies of an organization. Topic coverage includes the terminology, technology, and management of information security programs as well as the types of attacks threatening security. Upon completion students will be able to contribute to the development of standards, procedures and guidelines for implementing the appropriate security policies.
Admission into the Cybersecurity and Threat Management Program.
This course prepares students to recognize the inherent vulnerabilities with firewalls and the different operating systems whether they are connected or unconnected to the network. Using case studies and real-world events, the students explore the evolution of wired and wireless networks and their impact on the corporate world from both cyber-security and business perspectives. The students will utilize tools and techniques that would help assess risks, threats and vulnerabilities of networked operating systems as well as the security measures that should be put in place to mitigate risks and breaches. This course also introduces defense strategies against vulnerabilities through exploring the internals of operating systems and network infrastructures.
Admission into the Cybersecurity and Threat Management Program.
This course introduces students to what and who ethical hackers are, how they are different from "non-ethical hackers", and why/how they are essential for protecting data from cyber-attacks. Students will look closely at the different types of tests that can be conducted by "ethical hackers" to assess the readiness of an organization's system to withstand cyber-attacks. The course also investigates the methods and tools used in cyber-attacks and their countermeasures, as well as available security resources that every organization needs to possess to be able to counter the different cyber-attack "types". This will equip the students with the knowledge and techniques to successfully consider the different methods of combating hackers and cyber-attacks.
Admission into the Cybersecurity and Threat Management Program.
This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how Information systems security and legal compliance are now required to protect critical infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.
Admission into the Cybersecurity and Threat Management Program.
This course introduces students to cloud computing and the internet of things (IoT). Students will learn about different cloud options such as public and private and their applications in various organizations. They will explore important resources required for architecting an application in the cloud to increase efficiencies and reduce costs. Students will also investigate measures that are needed to mitigate risk in the cloud. Students will develop IoT solutions using sensors and components integration. They will use industry examples to implement IoT solutions in Big Data. Students will work with DevOps tools to shorten the systems development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives.
In this course students will learn how to draw insights from data. Starting with database basics, students will quickly advance to using the information gathered to support decision making. Students will use real datasets to practice inspecting and transforming data. They will practically explore structured and unstructured databases and use cases for each.
Note:This course code has recently been updated from CYT175 to CYT180
Effective communication is a cornerstone of most successful careers. The ability to relate the importance of any information security program to leaders in business terms using accurate and concise written correspondence, reports, and presentations is essential to success. Throughout this course students will develop and put into practice effective communication skills demonstrating appropriate consideration of audience, context, format, tone and media.
With the growth of data collection emanating from the IoT and the network device data capturing, the management of this data usage becomes more and more challenging. This course focuses on the how to navigate the huge amount of data being collected, to analyze the data and determine which particular data elements can be used to identify the security threats for the systems associated with the collected data. The threats identified can take different forms including attacks that already taken place, attacks that are in progress and vulnerabilities of the existing system that can result in future attacks. The course will address how to detect and how to prevent system attacks based on analysis of the data presented.
Admission into the Cybersecurity and Threat Management Program.
This course is an introduction to the terminology, life cycles and core processes involved in the management of cybersecurity-related projects. Students learn the responsibilities that a project manager has during the development and implementation of a project. Students gain the required skill sets the Project Manager needs in order to successfully meet project goals and milestones. Theory is supported by hands-on practice with scheduling tools, software and processes commonly used.
Identity verification and access are crucial to the ability of an organization to protect its assets. In this course, students learn how to manage the identification and authentication of people and devices, how to implement and manage authorization mechanisms, and how to mitigate access control attacks while ensuring effective IT collaboration with business units.
Students will analyze the different characteristics of hackers including types of hackers, their motivations, techniques and attitudes. The students will examine the different types of computer crimes together with how these crimes are related to hacking strategies and techniques. Examining how hackers target networks and the methods followed in these attacks is an essential part of computer forensics. Using computer forensics, students will know how to conduct the appropriate investigations that will uncover and quantify attacks and identify potential vulnerabilities.
This course provides students with concepts of discovering and exploiting flaws in mobile applications on a variety of platforms. Students learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design phase through presentation of the final product.
As a graduate, you will be prepared to reliably demonstrate the ability to:
This program is eligible for OSAP funding.
Course load is used by OSAP to determine funding options for programs.
Course load is calculated by dividing the number of courses you are enrolled in at the same time by the total number of courses per semester. For example, in Cybersecurity and Threat Management there are six courses in Semester 1 and seven courses in Semester 2.
To be considered for part-time OSAP, you must have a course load between 20 to 59 per cent. If you are taking two or three courses in Cybersecurity and Threat Management in a given term, you may be considered for part-time student grants and loans.
To find out if you qualify and to learn how to apply, please visit the OSAP website.
For information on other awards and financial assistance, please see Financial Aid.
When you meet all program requirements and become eligible for a certificate, diploma, or degree, you must inform the Registrar by completing a Graduation Application form and paying the graduation and alumni fee. Certificates, diplomas, and applied degrees are issued twice a year in the Fall (October), Spring (June) and Winter (February).
For further information including deadlines and fees, please visit the Convocation website or contact the Convocation Office at theservicehub@senecapolytechnic.ca.
A student will be eligible to graduate from a certificate, diploma, advanced diploma or graduate certificate program if they have achieved a minimum graduating GPA of 2.0.
A student will be eligible to graduate from a degree program if they have achieved a minimum graduating GPA of 2.5, which includes a minimum GPA of 2.5 in the courses in their main field of study and a minimum GPA of 2.0 in breadth courses.
Earn college credits for what you already know.
Prior Learning Assessment is a method of assessing and recognizing learning that is equal to
college level learning, but has been gained outside a traditional classroom (through work
experience, volunteering, outside study, etc.). If you can prove that the knowledge you have gained
meets the outcomes of a Seneca course, then credit will be awarded.
How does the PLA process work?
Prior Learning is demonstrated through a "challenge" process. The process measures learning
through a variety of methods which may include tests, portfolio assessment, interviews,
demonstrations, essays, and work samples. The method used will be determined in consultation with a
Program Coordinator.
For more information and to determine if you are eligible for PLA, please call the Program
Coordinator.
The process may take from 6 to 8 weeks.
Note: Not all courses can be challenged. For more information go to PLA website or contact your Program Coordinator.
Many students who enter Seneca Polytechnic will have earned academic credits in postsecondary educational institutions which they may be able to apply toward completion of a Seneca Polytechnic program.
Requests for Transfer Credit must be for a specific course and must be accompanied by an official transcript and course outline. A minimum grade of "C" (60 percent) is generally required for a course to be considered for Transfer Credit.
Download a Transfer Credit Request form. An official copy of your transcript and applicable detailed course outlines should be attached and submitted. Please note it may take 4 to 6 weeks for a Transfer Credit decision.
Please visit the Office of the Registrar.
Teresa Artuso
Manager, Academic Programs
teresa.artuso@senecapolytechnic.ca
416-764-9895