Cyber Security
Cybersecurity experts’ primary role is to safeguard an organization’s digital information, networks, and systems from cyber threats by proactively preventing, detecting, responding to, and recovering from attacks. This requires a mix of technical expertise and strategic problem-solving skills across various specialized functions.
Location
North York
Newmarket
Duration
64Weeks
Internship
6 Weeks
Type
Hybrid
Your Future Starts Here!
Program Overview
The Cyber Security program offers comprehensive education in managing the complex world of digital security. Students gain vital skills in computer systems, network management, server configuration, and security. This program prepares graduates for diverse roles in the IT field, combining practical knowledge with technology management, career planning, and field placement.
Cyber Security is a critical member of any organization’s IT team. With their technical expertise, attention to detail, and commitment to keeping systems secure, they play a vital role in ensuring that the organization is able to operate safely and efficiently in an increasingly digital world.
Program Highlights
- Comprehensive security infrastructure management and oversight of organizational IT systems
- Regular security assessments and vulnerability analysis to identify potential threats proactively
- Hands-on training in computer systems, network management, and server configuration
- Threat detection and mitigation strategies using the latest cybersecurity trends and technologies
- Security policy enforcement and implementation of organizational security programs
- Malware scanning and threat monitoring procedures for ongoing system protection
- Implementation of multi-factor authentication and strong password policy enforcement
Request More Info!
Your Career
Job opportunities for cyber security specialists are vast and growing, spanning roles from entry-level Security Analysts and IT Support to advanced positions like Penetration Testers, Security Engineers, Architects and Forensic Analysts, with high demand across sectors like finance, tech, and government for roles in threat detection, risk management, incident response, and cloud security.
Key Areas & Specializations:
- Security Operations (SOC): Monitoring, threat detection, incident response.
- Offensive Security: Penetration Testing, Ethical Hacking, Red Teaming.
- Risk & Compliance (GRC): Assessing risks, ensuring compliance with standards.
- Cloud Security: Securing cloud environments (AWS, Azure, GCP).
- Engineering & Architecture: Designing and building secure systems.
- Digital Forensics: Investigating cybercrimes
Common Job Titles & Roles:
- Entry-Level: Security Analyst, Network Security Operator, Security Administrator, Cyber Security Operations Analyst, IT Security Specialist, Incident Responder.
- Mid-Level/Experienced: Penetration Testers, Vulnerable Analysts, Security Engineer, Information Security Analyst, Threat Hunter, SOC Analyst, Digital Forensic Analyst, GRC Analyst (Governance, Risk, & Compliance).
- Senior/Leadership: Cyber Security Architect, Information Systems Security Manager, Director of Security, CISO (Chief Information Security Officer).
Learn All About The Cyber Security Specialist Program
Program Courses
This module introduces students to the fundamentals of cybersecurity. Topics covered include the history and evolution of cybersecurity, common threats and vulnerabilities, and an overview of cybersecurity tools and methodologies.
In this course, students will learn to install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. The course will build on your existing user-level knowledge and experience with personal computer (PC) software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on PCs, digital devices, and operating systems. This course provides the background knowledge and skills you will require to be a successful A+ technician.
This course covers all the administrative tasks in Windows 10 such as Group Policy, installing and updating drivers, indexing, Windows security (encryption and authentication), RSAT, remote desktop connection, secure boot along with troubleshooting boot problems, Windows networking, firewall, virtualization (Hyper-V), creating backups, and recovery. We will also cover troubleshooting techniques so students can solve issues that they might be faced with.
This course introduces students to the structure, function, and usage of Windows PowerShell for Windows administration. This course provides students with the knowledge and skills necessary to write and maintain PowerShell scripts to automate all aspects of system administration for computers running the Microsoft Windows operating system. In addition to basic PowerShell concepts such as Cmdlets, Scripts and Pipelining, this course covers the interfaces built into the Windows operating system (eg. Windows Management Instrumentation – WMI and Active Directory Services Interfaces – ADSI) which scripts must call in order to manipulate the operating system.
This course focuses on providing the skills and knowledge required to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats. At the end of this course, students should be able to complete the configuration, implementation and troubleshooting of a network, as well as be able to manage a Network for an Organization.
In this course, students will explore advanced networking technologies, including routing, switching, wireless networking, and virtualization.
This course aims to provide individuals who have successfully completed an introduction to Windows with an in-depth look at the different installation and configuration tasks necessary to manage Windows Server. These tasks include Windows Server deployment, storage configuration, Implementing High Availability, as well as fault tolerance, maintenance and monitoring. Microsoft Windows server roles and features included such as the ability to user management, Resource management across users and applications and many other server- focused services.
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Windows servers provide applications and services that manage a network. This course examines the implementation of these services in a networked environment and teaches students how to install, configure, and manage common services such as Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), and file and print services.
In this course, students will learn Linux system administration, including installation, package management, file system basics, and network security.
This course covers essential topics in network security, compliance, operational security, threats, vulnerabilities, cryptography, and implementations.
In this course, students will learn to detect and analyze threats, manage vulnerabilities, design secure architectures, and use cybersecurity tools. Students will also explore security analysis and threat management, implementing effective security measures and responding to incidents.
In this course, students will learn to develop and implement security policies, conduct risk assessments, and plan for business continuity and disaster recovery.
This course introduces tools for planning and preparing for a successful job search so students can maintain a career-focused approach throughout their education program. Students will understand themselves and their career goals and choices more effectively.
Admission Requirements
1. MINIMUM OF GRADE 12(OSSD) – education or Mature Student status (19 years of age or older and out of school for 1 year or more);
2. ENTRANCE EXAMS – Successful completion of City College Entrance Exams and requirements for the program;
3. Current Resume;
4. ADMISSIONS INTERVIEW with an Education Consultant
5. Meeting with the Financial Aid Officer.
If you are an international student please contact us for more information regarding admission requirements
This program is approved as a vocational program under the Ontario Career Colleges Act, 2005
Technical Skills
- Networking and Systems Administration: A deep understanding of how data moves across networks, including protocols (TCP/IP), network design, firewalls, VPNs, and intrusion detection/prevention systems.
- Operating Systems Proficiency: Expertise in securing and managing different operating environments such as Windows, Linux, and macOS, including system hardening techniques and using command line interfaces.
- Vulnerability Assessment and Penetration Testing: The ability to identify, assess, and exploit security weaknesses in systems, networks, and applications (ethically) to improve overall security posture using tools like Kali Linux or Metasploit.
- Incident Response and Digital Forensics: Skills in detecting, responding to, containing, and recovering from security incidents, including investigating breaches and collecting digital evidence for analysis.
- Risk Management and Compliance: Knowledge of identifying, assessing, and mitigating potential security risks, and ensuring that an organization adheres to relevant industry standards, laws, and regulations (e.g., GDPR, HIPAA).
- Security Tools and Technologies: Proficiency with industry-standard tools, such as Security Information and Event Management (SIEM) systems (like Splunk), vulnerability scanners, and endpoint protection platforms.
- Programming and Scripting Fundamentals: Competency in programming languages like Python, PowerShell, or Bash for automating tasks, analyzing code for vulnerabilities, and developing custom security solutions.
- Cloud Security: Understanding how to secure data and applications in cloud environments like AWS, Azure, and Google Cloud.
- Cryptography: Knowledge of encryption basics, algorithms, and key management to protect sensitive data.
