Ready to learn more?

Next Cohort: Jan 4-Aug 26

  • *Please select a subject

  • This field is for validation purposes and should be left unchanged.

By submitting your email address, you acknowledge and agree to CourseCompare.ca's Terms of Service and Privacy Policy.

Duration

8 months

Tuition

$2,722

  Toronto

Jan 4-Aug 26

Plus 2 other start dates

Sep 6 - Apr 28 2023

Jan 3 - Aug 25 2023

Commitment

Full-Time

Delivery

Classroom

Credential

Certificate

Year Founded

1967

Scholarships

no

Security violations, data breaches, privacy failures and other technology failures are in the news every day and pose a growing threat to business and personal information. This eight-month, full-time graduate certificate program provides students with the security background needed in network technologies, computing hardware, operating systems and protocols to harden and further secure such systems from attack.

Students develop, evaluate and support information technology (IT) security solutions by creating cost-effective and secure computing environments that will safeguard networked computer systems, including both on-premise and cloud-based systems. This program helps students become skilled in formulating and organizing security policies and procedures to protect corporate information assets including legal, regulatory and governance issues, and teaches how to detect various hacking and penetration attacks. Students also learn from leaders and industry-connected professors in industry-standard labs.

What You’ll Learn

  • Apply knowledge of computer operating systems, networking, and various application to the simulation of business processes.
  • Develop best practices to protect business resources through the application of knowledge of vulnerabilities and exploits.
  • Develop security strategies for the deployment of security procedures and protective devices.
  • Integrate information technology strategies that support business functions by employing knowledge of best practices of business processes and systems.
  • Develop security plans and strategies to include acceptable use of business information and systems by internal employees, contractors, consultants, business partners and customers.
  • Develop security plans and strategies to ensure the integrity of information in compliance with best practices, relevant policies, standards, and regulations.
  • Apply project management principles in the deployment of security policies and strategies.
  • Perform security audits to ensure compliance with security plans, policies, standards, regulations and best practices.
  • Develop and deliver a corporate training program to communicate both orally and in writing the security requirements for compliance with security policies.
  • Prepare security documentation for approval by senior management and present results of security audits.

Ready to get started?

Next Cohort: Jan 4-Aug 26

  • *Please select a subject

  • This field is for validation purposes and should be left unchanged.

By submitting your email address, you acknowledge and agree to CourseCompare.ca's Terms of Service and Privacy Policy.

Other courses in Cyber Security