Ready to learn more?

Next Cohort: May 6-Jul 27

  • This field is for validation purposes and should be left unchanged.

By submitting your email address, you acknowledge and agree to CourseCompare.ca's Terms of Service and Privacy Policy.

Duration

12 weeks

Tuition

$856

 

May 6-Jul 27

Commitment

Part-Time

Delivery

Online

Year Founded

1948

Scholarships

no

This course introduces fundamental concepts and notions of computer security, focusing on security threats, vulnerabilities, and available defense mechanisms. Students are exposed to ethical hacking, use of hacking methods for computer network vulnerability assessment and penetration testing. Various protection methods will be presented including auditing systems, monitoring techniques, and various Intrusion Detection Processes and technologies used for discovery of hackers and advance notice of cyber threats. Students will apply what they learn in scenario-based projects.

Note: Knowledge of TCP/IP is recommended.

Students must have a Windows or Linux computer operating system; the Apple (Mac) operating system is not supported by this course.

Ready to get started?

Next Cohort: May 6-Jul 27

  • This field is for validation purposes and should be left unchanged.

By submitting your email address, you acknowledge and agree to CourseCompare.ca's Terms of Service and Privacy Policy.

Student Reviews (1)

The G. Raymond Chang School of Continuing Education, Ryerson University

Certificate in Data Analytics, Big Data, and Predictive Analytics

Toronto •

Graduated From

Data Analytics Fast Track

Overall:

5 out of 5

Instructors:

5 stars

Curriculum:

5 stars

Job Assistance:

5 stars

This program taught me not only a specialized skill set, but also a broad range of skills that allow me to adapt to new challenges and technologies as the field continues to evolve. Thank you to everyone who worked on the design, development and implem

This program taught me not only a specialized skill set, but also a broad range of skills that allow me to adapt to new challenges and technologies as the field continues to evolve. Thank you to everyone who worked on the design, development and implementation of this program.

Other courses in Cyber Security