Diploma in Cybersecurity Specialist Co-op

Key Points

  • Work permit while you study

  • Guaranteed place for the internship

  • Labor assistance service of the College

  • Start dates: January, May, September

  • Duration: 24 weeks in class / 12 weeks of Co-op

  • Total duration: 51 weeks, including scheduled breaks

  • Type: Full Time

  • Hours: Daytime
  • Tuition Fee: Starting at $ 14,495 CAD

  • Scholarships available

Write to us for more information

This one-year program is ideal for those looking to become familiar with all aspects of cyber security, such as blockchain, big data, and IoT (Internet of Things). This program is powered by CompTIA, giving you the knowledge to build a solid foundation toward Security + certification.

Program description

Gain the ability to anticipate information security risks, implement new ways to protect networks, and prevent cyberattacks of various kinds. Through state-of-the-art laboratory activities and tools, students will develop the professional skills necessary to pursue a career in cybersecurity.

Program results

  • Learn to use tools like Cryptool, Wireshark, Zenmap, nmap, Burp Suite, Snort, TCPdump, OpenVAS and OSSIM

  • Learn the programming language Python, SQL, Hyper-V, mobile simulators / emulators to perform cybersecurity lab experiments

  • Assess risks to determine how security policies and protocols can be improved by studying computer systems and networks.

  • Anticipate information security risks and implement new ways to protect organizations’ computer systems and networks.

  • Manage computer communication through multiple operating systems

  • Respond to security alerts and discover and correct failures in computer systems and networks

  • Uses technologies to carry out or prevent cyberattacks of various kinds

Career Options

Graduates of this diploma may consider career opportunities under NOC 2171, which includes positions such as:

  • IT Security Analyst
  • Systems Security Analyst
  • Security manager
  • Security software developer
  • Cryptographer

Learning Partner

This program is powered by CompTIA, giving you the knowledge to build a solid foundation toward the most recognized accreditation in the industry, the Security + certification. CompTIA is considered one of the leading trade associations in the IT industry and issues professional certifications in more than 120 countries.

Enterprise placement

The term cooperative gives you the opportunity to integrate academic studies with related work experience.
Cooperative work experience could include positions in the following areas:

  • IT Technical Support Specialist

  • Network Administrator

  • Information systems analyst

Program structure

You will have at least 480 hours of guided learning, followed by 480 hours of practice in an established business. Labs will help you apply the theories you learn to practical business situations. We will help you secure your job by sending you for interviews.

This module is designed to give you basic knowledge of the cyber world. This module will allow you to understand the principles of cyber attacks, the darknet, the motivations of hackers and various advanced technologies.

This module will review the structure of basic concepts of personal computer in data communications, the 7-layer model, working with SERVER 2016, remote and direct access as well as Virtual Private Network (VPN).

This module focuses on advanced computing communications topics such as network traffic monitoring and analysis, operating systems (with an emphasis on Linux and Windows), data files, and management development (including structured query language (SQL) and mobile cybersecurity).

This module covers web technologies and basic HTML development. In addition, you will learn Python code development and basic Python programming.

This module will focus on cryptography technology and commonly encountered techniques, limitations, and issues. It covers the theory and application of the methods available to protect information, computers and networks, as well as legal issues related to cryptography.

In this module, you will learn various topics. First, you will become familiar with various types of scans, such as networks, sites, computers, and vulnerabilities for attacks. The second part of this module will cover weaknesses in information security (hardware, software and infrastructure) and leading cyber and data protection technologies, tools and companies.

This module is designed to give you the basic skills to perform and build a penetration testing infrastructure that includes all the necessary equipment, such as hardware, software, network infrastructure, and tools.

This module will cover the tactics to manage and synchronize a multiplayer cyber event: SOC, NOC, ISP, MSSP and the use of communication strategies as a tool to manage and prevent a crisis during cyberattacks.

Once you complete the program, you must complete 240 hours of internship in a suitable business environment. Appropriate business sectors for a placement include cybersecurity services, banking, financial services and insurance offices, non-profit organizations, communications services, government entities, and more. Activities performed will vary by placement site, however your key responsibilities will include:

  • Learn to build secure data centers, networks, and software systems
  • Help in finding vulnerabilities and risks in hardware and software .
  • Build firewalls in network infrastructures

Admission requirements

  • Have an Ontario high school diploma or equivalent or be at least 18 years old and pass the Wonderlic exam.
  • For international students, a Bachelor’s degree from the country of origin will be required. The degree and grades must be officially translated into English.

For non-native English speakers:

  • Successful completion of TSoM EAP Level 4 or
  • Have the required IELTS 5.5 score or equivalent or
  • Pass the TSoM English assessment (written on site or online with the exam proctor)

Learn more about our educational offer

Request your quote

An advisor will contact you by phone and email within the following hours