Graduate certificate in Network and System Security Analysis

  • Country Canada
  • Course Duration 1 year
  • Course Type Full Time
  • Courses Campus On Campus
  • Language Specification IELTS
  • Program Level Post-Graduate
  • Education Required 2-Year Undergraduate Diploma
  • Admission intake SEP
  • Minimum GPA 50

Application Charges

Application Fee Tution Fee
CAD 110 CAD 23,220

Application Date

Application Start Date Application Closing Date
2022-12-05
---

Program Description

The Cyber Security graduate certificate program at George Brown College is designed to meet the high demand for cyber security professionals and related IT security professionals across multiple sectors – including consulting services, finance and health care.As a student in this program, you will begin with learning the theory and practical skills required to become a cyber security professional. This includes the differences and similarities between cyber security and hacking. You will learn about the primary attack surfaces (physical, social, electronic), methods for compromising the attack surfaces, and how to mitigate vulnerabilities.In the third semester, you will learn advanced techniques in ethical hacking incident response. A capstone group project will provide you with an opportunity to showcase your skills and talents for potential employers. These skills include:
  • digital forensics and incident response management
  • ethical hacking and analyzing malware
  • delivering security training
  • applying cryptography
In addition to traditional technical skills, the cyber security professionals of today require many non-technical skills and talents, such as:
  • analytical skills
  • written and verbal communication
  • project and time management skills
  • interpersonal and conflict management skills
Students graduating from this program are prepared to help defend organizations from the many current and emerging cyber threats, including malware, network attacks and data compromise. They will have the capabilities to monitor, assess and evaluate security risks and threats to physical and digital infrastructure, develop and implement security contingency planning, and lead the development of policies and procedures to ensure the mitigation of security risks.Delivery
  • This full-time program is delivered in a blended format, combining face-to-face sessions with online delivery, designed to accommodate those who wish to work while taking the program.
  • This schedule will require that learners attend classes that generally take place in the late afternoons and evenings through the week, plus all day Saturday.

Technology Requirements

This program requires students to have access to a personal laptop with the following specifications: 
  • 8 GB RAM (16 GB recommended) 
  • Support for virtualization 
  •  256 GB SSD Hard Drive (500+ GB is optimal) 
  •  2 TB (minimum) external hard drive 
  • Webcam + mic 
  • Consistent access to a reliable high-speed internet connection

Program Learning Outcomes

The graduate has reliably demonstrated the ability to:
  1. Develop and implement cyber security solutions considering the affordances and limitations of the computer operating systems, networks, application software and packages available.
  2. Develop best practices to protect business resources through the application of knowledge of vulnerabilities and exploits.
  3. Develop cyber security strategies for the deployment of security procedures and protective devices.
  4. Integrate cyber security strategies that support business functions by employing knowledge of best practices of business processes and systems.
  5. Develop cyber security strategies and processes for business communications that respond to the needs of all the internal stakeholders.
  6. Develop cyber security solutions and strategies that ensure the integrity of information in compliance with best practices, relevant policies, standards and regulations.
  7. Plan, implement and evaluate cyber security policies and strategies using project management principles to effectively respond to the needs of the organization's information security requirements.
  8. Perform security audits to ensure risk mitigation and compliance with security plans, policies, standards, regulations and best practices.
  9. Develop and deliver a corporate training program to communicate both orally and in writing the cybersecurity requirements for compliance with security policies.
  10. Communicate cyber security protocols, policies and audit results and related documentation to any level of the organization.

Extra Notes

* NOTE : The Tuition Fee is subject to change Semester wise, as such for exact Tuition Fee kindly see the Website of the respective University.
* NOTE : Pathways : Students who want to pursue a Graduate Degree through a particular University but are unable to meet the university requirements for the GPA, GRE/GMAT or English Language scores, have to take up an additional academic and language support i.e. pathways in order to ensure the admit and study at the desired University.