The Diploma in Cyber Security equips students with the essential skills to navigate and secure today’s digital world. Through hands-on training in network security, ethical hacking, threat detecion, and data protecion, students gain experience in identifying vulnerabilities, mitigating risks, and safeguarding information systems. Graduates are prepared for in-demand roles such as Cyber Security Analyst, Ethical Hacker, Information Security Specialist, and Incident Response Technician. This program opens doors to careers across industries, including f inance, healthcare, government, and technology, where the need for skilled cyber security profes sionals continues to grow rapidly.
- Overview
- Curriculum
First Semester
In this course, students will gain an understanding of information security, security
management, and security domains.
This course covers network security fundamentals, such as how hackers get access to
online networks and how to utilize firewalls and VPNs as security remedies. Students
study security from both a managerial and a technical standpoint.
This course examines the legal and ethical challenges that arise in the field
of information technology.
Students examine the fundamental parts of a writien information security policy's
structure and language, as well as typical policy content and other related
documents, such as, procedure, standards, guidelines, and baselines.
This course introduces defence strategies through understanding of system and file
permissions, password, identity and access management, the system Registry,
Malware prevention, and encryption.
This course investigates the transition from wired to wireless networking and its
implications for business
Second Semester
In this course, students will gain an understanding of information security, security
management, and security domains.
This course covers network security fundamentals, such as how hackers get access to
online networks and how to utilize firewalls and VPNs as security remedies. Students
study security from both a managerial and a technical standpoint.
This course examines the legal and ethical challenges that arise in the field
of information technology.
Students examine the fundamental parts of a writien information security policy's
structure and language, as well as typical policy content and other related
documents, such as, procedure, standards, guidelines, and baselines.
This course introduces defence strategies through understanding of system and file
permissions, password, identity and access management, the system Registry,
Malware prevention, and encryption.
This course investigates the transition from wired to wireless networking and its
implications for business
Third Semester
In this course, students will gain an understanding of information security, security
management, and security domains.
This course covers network security fundamentals, such as how hackers get access to
online networks and how to utilize firewalls and VPNs as security remedies. Students
study security from both a managerial and a technical standpoint.
This course examines the legal and ethical challenges that arise in the field
of information technology.
Students examine the fundamental parts of a writien information security policy's
structure and language, as well as typical policy content and other related
documents, such as, procedure, standards, guidelines, and baselines.
This course introduces defence strategies through understanding of system and file
permissions, password, identity and access management, the system Registry,
Malware prevention, and encryption.
This course investigates the transition from wired to wireless networking and its
implications for business
Tuition and Fees
Tuition and Fees: Tuition and fees vary depending on the program of study.
Payment Plans: We offer flexible payment options to help manage tuition and fees.
Financial Aid: Explore various scholarships, grants, and loan opportunities to help fund your education.
After submitting your application, you will receive an email with detailed tuition and fee information specific to your program.
Computer Requirements
- 16 GB RAM minimum
- 256 GB SSD Hard Drive (500+ GB would be better)
- Quad-core i7 2.4GHz or better
- Video card (2GB RAM minimum/4GB RAM recommended)
- Webcam
Your Skills
Throughout this program you will develop the following skills:
- Project Management
- Team Work
- Cyber Security Skills
- Network Analysis
Program Outcomes
- Identify and assess cyber security risks and vulnerabilities in IT systems.
- Implement and manage security measures to protect networks and data.
- Respond effectively to security incidents and breaches.
- Apply ethical hacking techniques to test and secure systems.
- Understand security frameworks, compliance, and legal regulations.
Your Career
- Cyber Security Analyst
- Penetration Tester (Ethical Hacker)
- Information Security Specialist
- Network Security Administrator
- Incident Response Analyst
Admissions requirements
- Canadian High School Certificate of Completion or equivalency certificate or International Qualifications from the Accreditation institutions listed below:
- https://www.bcit.ca/ices/eca/
- https://www.alberta.ca/iqas-immigration
- https://www.wes.org/eca/
- https://www.icascanada.ca/
- https://learn.utoronto.ca/comparative-education-service
- Alternate Admission Test to High School Certification
- Wonderlic SLE with a Minimum Score of 16
- IELTS (For Foreign Qualified Individuals)