course detail

Within a year you can learn what is required to enter one of the world’s fastest growing technology fields with the highest labour market demand in history.  You can expect to earn an average yearly salary of at least $85,156 in Canada.

You will learn how to identify, analyze, and mitigate threats to internal IT systems and/or networks


You will be familiarized with the standards and procedures to protect the confidentiality, integrity, and availability of information and information systems.

Graduates will be well prepared for positions in which they will identify and document requirements, assess physical and technical security risks to data, software and hardware, and help develop policies, procedures and contingency plans to minimize the impacts of security breaches. Cybersecurity and information security is an area with a shortage of skilled applicants, and industry demand is expected to continue to grow as cyber threats become more sophisticated.

All applicants welcomed especially:Post-secondary diploma in Information Technology, Network Administration or Programming; or
University degree in computer science or Information Systems; or
Equivalent work experience in computer network administration and applications

Career paths

Computer and information systems managers plan, organize, direct, control and evaluate the activities of organizations that analyze, design, develop, implement, operate and administer computer and telecommunications software, networks and information systems. They are employed throughout the public and private sectors

Information systems analysts and consultants analyze systems requirements, develop and implement information systems development plans, policies and procedures, and provide advice on a wide range of information systems issues. They are employed in information technology consulting firms and in information technology units throughout the private and public sectors, or they may be self-employed

Computer network technicians establish, operate, maintain and co-ordinate the use of local and wide area networks (LANs and WANs), mainframe networks, hardware, software and related computer equipment. They set up and maintain Internet and intranet Web sites and Web-server hardware and software, and monitor and optimize network connectivity and performance. They are employed in information technology units throughout the private and public sectors. Supervisors of computer network technicians are included in this unit group

students say...

You will explore the systems, tools, and concepts used to minimize the risk to any organization's cyberspace.
Jake Mannheim
You begin to see just how vulnerable our data systems are and how at risk everyone else is cyber threats like identity theft and that is the most eye opening thing to me
Jenna Dawson

Ethical Hacking

Ethical Hacking

The proactive work you do helps to improve an organization’s security posture.
Click Here

Response and Forensics

response & Forensics

Key evidence retrieval and preservation: How to detect, classify, and handle security
Click Here