Cyber Security Program (Postgraduate) (T433)
Program Description
Program Overview
With more and more businesses putting their data into the cloud, the ability to ensure confidentiality, integrity and availability of digital assets has become paramount to their success and survival. The cyber security professional plays a vital role in the protection of business assets in all areas of our economy. In order to keep pace with the rapid advancement in technology and trends, the cyber security professional of today must be proficient in traditional networking technologies. In addition, they must have a strong familiarity with security trends and practices, the legal landscape and ethical hacking.
Full Description
The Cyber Security graduate certificate program at George Brown College is designed to meet the high demand for cyber security professionals and related IT security professionals across multiple sectors – including consulting services, finance and health care.
As a student in this program, you will begin with learning the theory and practical skills required to become a cyber security professional, including the differences and similarities between cyber security and hacking. You will learn about the primary attack surfaces (physical, social, electronic), methods for compromising the attack surfaces, and how to mitigate potential attacks.
In the third semester, you will learn advanced techniques in ethical hacking incident response. A capstone group project will provide you with an opportunity to showcase your skills and talents for potential employers. These skills include:
- digital forensics and incident response management
- ethical hacking and analyzing malware
- delivering security training
- applying cryptography
In addition to traditional technical skills, the cyber security professionals of today require many non-technical skills and talents, such as:
- analytical skills
- written and verbal communication
- project and time management skills
- interpersonal and conflict management skills
Students graduating from this program are prepared to help defend organizations from the many cyber threats, including malware, network attacks and data compromise. They will have the capabilities to monitor, assess and evaluate security risks and threats to physical and digital infrastructure, develop and implement security contingency planning, and lead the development of policies and procedures to ensure the mitigation of security risks.
Delivery
- This full-time program is delivered in a blended format, combining face-to-face sessions with online delivery, designed to accommodate those who wish to work while taking the program.
- This schedule will require that learners attend classes that generally take place in the late afternoons and evenings through the week, plus all day Saturday.
Technology Requirements
This program requires students to have access to a personal laptop with the following specifications:
- 8 GB RAM (16 GB recommended)
- Support for virtualization
- 256 GB SSD Hard Drive (500+ GB is optimal)
- 2 TB (minimum) external hard drive
- Webcam + mic
- Consistent access to a reliable high-speed internet connection
Career & Postgraduate Study Opportunities
Educational Pathways
Students who successfully complete this program may qualify for entry into Ontario college graduate certificate and university degree programs.
For further information, see Transfer Guide.
Courses
Required Courses
PRINTABLE CURRICULUM PLANNER 2022-2023
SEMESTER 1
Code | Course Name |
---|---|
COMP 4039 | Network Foundations |
COMP 4041 | Operating Systems |
COMP 4043 | Legality and Compliance in Security |
COMP 4044 | Introduction to Cyberspace Security |
COMP 4040 | Introduction to SOC |
COMP 4047 | ICT Competencies |
SEMESTER 2
Code | Course Name |
---|---|
COMP 4065 | Intermediate SOC |
COMP 4066 | SETA Development and Delivery |
COMP 4055 | Cryptography and Network Security |
COMP 4056 | Secure Network Architecture |
COMP 4057 | Ethical Hacking |
COMP 4058 | Security Trends and Issues |
SEMESTER 3
Code | Course Name |
---|---|
COMP 4074 | Wireless Network Security |
COMP 4060 | Risk Analysis |
COMP 4063 | Capstone Project |
COMP 4071 | Digital Forensics and Incident Response |
COMP 4077 | Advanced Ethical Hacking |
COMP 4078 | Advanced SOC |
Program Learning Outcomes
The graduate has reliably demonstrated the ability to:
- Develop and implement cyber security solutions considering the affordances and limitations of the computer operating systems, networks, application software and packages available.
- Develop best practices to protect business resources through the application of knowledge of vulnerabilities and exploits.
- Develop cyber security strategies for the deployment of security procedures and protective devices.
- Integrate cyber security strategies that support business functions by employing knowledge of best practices of business processes and systems.
- Develop cyber security strategies and processes for business communications that respond to the needs of all the internal stakeholders.
- Develop cyber security solutions and strategies that ensure the integrity of information in compliance with best practices, relevant policies, standards and regulations.
- Plan, implement and evaluate cyber security policies and strategies using project management principles to effectively respond to the needs of the organization's information security requirements.
- Perform security audits to ensure risk mitigation and compliance with security plans, policies, standards, regulations and best practices.
- Develop and deliver a corporate training program to communicate both orally and in writing the cybersecurity requirements for compliance with security policies.
- Communicate cyber security protocols, policies and audit results and related documentation to any level of the organization.
Tuition & Fees
Domestic Tuition
International Tuition
Additional Costs
* Amounts listed are the total of tuition, materials, student service and ancillary fees for the first three semesters of programs starting in Fall 2021 Fees are subject to change for programs starting in Fall 2022 and at later dates.
** Amounts listed are the total of tuition, materials, student service and ancillary fees for the three semesters of the program starting in Fall 2022. Fees are subject to change for programs semester starting at later dates.
International Students
Visit the International Fees and Related Costs page for more information.
Financial Assistance
This program is approved for OSAP funding, provided the applicant meets OSAP eligibility criteria.
Disclaimer: The information contained in this website is subject to change without notice. It should not be viewed as a representation, offer or warranty. Students are responsible for verifying George Brown College fee requirements.
Admission Requirements
- Two-year college diploma or bachelor's degree in Information Technology, Computer Sciences or a related field.
OR
- Two- or three-year college diploma or bachelor's degree in any field
- PLUS one year of related work experience, as evidenced by a resumé. Resumé should be submitted through ontariocolleges.ca with your application or via the GBC Online Application System (OAS) for international applicants.
English Language Proficiency
English language proficiency is essential. Applicants with international transcripts who do not provide English proficiency test results must test at the college level in the George Brown College English assessment to be considered for admission.
Please visit English Proficiency for more details
Course Exemptions
College or university credits may qualify you for course exemptions. Please visit Transfer Guide for more information.
International Students
Visit the International Admissions page for more information regarding country specific admission requirements.
How to Apply
Domestic students should apply through Ontario Colleges.
International Students
Visit the How to Apply page for more information on how and when to apply.
International students should apply through the George Brown College Online Application System.
Contact Us
School of Computer Technology
Phone: 416-415-5000, ext. 4287
Email: computertechnology@georgebrown.ca
The office hours are:
Monday – Thursday: 8 a.m. – 7 p.m.
Friday: 8 a.m. – 4 p.m.
Program coordinator: Jacky Min
Phone: 416-415-5000, ext. 6691
Email: jmin@georgebrown.ca
For more information about George Brown College, you may also call the Contact Centre at 416-415-2000 (TTY 1-877-515-5559) or long distance 1-800-265-2002.
Contact one of our international recruitment representatives specializing by country of origin by either booking a virtual meeting or submitting an inquiry. For more information visit the International Contact Us page
Visit Our Campus
The Cyber Security program is offered through our School of Computer Technology from our Casa Loma Campus at 146 Kendal Avenue in Toronto. Sign up for an Information Session or Campus Tour to learn more about George Brown College and the program. You can also explore our virtual tour.
Cyber Security Program (Postgraduate) (T433)
Apply Now:
Domestic StudentsProgram Description
Program Overview
With more and more businesses putting their data into the cloud, the ability to ensure confidentiality, integrity and availability of digital assets has become paramount to their success and survival. The cyber security professional plays a vital role in the protection of business assets in all areas of our economy. In order to keep pace with the rapid advancement in technology and trends, the cyber security professional of today must be proficient in traditional networking technologies. In addition, they must have a strong familiarity with security trends and practices, the legal landscape and ethical hacking.
Full Description
The Cyber Security graduate certificate program at George Brown College is designed to meet the high demand for cyber security professionals and related IT security professionals across multiple sectors – including consulting services, finance and health care.
Students begin with learning the theory and practical skills required to become a cyber security professional, including the differences and similarities between cyber security and hacking. A holistic approach is used, with students learning about the primary attack surfaces (physical, social, electronic). Students will learn about methods for compromising the attack surfaces, and how to mitigate potential attacks.
In the third semester, students will learn advanced techniques in ethical hacking incident response. A capstone group project will provide students with an opportunity to showcase their skills and talents for potential employers. These skills include:
- digital forensics and incident response management
- ethical hacking and analyzing malware
- delivering security training
- applying cryptography
In addition to traditional technical skills, the cyber security professionals of today require many non-technical skills and talents, such as:
- analytical skills
- written and verbal communication
- project and time management skills
- interpersonal and conflict management skills
Students graduating from this program are prepared to help defend organizations from the many cyber threats, including malware, network attacks and data compromise. They will have the capabilities to monitor, assess and evaluate security risks and threats to physical and digital infrastructure, develop and implement security contingency planning, and lead the development of policies and procedures to ensure the mitigation of security risks.
Delivery
- This full-time program is delivered in a blended format, combining face-to-face sessions with online delivery, designed to accommodate those who wish to work while taking the program.
- This schedule will require that learners attend classes that generally take place in the late afternoons and evenings through the week, plus all day Saturday.
Career & Postgraduate Study Opportunities
Your Career
As a result of the increase in cyber security related attacks, employer demand for information systems security professionals is increasing, and growth is projected to continue. A Global Information Security Workforce Study (GISWS) indicated the North American shortage of cyber security professionals is due to the lack of qualified people. The 2015 GISWS concluded that the information security workforce shortfall is widening. The estimated shortfall is 1.8 million by 2022.
Courses
Required Courses
PRINTABLE CURRICULUM PLANNER 2021-2022
SEMESTER 1
Code | Course Name |
---|---|
COMP 4039 | Network Foundations |
COMP 4041 | Operating Systems |
COMP 4043 | Legality and Compliance in Security |
COMP 4044 | Introduction to Cyberspace Security |
COMP 4040 | Introduction to SOC |
COMP 4047 | ICT Competencies |
SEMESTER 2
Code | Course Name |
---|---|
COMP 4065 | Intermediate SOC |
COMP 4066 | SETA Development and Delivery |
COMP 4055 | Cryptography and Network Security |
COMP 4056 | Secure Network Architecture |
COMP 4057 | Ethical Hacking |
COMP 4058 | Security Trends and Issues |
SEMESTER 3
Code | Course Name |
---|---|
COMP 4074 | Wireless Network Security |
COMP 4060 | Risk Analysis |
COMP 4063 | Capstone Project |
COMP 4071 | Digital Forensics and Incident Response |
COMP 4077 | Advanced Ethical Hacking |
COMP 4078 | Advanced SOC |
Program Learning Outcomes
The graduate has reliably demonstrated the ability to:
- Develop and implement cyber security solutions considering the affordances and limitations of the computer operating systems, networks, application software and packages available.
- Develop best practices to protect business resources through the application of knowledge of vulnerabilities and exploits.
- Develop cyber security strategies for the deployment of security procedures and protective devices.
- Integrate cyber security strategies that support business functions by employing knowledge of best practices of business processes and systems.
- Develop cyber security strategies and processes for business communications that respond to the needs of all the internal stakeholders.
- Develop cyber security solutions and strategies that ensure the integrity of information in compliance with best practices, relevant policies, standards and regulations.
- Plan, implement and evaluate cyber security policies and strategies using project management principles to effectively respond to the needs of the organization's information security requirements.
- Perform security audits to ensure risk mitigation and compliance with security plans, policies, standards, regulations and best practices.
- Develop and deliver a corporate training program to communicate both orally and in writing the cybersecurity requirements for compliance with security policies.
- Communicate cyber security protocols, policies and audit results and related documentation to any level of the organization.
Tuition & Fees
Domestic Tuition
Additional Costs
*Amounts listed are the total of tuition, materials, student service and ancillary fees for the first three semesters of programs starting in Fall 2020 Fees are subject to change for programs starting in Fall 2021 and at later dates.
International Students
Visit the International Fees and Related Costs page for more information.
Financial Assistance
This program is approved for OSAP funding, provided the applicant meets OSAP eligibility criteria.
Disclaimer: The information contained in this website is subject to change without notice. It should not be viewed as a representation, offer or warranty. Students are responsible for verifying George Brown College fee requirements.
Admission Requirements
- Two-year College Diploma or Bachelor's Degree in Information Technology, Computer Sciences, or a related field.
OR
- Two- or three-year College Diploma or Bachelor's Degree in any field
- PLUS one year of related work experience, as evidenced by a resume. Resume should be submitted through ontariocolleges.ca with your application or via the GBC Online Application System (OAS) for international applicants.
English Language Proficiency
English language proficiency is essential. Applicants with international transcripts who do not provide English proficiency test results must test at the College level in the George Brown College English assessment to be considered for admission.
Please visit English Proficiency for more details
Course Exemptions
College or university credits may qualify you for course exemptions. Please visit Transfer Guide for more information.
International Students
Visit the International Admissions page for more information regarding country specific admission requirements.
How to Apply
Domestic students should apply through Ontario Colleges
International Students
Visit the How to Apply page for more information on how and when to apply.
International students should apply through the George Brown College Online Application System.
Contact Us
School of Computer Technology
Phone: 416-415-5000, ext. 4287
Email: computertechnology@georgebrown.ca
The office hours are:
Monday – Thursday: 8 a.m. – 7 p.m.
Friday: 8 a.m. – 4 p.m.
Program coordinator: Jeffrey Lubetsky
Phone: 416-415-5000, ext. 3796
Email: Jeffrey.Lubetsky@georgebrown.ca
For more information about George Brown College, you may also call the Contact Centre at 416-415-2000 (TTY 1-877-515-5559) or long distance 1-800-265-2002.
Contact one of our international recruitment representatives specializing by country of origin by either booking a virtual meeting or submitting an inquiry. For more information visit the International Contact Us page
Visit Our Campus
The Cyber Security program is offered through our School of Computer Technology from our Casa Loma Campus at 146 Kendal Avenue in Toronto. Sign up for an Information Session or Campus Tour to learn more about George Brown College and the program. You can also explore our virtual tour.