This 32-week diploma covers cybercrimes, malware, and information security fundamentals. Students will learn to assess security research methods, data and database security, and relational database concepts like SQL. The program focuses on risk management, governance, and creating security policies and procedures, alongside expertise in incident management, normalization, and addressing security issues to ensure effective protection.
Learn how to protect data, stop hackers, and defend networks. From ethical hacking to secure coding, you'll build skills that tech companies are actively hiring for.
Get proficient with MySQL, PHP, encryption protocols, and risk assessment tools used daily by cybersecurity professionals across the industry.
Cybersecurity is the defence of IT systems against attacks, damage, and service interruptions or misdirection. Students who complete this course will have a basic understanding of cybersecurity, including CIA (confidentiality, integrity, and availability). Students will investigate prevalent weaknesses in computer and network systems and comprehend the defences that are in place today. Also, the methods that hackers employ to take advantage of these systems will be looked at.
In order to complete a research project that tackles a particular cyber security issue, students will apply the theoretical and practical skills they have acquired during the curriculum. In order to create a project proposal that satisfies the demands of the market today, students will investigate current trends in cybersecurity research and use different parts of the research cycle.
The notion of relational databases is introduced to the student in this course. The focus will be on database design with a consideration for normalization using MySQL. We will go over how to secure a database.
Students who complete this course will have a solid foundation and understanding of information security principles, security infrastructure management, and the procedure for recording an organization’s security policies. The language, technology, and administration of information security programs are all covered. Students who successfully complete the course will be able to contribute to the creation of standards, protocols, and recommendations for putting the proper security policies into practice.
Information integrity and confidentiality are necessary for safe communication. The science of covert communications is covered in this course, It offers the foundational mathematical ideas needed for cryptography. The process of converting a message into code, encryption techniques, and decryption algorithms’ methods for recovering the original message are all covered in the course. Several viewpoints on cryptography are discussed, including non-repudiation, secrecy, authentication, and integrity. Good security is essential to the success of online shopping. To create safe networks, students in this course also gain knowledge of practical network security concerns. Students will be challenged by tools like cryptography, and other security strategies. The fundamentals of network security; potential security issues in networks, including elements of internet security and their fixes, will all be covered for students.
The purpose of this course is to provide students with an overview of the scripting languages used to implement websites. The student will learn the PHP and SQL, syntax and building blocks needed to develop secure websites and understand both server-side and client-side vulnerabilities, exploits and attacks.
The student acquires comprehensive information about attack vectors. Using an environment where these attacks can be performed as part of many practical scenarios. Specific attack methodology is discussed to find critical flaws in the target environment and demonstrate the business risk associated with those flaws.
This course introduces students to the study of crime and delinquency in the Canadian context. The research topics are: law making, elements of crime, crime statistics, correlations and theories of crime, special forms of crime and crime control strategies.
The focus of security is on the safeguards in place to protect businesses and their assets, but it is imperative to determine if the safeguards are working. This course focuses on the concepts of auditing, monitoring and information security in an IT environment.