A1 Global

Course Overview

This 32-week diploma covers cybercrimes, malware, and information security fundamentals. Students will learn to assess security research methods, data and database security, and relational database concepts like SQL. The program focuses on risk management, governance, and creating security policies and procedures, alongside expertise in incident management, normalization, and addressing security issues to ensure effective protection.

What You Will Learn

Admission Requirements
Career Options
Others
  • Information Systems Analyst – Computer Systems
  • Information Systems Business Analyst
  • Information Systems Contingency Planner
Real-World Cyber Skills

Learn how to protect data, stop hackers, and defend networks. From ethical hacking to secure coding, you'll build skills that tech companies are actively hiring for.

Industry-Relevant Curriculum

Get proficient with MySQL, PHP, encryption protocols, and risk assessment tools used daily by cybersecurity professionals across the industry.

program courses

Introduction to Cyber Security

Cybersecurity is the defence of IT systems against attacks, damage, and service interruptions or misdirection. Students who complete this course will have a basic understanding of cybersecurity, including CIA (confidentiality, integrity, and availability). Students will investigate prevalent weaknesses in computer and network systems and comprehend the defences that are in place today. Also, the methods that hackers employ to take advantage of these systems will be looked at.

Research for Security

In order to complete a research project that tackles a particular cyber security issue, students will apply the theoretical and practical skills they have acquired during the curriculum. In order to create a project proposal that satisfies the demands of the market today, students will investigate current trends in cybersecurity research and use different parts of the research cycle.

Database Fundamentals for Security

The notion of relational databases is introduced to the student in this course. The focus will be on database design with a consideration for normalization using MySQL. We will go over how to secure a database.

Information Security Principles and Policies

Students who complete this course will have a solid foundation and understanding of information security principles, security infrastructure management, and the procedure for recording an organization’s security policies. The language, technology, and administration of information security programs are all covered. Students who successfully complete the course will be able to contribute to the creation of standards, protocols, and recommendations for putting the proper security policies into practice.

Cryptography & Network Security

Information integrity and confidentiality are necessary for safe communication. The science of covert communications is covered in this course, It offers the foundational mathematical ideas needed for cryptography. The process of converting a message into code, encryption techniques, and decryption algorithms’ methods for recovering the original message are all covered in the course. Several viewpoints on cryptography are discussed, including non-repudiation, secrecy, authentication, and integrity. Good security is essential to the success of online shopping. To create safe networks, students in this course also gain knowledge of practical network security concerns. Students will be challenged by tools like cryptography, and other security strategies. The fundamentals of network security; potential security issues in networks, including elements of internet security and their fixes, will all be covered for students.

Scripting for Web Security

The purpose of this course is to provide students with an overview of the scripting languages used to implement websites. The student will learn the PHP and SQL, syntax and building blocks needed to develop secure websites and understand both server-side and client-side vulnerabilities, exploits and attacks.

Penetration Testing

The student acquires comprehensive information about attack vectors. Using an environment where these attacks can be performed as part of many practical scenarios. Specific attack methodology is discussed to find critical flaws in the target environment and demonstrate the business risk associated with those flaws.

Criminology

This course introduces students to the study of crime and delinquency in the Canadian context. The research topics are: law making, elements of crime, crime statistics, correlations and theories of crime, special forms of crime and crime control strategies.

Auditing and Security Controls

The focus of security is on the safeguards in place to protect businesses and their assets, but it is imperative to determine if the safeguards are working. This course focuses on the concepts of auditing, monitoring and information security in an IT environment.