Graduate Certificate in Cyber Security

Casa Loma

 

INTAKE: Jan, May & Sept

Program Overview

George Brown College, located in Casa Loma, Canada, offers a specialized Graduate Certificate in Cyber Security. This program is designed to equip students with the skills and knowledge required to excel in the field of cyber security. The program covers a wide range of topics, including network security, incident response, vulnerability assessment, and ethical hacking.

Overview:

The Graduate Certificate in Cyber Security is a postgraduate program offered by George Brown College. It is designed for individuals with a background in information technology, computer science, or related fields who want to specialize in cyber security. The program provides students with a comprehensive understanding of cyber threats, security measures, and hands-on experience with industry-standard tools and techniques.

Curriculum:

  1. Introduction to Cyber Security: This course provides an introduction to the field of cyber security, including common cyber threats, attack vectors, and defense mechanisms. Students learn about security policies, risk management, and the legal and ethical aspects of cyber security.

  2. Network Security: In this course, students study network security principles and techniques. They learn about network protocols, firewalls, intrusion detection and prevention systems, and virtual private networks (VPNs). Students gain practical experience in securing network infrastructure and detecting network-based attacks.

  3. Ethical Hacking: This course focuses on ethical hacking techniques used to identify vulnerabilities in computer systems. Students learn about penetration testing methodologies, tools, and techniques. They gain hands-on experience in conducting ethical hacking assessments and reporting findings.

  4. Security Operations and Incident Response: In this course, students explore security operations and incident response processes. They learn about security incident handling, threat intelligence, and incident response planning. Students gain practical skills in detecting, analyzing, and mitigating security incidents.

  5. Vulnerability Assessment and Management: This course covers vulnerability assessment techniques to identify and mitigate security weaknesses in computer systems. Students learn about vulnerability scanning tools, vulnerability assessment methodologies, and remediation strategies. They gain hands-on experience in conducting vulnerability assessments and providing recommendations for security improvements.

  6. Cyber Security Capstone Project: In this capstone project, students apply their knowledge and skills to a real-world cyber security scenario. They work in teams to analyze a security problem, design and implement appropriate security measures, and present their findings and recommendations.

Pollster Education

Location

Casa Loma

Pollster Education

Score

IELTS 6.5

Pollster Education

Tuition Fee

CAD 24150

Application Fees: CAD $110

Postgraduate Diploma:

  1. Educational Requirements: Students should have completed a bachelor's degree from a recognized Indian university with a minimum score of 55% or above.

  2. English Language Proficiency: International students must provide evidence of English proficiency by submitting scores of standardized tests such as IELTS, TOEFL, or Duolingo. The minimum required score for IELTS Academic is 6.5 overall, with no band below 6.0.

  3. Additional Requirements: Some programs may have additional requirements, such as relevant work experience, a portfolio, or an interview. Students are advised to check the program-specific requirements before applying.

Please note that meeting the minimum requirements does not guarantee admission, and admission decisions are made based on a holistic review of the application, including academic credentials, English language proficiency, and other factors such as relevant work experience and extracurricular activities.

Unfortunately, George Brown College, St. James does not offer any scholarships or financial aid to international students. However, students can explore external scholarship opportunities or funding options available through their home country's government or educational institutions.

Part-Time Jobs: International students are allowed to work part-time during their studies, which can help offset some of the living expenses. However, it is important to note that part-time jobs may not always be easy to come by, and students should not rely solely on part-time work to finance their studies.

Graduates of the Graduate Certificate in Cyber Security program have excellent career prospects in the rapidly growing field of cyber security.

  1. Cyber Security Analyst: Graduates can work as cyber security analysts, responsible for monitoring and analyzing security events, detecting and responding to security incidents, and implementing security controls to protect organizations from cyber threats.

  2. Security Operations Center (SOC) Analyst: Graduates can pursue careers as SOC analysts, working in a security operations center to monitor, analyze, and respond to security events and incidents. They perform real-time threat monitoring, incident triage, and incident response activities.

  3. Network Security Engineer: Graduates can work as network security engineers, responsible for designing and implementing secure network infrastructure, configuring firewalls and intrusion detection systems, and conducting network security assessments.

  4. Ethical Hacker or Penetration Tester: Graduates can work as ethical hackers or penetration testers, conducting authorized hacking assessments to identify vulnerabilities in computer systems and networks. They provide recommendations for security improvements based on their findings.

  5. Cyber Security Consultant: Graduates can work as cyber security consultants, providing expertise and guidance to organizations on cyber security strategies, risk management, and compliance with security standards and regulations.

  6. Incident Response Manager: Graduates can work as incident response managers, leading incident response teams and coordinating the detection, analysis, and remediation of security incidents. They develop incident response plans and protocols and ensure timely and effective incident handling.


Similar Courses
WhatsApp Enquiry Call Enquiry