Learn about a variety of potential paths for newcomers trying to break into the field.
Train on the latest tools and techniques in security monitoring, ethical hacking, disaster recovery, and digital forensics. Prepare for leading IT security certifications.
What’s Your Role as a Cybersecurity Professional?
Cybersecurity professionals focus on identifying threats and developing defensive strategies to protect information systems against malicious attacks.
Their typical tasks include:
- Uncovering possible vulnerabilities and risks
- Quickly identifying when a system is under attack
- Defining security requirements for workstations, servers, networks, and mobile devices
- Configuring firewalls and anti-virus software
- Establishing disaster recovery protocols
- Training users on best practices in cybersecurity
Herzing College Online Cybersecurity Training
Herzing’s unique online cybersecurity training is convenient, fast, and focused on real-world skills.
- Taught by industry experts with extensive IT security experience
- Based on globally recognized IT security certifications
- Support to find and apply for cybersecurity jobs
- Flexible scheduling and online learning format for maximum convenience
- Continuously updated course content, reviewed by an expert curriculum committee
- Frequent program start dates
- Financial assistance may be available for students who qualify
Prep for IT Security Certifications
Students in Herzing’s online cybersecurity training complete the educational component required for four leading IT security certifications:
- Systems Security Certified Practitioner (SSCP)
- Certified Information Systems Security Professional (CISSP)
- Certified Cloud Security Professional (CCSP)
- Cybersecurity Practitioner (CSX-P)
Note: You will also need one to five years of relevant work experience to become fully certified.
A Quality Online Learning Experience
Herzing offers everything you need to succeed in your online education.
- Easily connect with experienced and knowledgeable instructors whenever you need support
- Programs include three hours of live sessions each week for real-time learning and interaction
- Dedicated academic and technical support
Career Outlook
Cybersecurity is one of the fastest growing areas of IT. Throughout Canada and around the world, there is enormous demand for skilled pros who can safeguard digital information.
Successful graduates of our Cybersecurity training are qualified to pursue careers as:
- Cybersecurity Specialists
- Security Analysts
- Ethical Hackers
- Security Hackers
- Cybersecurity Consultants
Study Topics
Herzing’s online Cybersecurity training covers the tools, technologies, and tactics you need to start a career in IT security.
You will learn:
- A complete overview of the latest cybersecurity threats, attacks, and vulnerabilities
- Best practices in security and risk mitigation for Windows, Linux, and Unix
- The fundamentals of network monitoring and best practices for securing VLANs
- Best practices and tools for web application security
- Cloud security tools and implementation
- Tools and techniques for ethical hacking and digital forensic investigation
- Disaster recovery and system restoration procedures
Click below for detailed course descriptions.
This course is an introduction to the field of cybersecurity. Students will be given an introductory overview of the various domains, concepts, and principles of cybersecurity. Topics include security foundation concepts, threats, attacks and vulnerabilities, identity and access management, risk management, personal devices (BYOD), incident response and recovery, networks and communications, systems and application security.
This course is designed to provide an understanding of Windows systems and Active Directory domains. Students will become familiar with operating system security in general, and Windows security in particular. Students also will learn to use PowerShell, Windows Management Instrumentation (WMI), command-line and graphical tools to analyze Windows systems. Topics include PowerShell command essentials, password management, user right assignments, system security settings, file and share permissions, registry permissions and settings, Windows logging and continuous monitoring for Windows.
This course explores Linux and Unix security issues that include specific configuration guidance and practical, real-world examples, tips, and techniques. Students will learn how to mitigate or eliminate general problems that apply to Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. Topics include Linux basics, command-line tools and scripting, file permissions, file integrity, groups and privileges, patching, logging, and monitoring.
Students who complete the course will understand how networks work and generally how they should be secured. Students will learn how to securely configure VLANs, how to determine perimeter firewall requirements, how to configure routers and various network devices. In addition, students are guided through industry best practices for using network mapping tools and vulnerability scanners to assist the organization in securing the network. Topics include VLAN, Nmap, routers and switches confirm security, firewall, wireless and vulnerability assessment.
This course provides the opportunity to study the pool of technologies that make modern web applications work and the tools with which security practitioners can secure applications. Students are aided to learn the technologies which make the web work, including the basics of HTML, HTTP, AJAX, web servers and databases. Students also will learn the resources available from the Open Web Application Security Project (OWASP), focusing on their Top 10 vulnerabilities list. Topics include secure development practices, OWASP Top 10 list, authentication, session handling, data handling, logging and monitoring.
This course provides coverage of various cloud computing delivery models, security tools and implementations. It helps the students to advance their technical skills and knowledge to secure data, applications, and infrastructure in the cloud. Topics include cloud concepts, cloud data security, cloud platform & infrastructure security, cloud application security, Amazon Web Service (AWS), operations, legal issues, and compliance.
This course covers the use of various cybersecurity controls, implementations, and security operations. Students will be introduced to various proven techniques and tools needed to monitor and maintain the cybersecurity controls. Topics include monitoring specified cybersecurity controls, cybersecurity procedure execution, collecting event data, sending and receiving event data, and verifying identities and credentials.
This course is designed to provide an introduction of key concepts and procedures in digital forensic matters. Students will become familiar with key forensic investigation scenarios and will be directed to apply the techniques to acquire hands-on experience. Topics include the computer forensics investigation process, understanding file systems, operating system forensics, network forensics, and malware forensics.
This course introduces hacking tools and techniques used by hackers and information security practitioners. Introduction to the tools, techniques, and methodologies for penetration testing. Topics include introduction to penetration testing, scanning networks, enumeration, system testing, sniffing, denial-of-service, session hijacking, social engineering, scanning wireless networks and mobile platforms.
Students who complete the course will know the disaster recovery options and procedures used for various system restorations. This course ensures that students are exposed to several procedures and methods that help secure a network. Topics include disaster recovery and business continuity, cyber system restoration, backup site preparation and utilization, deficiency and error reporting.
This course deals with the development of the student’s career path including internship preparedness and employment acquisition skills. Students prepare to conduct a successful campaign to secure employment through the selection process and to be successful in their career. Topics covered include resume formats, cover and thank you letter preparation, as well as the development of proper skills for job interviews.
Instructors
Atif Latif
Instructor, Cybersecurity
Hamza Serradj
Instructor, Technology
Maqbool Azam
Instructor, Computer Networking Technology / Cybersecurity
Admission Requirements
What you need to get started.
- Have a minimum of a Canadian provincial high school diploma or equivalent, or be a mature student
- Pass an entrance test administered by Herzing College
- Be interviewed in detail regarding interest in the field
- Note: admission to some programs may include additional requirements
Specific admission requirements for programs delivered through Herzing College Montreal:
- Regulation respecting the French knowledge requirements for the issue of an Attestation of College Studies Charter of the French language (chapter C-11, s. 88.0.18, 2nd par.).
- 1. The French knowledge requirements that a student must meet in order to be issued an Attestation of College Studies in accordance with section 88.0.18 of the Charter of the French language (chapter C-11) correspond, on the Échelle québécoise des niveaux de compétence en français,
- 2. The student shows that the French knowledge requirements provided for in section 1 are met by providing to the college-level educational institution a valid certificate of the results of a standardized test that reports those results.
Not all programs or learning formats available at all campus locations.
A Cybersecurity Specialist program is registered at and delivered by Herzing College Toronto. Please click for information on program tuition and fees.
A Cybersecurity Specialist program is registered at and delivered by Herzing College Ottawa.
A Cybersecurity program is registered at and delivered by Herzing College Winnipeg.
A Cybersecurity (LEA.EG) A.C.S. is registered at and delivered by Herzing College Montreal. This program leads to an Attestation of Collegial Studies (ACS) recognized by the Ministère de l’Enseignement supérieur (MES).
Herzing College Montreal is a post-secondary institution recognized by the Ministry of Education and Higher Learning (permit number 749758) and a secondary vocational studies institution (permit number 534501).



