Get comprehensive training in network installation and administration along with security controls, ethical hacking, incident response, and disaster recovery. Eight weeks of hands-on work experience included.
What’s the Advantage of a Combined Cybersecurity and Network Systems Program?
Cybersecurity professionals protect digital assets from threats, while network specialists design, manage, and troubleshoot the infrastructure those assets rely on. The two disciplines are deeply interconnected—after all, cybersecurity is fundamentally about securing networks.
By learning the tools and techniques of both cybersecurity and networking, you get a more complete understanding of how data flows, where vulnerabilities lie, and how to build defenses that are both effective and scalable. You’ll be able to not only detect and respond to threats, but also anticipate and prevent them through smart network design and configuration.
In short, you’ll be more attractive to employers and better equipped to adapt to evolving technologies.
Herzing College Cybersecurity and Network Systems Program
Our Cybersecurity and Network Systems program covers the full range of skills you need to build, protect, and maintain an organization’s network.
- 17-month program
- 8-week internship included
- Career support to land your first job after graduation
- Flexible scheduling and online learning format for maximum convenience
- Continuously updated course content, reviewed by an expert curriculum committee
- Frequent program start dates
- Financial assistance may be available for students who qualify
A Quality Online Learning Experience
Herzing offers everything you need to succeed in your online education.
- Easily connect with experienced and knowledgeable instructors whenever you need support
- Programs include three hours of live sessions each week for real-time learning and interaction
- Dedicated academic and technical support
Career Outlook
Graduates of this program are qualified for entry-level IT positions. Once they get their foot in the door, they can work their way up to a cybersecurity role. Job titles they may pursue include:
- Technical support specialist
- Security operations analyst
- Network security analyst
- Security systems analyst
- Network operations analyst
Potential employers include:
- IT firms
- Government agencies
- Financial services firms
- Healthcare organizations
- Utilities and energy companies
- Retailers
- Manufacturing and transportation companies
Study Topics
In this program, you will learn how to:
- Identify insecurely configured VLANs, determine firewall requirements, and assess network routers
- Configure secure Windows systems
- Identify common security issues in Unix-like operating systems
- Evaluate the security of web applications
- Design, manage, and secure data, applications, and infrastructure in a cloud environment
- Implement cybersecurity controls
- Conduct ethical hacking
- Restore networks to an operational state
Click below for detailed course descriptions.
This course provides training in network design and technologies, framed within the context of the Open Systems Interconnection (OSI) model. The curriculum spans an array of key areas such as network fundamentals, TCP/IP utilities, network operating systems, and remote access configuration protocols. Additionally, the course incorporates essential topics of network administration, fault tolerance, disaster recovery, and troubleshooting procedures.
Learners are introduced to crucial security concepts, security policies, risk identification, activity monitoring, intrusion detection, and cryptography standards. By navigating these areas, students are prepared for roles that require both network management and robust security measures.
This course covers the design, implementation, and administration of a Windows network infrastructure. Central to the curriculum are key topics such as the installation, configuration, management, monitoring, and troubleshooting of Domain Name System (DNS) and network protocols.
Focused on both theoretical understanding and practical skills, the course addresses diverse aspects such as network security, remote access management, and routing protocols. It provides students with the expertise needed for configuring Dynamic Host Configuration Protocol (DHCP) servers and clients, monitoring and troubleshooting network connections, and understanding TCP/IP intricacies.
This course offers an exploration of Active Directory Infrastructure integrated with Azure, emphasizing the practical skills needed for installation, configuration, and troubleshooting of both Active Directory and DNS services. Particular attention is given to the management and optimization of directory components, change and configuration management, and associated DNS settings vital for Active Directory functionality.
The course covers a wide range of topics, from basic understanding of cloud concepts to advanced Azure services, coupled with detailed modules on security, privacy, and compliance.
This course offers a rigorous examination of Linux as a robust, multi-user operating system. Beyond theoretical understanding, the course incorporates a series of hands-on practical sessions. These activities cover an expansive range of topics, from mastering Linux command-line tools, managing files, and configuring hardware to advanced system administration tasks such as network configurations and local security measures.
This course offers an in-depth exploration into the intricacies of evaluating, planning, migrating, deploying, and managing Microsoft 365 services. It equips participants with the expertise to craft and implement Microsoft 365 solutions, focusing on the nuanced aspects of user identity, roles, and authentication procedures. Topics include managing access controls, ensuring robust security measures, and planning for Office 365 workloads and applications.
This is an advanced course designed to delve into the intricacies of network security and the measures needed to protect network perimeters. The course curriculum emphasizes the identification of insecurely configured VLANs, determination of firewall requirements, assessment of network routers, exploration of wireless networking and corresponding best practices, and study of the optimal usage of network mapping tools like Nmap and vulnerability scanners.
Students learn how to participate in network security assessments, develop network security policies, standards, and procedures in alignment with an organization’s security requirements, and evaluate these for possible improvement. They also acquire the skillset to design and implement a secure network in adherence to company security policies, and the ability to collaborate with various security, risk, and compliance teams to maintain a secure network.
This course introduces learners to the key aspects of securing Windows operating systems and the associated Active Directory domains. It provides an in-depth look at the design, configuration, and implementation of secure Windows systems, from understanding the components of a security baseline to the effective application of Windows Management Instrumentation (WMI), command-line, and graphical tools.
Learners will also become familiar with user and rights management, file, registry, and share permissions, and the ongoing monitoring of Windows domains and systems. Furthermore, the course delves into the features of Windows PowerShell, with emphasis on writing and editing scripts for task automation.
Participants will be guided on how to develop Windows Security Policies, Standards, and Procedures based on specific company security requirements. They will also learn to design and implement secure Windows systems and construct a comprehensive security baseline for assessing all systems within a Windows domain.
This course addresses widespread problems across all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and prevalent Linux and Unix applications.
Students will gain a thorough understanding of how Linux systems and other Unix variants function, along with acquiring the knowledge necessary for the design, configuration, and implementation of these systems. Furthermore, students will gain insights into the construction of a security baseline and will learn to create reusable tools and scripts for assessing a variety of Linux/Unix systems.
Students will learn to establish Linux/Unix security policies, standards, and procedures, tailored to fit specific organizational security requirements. They will be equipped to design and implement Linux/Unix systems with essential security configurations, manage users, groups, permissions, and ownership, and handle storage, files, and directories within a Linux/Unix environment. Additionally, they will learn to plan and perform a Linux installation, manage kernel modules, boot processes, system components, devices, networking, packages, and software, and write various scripts.
This course looks at the technologies behind modern web applications and the strategies needed to secure them. Participants delve into the inner workings of the web, mastering the intricacies of HTML, HTTP, AJAX, web servers, and databases. The course also equips students with a deep understanding of the resources provided by the Open Web Application Security Project (OWASP), with a special focus on their Top 10 vulnerabilities list.
Students learn how to design and document web application security requirements based on company policies, participate in company-wide web application security assessments, review security policies, standards, and procedures, and perform comprehensive web application testing.
This course covers various cloud computing delivery models, specialized security tools, and innovative implementation strategies. Participants learn to meticulously design, manage, and secure data, applications, and infrastructure within the increasingly cloud-centric world of IT. Topics include cloud data security, platform and infrastructure security, application security, operations, and crucial legal and compliance considerations.
This course covers the design and implementation of diverse cybersecurity controls and operations. Topics include the implementation of specified cybersecurity controls, cybersecurity procedure execution, documentation of configuration changes, testing of new controls, collection and exchange of event data, and the verification of identities and credentials.
This course provides an opportunity for the student to apply the techniques and processes for developing a career path and to learn lifetime career management tools and skills. Topics include career planning, job searching, developing career search documents, refining interview skills, and preparing for a new position.
Often seen as a counter-intuitive approach to cybersecurity, ethical hacking is the act of legally infiltrating a network to expose security risks, utilizing various techniques such as footprinting, scanning, and system hacking. This course offers an in-depth exploration of a wide range of tools, techniques, and methodologies essential to the practice of ethical hacking. Topics include network scanning, system hacking, sniffing, denial-of-service attacks, and session hijacking.
This course gives students an understanding of the key concepts and practices in digital forensics. Topics include the computer forensics investigation process, understanding hard disks and file systems, overcoming anti-forensics techniques, operating system forensics, network forensics, and malware forensics.
This course focuses on restoring IT systems and data following disruptive events. It prepares learners to design, implement, and test disaster recovery processes that ensure the rapid resumption of essential IT services. Emphasis is placed on the creation and execution of a Disaster Recovery Plan (DRP), which outlines recovery strategies, system restoration procedures, and mechanisms for maintaining data integrity.
The internship component of the program is the practical application of a student’s knowledge and skills in an industry environment. The industry shall be directly related to the students’ program of study. The internship requires full-time day attendance working in the industry setting.
Admission Requirements
What you need to get started.
- Have a minimum of a Canadian provincial high school diploma or equivalent, or be a mature student
- Pass an entrance test administered by Herzing College
- Be interviewed in detail regarding interest in the field
- Note: admission to some programs may include additional requirements
Not all programs or learning formats available at all campus locations.
The Cybersecurity and Network Systems program is registered at and delivered by Herzing College Winnipeg.


