Learn about a variety of potential paths for newcomers trying to break into the field.
Cybersecurity (LEA.EG) A.C.S.
Learn in-demand skills in IT security monitoring, digital forensics, defensive technologies, and disaster recovery. Become fully prepared for a cybersecurity role in just 16 months.
This program leads to an Attestation of Collegial Studies (ACS) recognized by the Minister of Education and Higher Education of Quebec.
Herzing College Montreal is a post-secondary institution recognized by the Ministry of Education and Higher Learning (permit number 749758) and a secondary vocational studies institution (permit number 534501)
What Does a Cybersecurity Specialist Do?
Cybersecurity specialists keep information systems safe by identifying threats and developing defensive strategies.
Key responsibilities for this role include:
- Identifying potential risks and vulnerabilities
- Implementing measures to guard against threats
- Defining security requirements for servers, workstations, networks, and mobile devices
- Configuring firewalls and anti-virus systems
- Being alert to external intrusions, attacks, and hacks
- Developing disaster recovery procedures
- Training users on cybersecurity best practices
Herzing College Cybersecurity Program
Our cybersecurity training gets you ready for the IT security workforce. It provides more than 900 hours of hands-on training and includes an internship so you can graduate with actual work experience.
- 16-month OR 24-month diploma program
- Delivered online for maximum convenience
- 5-week (100-hour) internship included
- Taught by IT security experts with extensive industry experience
- Based on leading IT security certifications
- Multiple start dates; enrol at any time
- Financial aid may be available to those who qualify
IT Security Certifications
Our students complete the educational component needed for the following IT security certifications:
- Systems Security Certified Practitioner (SSCP)
- Certified Information Systems Security Professional (CISSP)
- Certified Cloud Security Professional (CCSP)
- Cyber Security Practitioner (CSXP)
Note: To qualify for certification, you will also need three to five years of relevant work experience.
Career Outlook
This is a hot field. Cybersecurity specialists are in huge demand throughout Quebec and across Canada.
Successful graduates of our cybersecurity training can pursue the following positions:
- Security analyst
- Cybersecurity specialist
- Ethical hacker
- Network security support specialist
Study Topics
The cybersecurity diploma program focuses on best practices in IT security, including a wide range of tools, technologies, and tactics.
You will learn:
- A complete overview of the latest cybersecurity threats, attacks, and vulnerabilities
- Best practices in security and risk mitigation for Windows, Linux, and Unix
- Fundamentals of network monitoring and best practices for securing VLANs
- Tools and tactics for web application security
- Cloud security tools and implementations
- Computer hacking and digital forensics
- Comprehensive tools and techniques for ethical hacking
- Numerous procedures and methods for disaster recovery and system restoration
Click below for detailed course descriptions:
This course is an introduction to the field of cybersecurity. Students will be given an introductory overview of the various domains, concepts, and principles of cybersecurity. Topics include security foundation concepts, threats, attacks and vulnerabilities, identity and access management, risk management, personal devices (BYOD), incident response and recovery, networks and communications, systems and application security.
This course is designed to provide an understanding of Windows systems and Active Directory domains. Students will become familiar with operating system security in general, and Windows security in particular. Students also will learn to use PowerShell, Windows Management Instrumentation (WMI), command-line and graphical tools to analyze Windows systems. Topics include PowerShell command essentials, password management, user right assignments, system security settings, file and share permissions, registry permissions and settings, Windows logging and continuous monitoring for Windows.
This course explores Linux and Unix security issues that include specific configuration guidance and practical, real-world examples, tips, and techniques. Students will learn how to mitigate or eliminate general problems that apply to Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. Topics include Linux basics, command-line tools and scripting, file permissions, file integrity, groups and privileges, patching, logging, and monitoring.
Students who complete the course will understand how networks work and generally how they should be secured. Students will learn how to securely configure VLANs, how to determine perimeter firewall requirements, how to configure routers and various network devices. In addition, students are guided through industry best practices for using network mapping tools and vulnerability scanners to assist the organization in securing the network. Topics include VLAN, Nmap, routers and switches confirm security, firewall, wireless and vulnerability assessment.
This course provides the opportunity to study the pool of technologies that make modern web applications work and the tools with which security practitioners can secure applications. Students are aided to learn the technologies which make the web work, including the basics of HTML, HTTP, AJAX, web servers and databases. Students also will learn the resources available from the Open Web Application Security Project (OWASP), focusing on their Top 10 vulnerabilities list. Topics include secure development practices, OWASP Top 10 list, authentication, session handling, data handling, logging and monitoring.
This course provides coverage of various cloud computing delivery models, security tools and implementations. It helps the students to advance their technical skills and knowledge to secure data, applications, and infrastructure in the cloud. Topics include cloud concepts, cloud data security, cloud platform & infrastructure security, cloud application security, Amazon Web Service (AWS), operations, legal issues, and compliance.
This course covers the use of various cybersecurity controls, implementations, and security operations. Students will be introduced to various proven techniques and tools needed to monitor and maintain the cybersecurity controls. Topics include monitoring specified cybersecurity controls, cybersecurity procedure execution, collecting event data, sending and receiving event data, and verifying identities and credentials.
This course is designed to provide an introduction of key concepts and procedures in digital forensic matters. Students will become familiar with key forensic investigation scenarios and will be directed to apply the techniques to acquire hands-on experience. Topics include the computer forensics investigation process, understanding file systems, operating system forensics, network forensics, and malware forensics.
This course introduces hacking tools and techniques used by hackers and information security practitioners. Introduction to the tools, techniques, and methodologies for penetration testing. Topics include introduction to penetration testing, scanning networks, enumeration, system testing, sniffing, denial-of-service, session hijacking, social engineering, scanning wireless networks and mobile platforms.
Students who complete the course will know the disaster recovery options and procedures used for various system restorations. This course ensures that students are exposed to several procedures and methods that help secure a network. Topics include disaster recovery and business continuity, cyber system restoration, backup site preparation and utilization, deficiency and error reporting.
Admission Requirements
What you need to get started.
- Quebec issued high school diploma or equivalent
- Minimum of two consecutive terms OR One school year interruption from full-time studies OR Minimum of one year post-secondary education
- Pass a general admissions entrance test
- Meet any additional program specific entrance requirements
HERZING COLLEGE MONTREAL
1616 Boulevard Rene-Levesque Ouest
Montreal, QC
H3H 1P8
Phone: (514) 935-7494
Fax: (514) 933-6182
Email: mtl-info@herzing.ca
Overview
INDUSTRY
Technology
PROGRAM LENGTH
16 months OR 24 months
Includes 5-week internship
LEARNING MODALITIES/
LANGUAGE
Online
English and French
Program Partners
Herzing College is a Fortinet Authorized Security Academy member
Fortinet is a global leader in cybersecurity, delivering a broad, integrated and automated security fabric to enable customers to accelerate their digital journey.
As an authorized security academy member, alumni and students of Herzing’s IT programs have access to Fortinet curriculum, which will prepare them to take Fortinet certification exams. Eligible students and alumni can take Fortinet courses free of charge and receive 1 voucher for a Fortinet exam ($400 value).
Click to view the Fortinet brochure and contact admissions for details. Some conditions apply.
Your Next Steps
Ready to learn more about the Cybersecurity Specialist training program? It’s easy to get started. Choose from the following options:
- Fill out the form to ask questions via email
- Chat live with an Admissions Advisor to get your questions answered now
- Click Request Info to get started today!
Why Choose This Program?
- Accelerated 12-month diploma program
- Delivered fully online
- Led by experienced IT security experts
- Over 900 hours of cybersecurity training and labs
- 5-week internship included
- Preparation for leading IT security certifications
- The Herzing Open Education Program (HOEP) lets you take additional IT courses after you graduate, tuition-free!
- Our career services team can help you create your resume, prepare for interviews, and apply for cybersecurity jobs
- Herzing has a 55+-year track record of effective IT training
- Our partnership with Fortinet gives you access to additional courses and certification