Cybersecurity Training Program
Train to become a Cybersecurity Analyst, Security Hacker, or IT Security Specialist. Jumpstart your prep for leading IT security certifications. Get to work faster with this accelerated 12-month program. Currently available online.
Demand for Cybersecurity Professionals in Canada
*This program is currently available online*
Canada is facing a significant shortage of cyber security talent. A recent Deloitte study shows thousands of unfilled cybersecurity jobs in Canada, with demand increasing every year.
Network security threats are evolving faster than IT security teams can handle. Companies are struggling to find cybersecurity specialists trained in the latest defensive technologies.
This is the ideal time to begin cybersecurity training and launch your career.
Cybersecurity Training Program Overview
Herzing College Ottawa offers an accelerated 12-month Cybersecurity training program. This program is developed by industry experts and based on leading IT security certifications.
- 12-month diploma program (20 hours/week)
- Program is currently available online
- 5-week internship
- Includes 940 hours of practical cybersecurity training and 100 hours of internship
- Taught by industry experts with years of IT security experience
- Step-by-step help from our Career Development team to find and apply for cybersecurity jobs
- Multiple start-dates; enroll at any time
- Financial aid may be available to those who qualify (our Admissions team will help you apply)
IT Security Certifications
Herzing’s Cybersecurity training program includes skill development focused on helping students prepare for top IT security certifications and designations.
- Systems Security Certified Practitioner (SSCP)
- Certified Information Systems Security Professional (CISSP)
- Certified Cloud Security Professional (CCSP)
- Cyber Security Practitioner (CSXP)
Cybersecurity is one of the world’s fastest growing careers. There is very strong demand for cybersecurity specialists throughout Canada and across the globe, but not enough professionals to fill those roles.
- There are currently thousands of unfilled cybersecurity jobs in Canada (source: Deloitte)
- Experts estimate at least 1.8 unfilled cybersecurity positions worldwide by 2022 (source: csis.org)
Cybersecurity Job Options
Graduates of Herzing’s Cybersecurity training are qualified to pursue careers as:
- Security Analysts
- Security Hackers
- Ethical Hackers
- Cybersecurity Consultants
- Cybersecurity Specialists
Each Cybersecurity course features best practices and hands-on training (labs) in the latest cybersecurity tools and technologies.
In this program, you will learn:
- A complete overview of cybersecurity, including threats, attacks, vulnerabilities, incident response and recovery, and application security
- How to implement best practices in security for Windows systems
- Linux and Unix security tactics, including mitigating or eliminating common vulnerabilities, and system monitoring
- The fundamentals of network monitoring and best practices for securing VLANs
- Best practices and tools for web application security
- Cloud security tools and implementations
- Computer hacking and digital forensics
- Comprehensive tools and techniques for ethical hacking
- Numerous procedures and methods for disaster recovery and system restoration
Click below for detailed Cybersecurity course descriptions:
This course is an introduction to the field of cyber security. Students will be given an extensive overview of the various domains of cyber security. This course covers cyber security concepts and principles. Topics include security foundation concepts, threats, attacks and vulnerabilities, identity and access management, risk management, personal devices (BYOD), privilege management, privilege life cycle, cryptography, incident response and recovery, networks and communications, systems and application security and PKI.
Certification: Systems Security Certified Practitioner (SSCP)
This course is designed to provide an in-depth understanding of Windows systems and Active Directory domains. Students will learn, about operating system security in general, and Windows security in particular. Students also will learn to use PowerShell, Windows Management Instrumentation (WMI), command-line and graphical tools to analysis Windows systems. Topics include PowerShell command essentials, password management, user right assignments, system security settings, file and share permissions, registry permissions and settings, Windows logging and continuous monitoring for Windows.
This course provides in-depth coverage of Linux and Unix security issues that include specific configuration guidance and practical, real-world examples, tips, and technics. Students will learn, how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. Topics include Linux basics, command-line tools and scripting, file permissions, file integrity, services, users, groups and privilege management, patching and logging and monitoring.
Students who complete the course will understand how networks work and how they should be secured. Students will learn how to securely configure VLANs, how to determine perimeter firewall requirements, how to configure routers and various network devices. In addition, students are guided through industry best practices for using network mapping tools and vulnerability scanners to assist the organization in securing the network. Topics include VLAN, Nmap, routers and switches configuration security, firewall, wireless and vulnerability assessment.
This course provides the opportunity to study the pool of technologies that make modern web applications work and the tools which security practitioner can use to secure the applications. Students are aided to learn the technologies which make the web work, including HTML, HTTP, AJAX, web servers and databases. Students also will learn the resources available from the Open Web Application Security Project (OWASP), focusing on their Top 10 vulnerabilities list. Topics include secure development practices, OWASP Top 10 list, authentication, session handling, data handling and logging and monitoring.
This course provides comprehensive coverage of various cloud computing delivery models, security tools and implementations. It helps the students to advance their technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud. Topics include cloud concepts, cloud data security, cloud platform & infrastructure security, cloud application security, operations, legal and compliance.
Certification: Certified Cloud Security Professional (CCSP)
This course covers the development of various cyber security controls, implementations and security operations. Students will master various proven techniques and tools needed to design and implement the cyber security controls. Topics include implementing specified cybersecurity controls, cybersecurity procedure execution, documenting configuration changes, testing new controls, collecting event data, sending and receiving event data and verifying identities and credentials.
This course is designed to provide knowledge of key concepts and practices in digital forensic matters. Students will learn key forensic investigation scenarios and will be directed to apply the technics to acquire hands-on experience. Topics include computer forensics investigation process, understanding hard disks and file systems, defeating anti-forensics techniques, operating system forensics, network forensics and malware forensics.
This course provides the study of hacking tools and techniques used by hackers and information security practitioners. With a wide range of tools, techniques, and methodologies for ethical hacking, this course prepares you to conduct ethical hacking projects end to end. Topics include Introduction to ethical hacking, scanning networks, enumeration, system hacking, sniffing, denial-of-service, session hijacking, hacking wireless networks, and hacking mobile platforms.
Students who complete the course will know the disaster recovery requirements and tools used for various system restorations. This course ensures that students are exposed to several procedures and methods that help restore a network of responsibility to pre-disaster operation levels. Topics include disaster recovery and business continuity, cyber system restoration, backup site preparation and utilization, actualizing data backups and recovery, deficiency and error reporting, post-incident review.
What you need to get started.
- Minimum of a Canadian high school grade 12 or equivalent, or a mature student
- Pass an entrance test administrated by Herzing College
- Be interviewed in detail regarding interest in the field
- Note: admission to some programs may include additional requirements
SAMPLE SALARY RANGE:
$46,925 – $115,003
(Information Systems Analysts and Consultants)
12 Months (20 hours/week)
Includes 5-week internship
2019 Overall Technology Student Employment Rate
100% of available Herzing College Ottawa technology graduates were employed in a related field.
2019 Overall Graduate Employment Rate
94% of available Herzing College Ottawa graduates were employed in a related field.
*statistics based on most recent available
Your Next Steps
Ready to learn more about the Cybersecurity training program? It’s easy to get started. Choose from the following options:
- Fill out the form to ask questions via email
- Chat live with an Admissions Advisor to get your questions answered now
- Click Apply Now to get your application started today!
Why Choose this Program?
Herzing’s Cybersecurity training is fast, effective, and based on leading IT certifications. Here’s why Herzing should be your first choice:
- Accelerated 12-month program that gets you to work faster
- 5-week internship for real work experience
- Over 900 hours of hands-on cybersecurity training and labs
- Learn from IT security experts with years of professional experience
- Small class sizes where every student gets step-by-step support
- Enjoy the Herzing Open Education Program (HOEP), which lets you take additional courses after you graduate, tuition-free!*
- Amazing Career Development team, who helps create your resume, prepare for interviews, and apply for cybersecurity jobs
- Herzing has a 55-year track record of effective IT training
- Our grads get hired! In 2019, 94% of Herzing College Ottawa graduates were employed in a related field (based on most recent available data)*Some conditions apply