Program Overview
Program Details
Full Time Offerings
Full Time Offerings
Your Learning Experience
Through hands-on lab activities, case study analyses, and research projects, you’ll enhance your information security understanding and develop your interpersonal, communication, organizational, and problem-solving skills. This program will also include three co-operative education work placements to further enhance all of those skills.
You’ll begin by exploring foundational topics in our cyber security courses, including information security, ethics, network management/analysis, programming and scripting, operating systems, and database management. Building on those foundational topics, the curriculum will also develop your skills in the areas of risk analysis, cryptography, vulnerability testing, access control implementation, and security audit performance.
Upon completion of the program, you’ll be able to proactively implement critical infrastructure and sound security practices in any organization to mitigate cyber threats and respond quickly to security breaches on sensitive information.
Laptop Requirements
Laptops are used both in and outside the classroom to simulate the increasingly mobile nature of the business world. Click here for information about laptop requirements for this program.
Co-op Opportunities & Career Information
Co-op Opportunities
The Cyber Security program offers a cooperative education component, which provides students with the opportunity to gain invaluable first-hand work experience in their chosen field. Here are some co-op jobs that have kick-started the careers of some Cyber Security students before even graduating!
- Cyber Security Analyst - responsible for operating and monitoring security systems and events in order to enhance the ability to manage evolving cybersecurity threats
- Network and Security Technician - gain hands-on network and security experience while working with experienced network and security staff assisting in providing efficient and secure IT infrastructure.
- Cybersecurity Analyst - learn more about cybersecurity through participation in hands-on projects and programs for one of the leading sports and entertainment brands in North America.
For more information regarding co-op, please check out our co-op site or contact the Co-op Office at coop@fanshawec.ca to connect with a consultant.
Career Information
Graduates of Fanshawe’s Cyber Security program will gain the professional, research, assessment, analytical, and evaluation skills needed to excel in various jobs, including:
- information security analyst
- cybersecurity consultant
- education and training manager
- forensic analyst
- risk manager/analyst
- systems security analyst
- network operations centre analyst
- business continuity manager
- e-commerce manager
- information security manager
- network penetration specialist
- infosec consultant
Did you know Fanshawe consistently ranks high in graduate employment rates among large colleges in Ontario?
Here are some examples of career opportunities for graduates of Fanshawe’s Cyber Security program:
Cyber-Security Software Developer
Assist in the development of processes, procedures and policies for electronics and software resiliency in automotive applications.
Cyber and Forensic Specialist
Conduct forensic and information/cybersecurity investigations, incident response activities and management reporting.
Information Security Specialist
Mitigating and managing cybersecurity threats.
Program Progression
Fall intake
Year | Fall | Winter | Summer |
---|---|---|---|
Year 1 | Level 1 | Level 2 | Off |
Year 2 | Level 3 | Work term 1 | Level 4 |
Year 3 | Work term 2 | Level 5 | Work term 3 |
Year 4 | Level 6 | n/a | n/a |
Winter intake
Year | Fall | Winter | Summer |
---|---|---|---|
Year 1 | n/a | Level 1 | Level 2 |
Year 2 | Level 3 | Work term 1 | Level 4 |
Year 3 | Work term 2 | Level 5 | Work term 3 |
Year 4 | Level 6 | n/a | n/a |
This program is accredited by Co-operative Education and Work Integrated Learning Canada. This accreditation represents the highest standard of achievement for co-operative education programs in Canada, and recognizes Fanshawe's commitment to excellence.
Learning Outcomes
- Configure, implement, and manage security devices and equipment considering the unique features of the computer operating systems, networks, applications and software.
- Implement and evaluate security solutions for business processes, applications and communications to protect business resources and respond to the needs of all the internal stakeholders.
- Use project management principles to implement security strategies and processes that address the organization’s information security requirements.
- Develop, implement and evaluate organizational security policies, standards and regulations to promote internal security.
- Perform vulnerability assessments and penetration testing for infrastructures, web and applications, using both manual and automated techniques.
- Evaluate and apply tools and techniques to formulate countermeasures to secure information systems against security threats.
- Perform security audits and forensic analysis to evaluate the effectiveness of a security system, and identify and correct security vulnerabilities.
- Monitor and analyze logs and alerts from security devices to determine the extent of a security breach and what data has been compromised.
- Identify, collect, and log relevant data as evidence for an administrative inquiry or legal proceeding
Academic School
Program Coordinator:
Mansour Alqarni
Academic Advisor:
Cynthia Lessard
Admission Requirements
Competitive Programs
This is a competitive program; the number of qualified applicants exceeds the number of seats available. Please see www.fanshawec.ca/hcp for details. |
International Admission Equivalencies
English Language Requirements
English Language Requirements
Test | Score |
---|---|
TOEFL iBT | 79 |
IELTS Academic | Overall score of 6.0 with no score less than 5.5 in any of the four bands |
CAEL | Overall score of 60 with no score less than 50 in any of the four bands. score of 80 in listening |
PTE Academic | 53 |
Cambridge English | Overall score of 169 with no language skill less than 162 |
ESL4/GAP5 | Minimum grade of 80% in Level 8, 75% in Level 9, or 70% in Level 10 |
Duolingo | Overall score of 105, with no score lower than 95 |
Recommended Academic Preparation
Recommended Academic Preparation
• Grade 12 Business and Technological Communication (O)• Grade 11 and Grade 12 Computer Engineering Technology (M)
• Grade 11 Introduction to Computer Science (U)
• Grade 12 Computer Science (U)
• Grade 11 Information and Communication Technology: The Digital Environment (O)
• Grade 12 Information and Communication Technology: Multimedia Solutions (C)
• Academic and Career Entrance Certificate (ACE): Business or Technical Mathematics course and Computer Skills course
Applicant Selection Criteria
Applicant Selection Criteria
Where the number of eligible applicants exceeds the available spaces in the program, the Applicant Selection Criteria will be:- Preference for Permanent Residents of Ontario
- Receipt of Application by February 1st (After this date, Fanshawe College will consider applicants on a first-come, first-served basis until the program is full)
- Achievement in the Admission Requirements
Courses
Level 1 | ||||
Group 1 | ||||
INFO-1218 | Operating Syst Fundamentals for Security | 3 | ||
This course will introduce the student to the fundamentals common to operating systems. The system architecture of privilege ring levels to provide security protection of kernel level programs from user level operations will be discussed. How the OS handles hardware and software resources including program execution, interrupts and memory management for standard input and standard output operation will be examined. The basic implementation of both Windows and Linux operating systems will be presented with hands on activities. | ||||
INFO-1220 | Networking Fundamentals for Security | 5 | ||
This course provide students with a comprehensive overview of the concepts to build the foundations to implement secure practices on networks. The OSI and TCP/IP network communication models will be examined for network communication with special emphasis on Layers 2, 3 and 4. Students will examine the operation of networking devices and networking protocols and discuss the security issues of those protocols. | ||||
INFO-1279 | Programming Fundamentals for Security | 4 | ||
This course introduces the fundamental principles of procedural programming using the programming language C, with an emphasis on problem solving strategies. The course will introduce a variety of programming concepts and best practices for designing, implementing and deploying secure programs. | ||||
INFO-1222 | Database Fundamentals for Security | 3 | ||
This course introduces the student to the concept of relational databases. Using MySQL, emphasis will be placed on designing a database, while considering normalization. Students will learn how to maintain a database using basic SQL syntax, creating advanced queries and stored procedures. Steps will be introduced to secure a database. | ||||
PHIL-1019 | Ethics | 3 | ||
This course provides an overview of the nature of ethics by examining a wide range of issues that arise in the realm of cyber technology as well as other, broader social and ethical concerns that confront society today. Students will study traditional ethical theories, examine the foundations of a moral system, and learn how to formulate sound arguments in order to effectively debate moral issues. The course will also explore the nature of our moral obligations as members of our communities and profession. | ||||
SRTY-1021 | Cyber Security | 3 | ||
Cyber security is the protection of IT systems from damage or threats as well as disruption and misdirection of services. This course will provide students with an understanding of the main concepts and principles of cybersecurity including CIA (confidentiality, integrity and availability). Students will explore the common vulnerabilities in computer and network systems and understand current defenses. The methodology hackers use to exploit these systems will also be examined. |
Tuition Summary
London
*Total program costs are approximate, subject to change and do not include the health and dental plan fee, bus pass fee or program general expenses.