Graduate Certificate in Network Security

Fall 2022 Application Portal Update

The application portal is now closed for both Canadian/Permanent Residents and International Applicants for the following Information Security & Privacy Graduate Programs:

Master of Information Security and Privacy

Graduate Certificate in Network Security

Graduate Certificate in Data Privacy

We have now reached our maximum seating capacity and no exceptions will be made for late applications.


Optimize your career with a 4-course Graduate Certificate

Strengthen your existing IT security skills with the Graduate Certificate in Network Security. The demand for cybersecurity professionals is growing exponentially across industries and will only continue to grow as technology rapidly advances. There is a significant need for people who can identify security threats, develop secure networks, and communicate insights to business leaders.

This graduate-level certificate is designed for working professionals like you. Whether you’re looking to specialize or bolster your career, our course-based curriculum incorporates theory, communication skills, best practices, and practical experiences that help you gain marketable skills and knowledge.

You will learn tools, practices, skills required in securing network infrastructure and learn the building blocks for network communication security through applied cryptography.

The laboratory course in Ethical Hacking provides an opportunity to gain practical experience in identifying potential vulnerabilities in existing network environments.

Why get a Certificate in Network Security?

Cybersecurity threats are a critical issue facing our digital infrastructure. The Graduate Certificate in Network Security will provide you with an opportunity to acquire state-of-the-art expertise in this important, high-demand area.

This program is designed to provide specific, relevant training in creating and maintaining secure computer networks to both professionals looking to upgrade their skills, and to recent graduates of an undergraduate program in computer science who want additional training to progress in their careers. This certificate will also benefit computer science professionals who wish to move into a role more oriented to network security.

By the end of the program, you will:

  • Gain foundational knowledge in network security and applied cryptography.
  • Build an organization’s network security infrastructure, and conduct penetration testing to identify potential vulnerabilities in an organization’s network infrastructure.
  • Recognize the limitations of technical security measures, and strategize and evaluate ways to address gaps, including non-technical solutions such as deployment of policies and programs.
  • Communicate system design and security assessment results to a technical audience who may not be security experts.
  • Decide on courses of action based on relevant legal and ethical considerations.

NOTE:

Once you have initiated your application, be sure to choose " Network Security - Certificate " from the list of programs offered.

To be considered for admission to the certificate program in data science and analytics, you must meet the requirements outlined in the Academic Calendar.

In case of discrepancies between this page and the Academic Calendar, the Academic Calendar shall prevail. The minimum requirements are the same for all three credentials in the Information Security and Privacy graduate program, as such we recommend that students apply to the highest credential they are interested in.

Tuition information can be found here.

The expected completion time for full-time for the graduate certificates is 8 months, the maximum time allowed is three years.

Certificate Courses

Students enrolled in the Network Security Certificate will complete all “required” courses, ISEC 621, 601 and 603, and ONE OF 4 “optional” courses, either ISEC 643, 641, 645, or 651 depending on their preference, for 4 courses or 12 credits total.

The basics of cryptographic algorithms and protocols including encryption and authentication algorithms and key establishment protocols. Security evaluation in computational and information theoretic settings, and attacks on cryptographic applications and systems.

Review of cryptographic algorithms and protocols used in network security. Network security protocols. Network security architecture. Web and Internet security. Wireless security. Approaches and tools for network intrusion detection and prevention. Traffic analysis and privacy enhancing systems. Applications of artificial intelligence and data analytics. Network system virtualization.

Offensive security, including technical and social methods. Legal and ethical frameworks as well as best practices. Automation and tool use, and defensive techniques.

Information security strategy and its alignment with business goals. Business cases for information security investment. Legal and regulatory requirements. Roles and responsibilities in information security management. Security risk assessment and management.

Development of security policies. Policy compliance and enforcement. Policy considerations for social engineering and insider attacks. Information security standards. Security awareness and training programs. Privacy policies and compliance. Privacy Impact Assessment.

Design and implementation of process for identifying, analyzing and responding to information security incidents. Computer forensics. Organization and management of the incident response and forensics team. Tools and best practices.

Advanced topics in information security and privacy.