Graduate Certificate in Network Security

Fall 2022 Application Portal Update

The application portal will be open for Canadian/Permanent Residents for the following program until Tuesday, May 24th 2022:

Master of Information Security and Privacy

The application portal is now officially closed for international applicants for the following programs:

Master of Information Security and Privacy

Graduate Certificate in Network Security

Graduate Certificate in Data Privacy

The application portal is now officially closed for domestic applicants for the following programs:

Graduate Certificate in Network Security

Graduate Certificate in Data Privacy

Optimize your career with a 4-course Graduate Certificate

Strengthen your existing IT security skills with the Graduate Certificate in Network Security. The demand for cybersecurity professionals is growing exponentially across industries and will only continue to grow as technology rapidly advances. There is a significant need for people who can identify security threats, develop secure networks, and communicate insights to business leaders.

This graduate-level certificate is designed for working professionals like you. Whether you’re looking to specialize or bolster your career, our course-based curriculum incorporates theory, communication skills, best practices, and practical experiences that help you gain marketable skills and knowledge.

You will learn tools, practices, skills required in securing network infrastructure and learn the building blocks for network communication security through applied cryptography.

The laboratory course in Ethical Hacking provides an opportunity to gain practical experience in identifying potential vulnerabilities in existing network environments.

Why get a Certificate in Network Security?

Cybersecurity threats are a critical issue facing our digital infrastructure. The Graduate Certificate in Network Security will provide you with an opportunity to acquire state-of-the-art expertise in this important, high-demand area.

This program is designed to provide specific, relevant training in creating and maintaining secure computer networks to both professionals looking to upgrade their skills, and to recent graduates of an undergraduate program in computer science who want additional training to progress in their careers. This certificate will also benefit computer science professionals who wish to move into a role more oriented to network security.

By the end of the program, you will:

  • Gain foundational knowledge in network security and applied cryptography.
  • Build an organization’s network security infrastructure, and conduct penetration testing to identify potential vulnerabilities in an organization’s network infrastructure.
  • Recognize the limitations of technical security measures, and strategize and evaluate ways to address gaps, including non-technical solutions such as deployment of policies and programs.
  • Communicate system design and security assessment results to a technical audience who may not be security experts.
  • Decide on courses of action based on relevant legal and ethical considerations.

Certificate Courses

Students enrolled in the Network Security Certificate will complete all “required” courses, ISEC 621, 601 and 603, and ONE OF 2 “optional” courses, either ISEC 643 or 641, depending on their preference, for 4 courses or 12 credits total.

The basics of cryptographic algorithms and protocols including encryption and authentication algorithms and key establishment protocols. Security evaluation in computational and information theoretic settings, and attacks on cryptographic applications and systems.

Review of cryptographic algorithms and protocols used in network security. Network security protocols. Network security architecture. Web and Internet security. Wireless security. Approaches and tools for network intrusion detection and prevention. Traffic analysis and privacy enhancing systems. Applications of artificial intelligence and data analytics. Network system virtualization.

Offensive security, including technical and social methods. Legal and ethical frameworks as well as best practices. Automation and tool use, and defensive techniques.

Development of security policies. Policy compliance and enforcement. Policy considerations for social engineering and insider attacks. Information security standards. Security awareness and training programs. Privacy policies and compliance. Privacy Impact Assessment.

Information security strategy and its alignment with business goals. Business cases for information security investment. Legal and regulatory requirements. Roles and responsibilities in information security management. Security risk assessment and management.