Applying as a Canadian applicant
Domestic students should apply online or by phone at 1-888-892-2228.
Applying as an International applicant
Campus tours
Campus tours are one of the best ways to experience Conestoga. During this time, we are offering online guided tours to show you all Conestoga has to offer.
Book your tourVirtual tours
If you can't make an on-campus tour or attend one of our events, the virtual tour is a great way to visit us.
View our Virtual tourCourses - May 2025
Level 1
Course details
Conestoga 101
CON0101
- Hours: 1
- Credits: 0
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Operating System Security Models
INFO8571
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: $210.15
Secure Network Administration
INFO8581
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Network Components and Monitoring
INFO8591
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Fundamentals of Cryptography
INFO8601
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Cyberlaw, Ethics and Privacy
INFO8621
An important component of application and organizational security is the understanding of the rights and obligations of both the individual and the organization with respect to privacy and intellectual property. In this course students will explore ethics and law, including both Canadian law and the law of other jurisdictions, for the ways ethics and law inform the best practices of security professionals and organizations. Students will learn to assess the implications of new application development as well as the choice of supporting technologies, such as cloud computing, with respect to both vulnerabilities and liabilities of an organization. Students in this course will discuss topics such as Big Data, organized hacking, government surveillance, and industrial espionage.
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Software Application Security I
PROG8271
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Level 2
Course details
Web and Wireless Security
INFO8561
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Information Security Management
INFO8611
Modern business organizations require the synthesis of many levels of security measures, including physical and network security, as well as the management of security practices. In this course, students explore management techniques as they are applied to corporate and organizational security. In addition to the basic techniques of IT management that include motivation, controlling and planning, students also study tools and skills for securing organizations, including risk and asset management, threat modeling, the development of security policies and procedures, auditing and employee training.
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Information Security Project
INFO8631
In this capstone course, students will use skills acquired throughout the program in order to develop an applied project or prepare a research paper that will be based on the fields of software development, networking or management from a security perspective. The project will synthesize knowledge, apply knowledge in a new way, or bring new knowledge to its field. Students will have the opportunity to research a topic or develop a project for a business client, or they can pursue a topic of their own choice.
- Hours: 84
- Credits: 6
- Pre-Requisites: INFO8570 OR INFO8571 AND PROG8270 OR PROG8271
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Enterprise Application Security
PROG8281
- Hours: 42
- Credits: 3
- Pre-Requisites: PROG8270 OR PROG8271
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Software Application Security II
PROG8291
- Hours: 42
- Credits: 3
- Pre-Requisites: PROG8270 OR PROG8271
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Malware and Hacking
PROG8301
- Hours: 42
- Credits: 3
- Pre-Requisites: PROG8270 OR PROG8271
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Level 1
Course details
Conestoga 101
CON0101
- Hours: 1
- Credits: 0
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Operating System Security Models
INFO8571
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: $210.15
Secure Network Administration
INFO8581
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Network Components and Monitoring
INFO8591
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Fundamentals of Cryptography
INFO8601
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Cyberlaw, Ethics and Privacy
INFO8621
An important component of application and organizational security is the understanding of the rights and obligations of both the individual and the organization with respect to privacy and intellectual property. In this course students will explore ethics and law, including both Canadian law and the law of other jurisdictions, for the ways ethics and law inform the best practices of security professionals and organizations. Students will learn to assess the implications of new application development as well as the choice of supporting technologies, such as cloud computing, with respect to both vulnerabilities and liabilities of an organization. Students in this course will discuss topics such as Big Data, organized hacking, government surveillance, and industrial espionage.
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Software Application Security I
PROG8271
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Level 2
Course details
Co-op and Career Preparation
CEPR8200
- Hours: 14
- Credits: 1
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Web and Wireless Security
INFO8561
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Information Security Management
INFO8611
Modern business organizations require the synthesis of many levels of security measures, including physical and network security, as well as the management of security practices. In this course, students explore management techniques as they are applied to corporate and organizational security. In addition to the basic techniques of IT management that include motivation, controlling and planning, students also study tools and skills for securing organizations, including risk and asset management, threat modeling, the development of security policies and procedures, auditing and employee training.
- Hours: 42
- Credits: 3
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Information Security Project
INFO8631
In this capstone course, students will use skills acquired throughout the program in order to develop an applied project or prepare a research paper that will be based on the fields of software development, networking or management from a security perspective. The project will synthesize knowledge, apply knowledge in a new way, or bring new knowledge to its field. Students will have the opportunity to research a topic or develop a project for a business client, or they can pursue a topic of their own choice.
- Hours: 84
- Credits: 6
- Pre-Requisites: INFO8570 OR INFO8571 AND PROG8270 OR PROG8271
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Enterprise Application Security
PROG8281
- Hours: 42
- Credits: 3
- Pre-Requisites: PROG8270 OR PROG8271
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Software Application Security II
PROG8291
- Hours: 42
- Credits: 3
- Pre-Requisites: PROG8270 OR PROG8271
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Malware and Hacking
PROG8301
- Hours: 42
- Credits: 3
- Pre-Requisites: PROG8270 OR PROG8271
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Level 3
Course details
Co-op Work Term (Computer Application Security)
COOP8110
- Hours: 420
- Credits: 14
- Pre-Requisites: CDEV8200 OR CEPR8200
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Please note:
Estimated required text and/or learning resource costs are based on the most recent available data through the Conestoga Campus Store.
Program outcomes
- Remediate vulnerabilities in software applications based on security threats assessment and testing.
- Design and develop security solutions for business processes and applications in order to protect business resources.
- Develop plans to incorporate security into the software development process and integrate emerging technologies safely into new software products or computer systems
- Develop policies and procedures that protect the property and privacy of the clients, owners, employees and other stakeholders of an organization
- Evaluate the effectiveness of a security system through security audits to identify and correct security issues.
- Develop and deliver appropriate security training to ensure compliance with security policies.
- Communicate security, protocols, policies and audit results and related documentation to any level of the organization.
- Develop asset management and risk management plans to protect the physical, and intellectual properties of an organization.