Information Technology Network Security

Select start date and campus

Close

Applying as a Canadian applicant

Domestic students should apply online or by phone at 1-888-892-2228.

Applying as an International applicant

International students should apply online.
Close

Campus tours

Campus tours are one of the best ways to experience Conestoga. During this time, we are offering online guided tours to show you all Conestoga has to offer.

Book your tour

Virtual tours

If you can't make an on-campus tour or attend one of our events, the virtual tour is a great way to visit us.

View our Virtual tour

Courses - May 2025

Level 1

Course details

Conestoga 101
CON0101

Description: This self-directed course focuses on introducing new students to the supports, services, and opportunities available at Conestoga College. By the end of this course, students will understand the academic expectations of the Conestoga learning environment, as well as the supports available to ensure their academic success. Students will also be able to identify on-campus services that support their health and wellness, and explore ways to get actively involved in the Conestoga community through co-curricular learning opportunities.
  • Hours: 1
  • Credits: 0
  • Pre-Requisites:
  • CoRequisites:

Windows Infrastructure and Security
INFO8461

Description:

This course will have the Students engaged at an enterprise level in the design and deployment of measures and countermeasures to secure Windows-based infrastructure, including local and networked resources. Industry standards will be explored and applied throughout this course. Students will gain practical experience by evaluating and synthesizing technology and tools based on organizational requirements. They will be able to manage risk by identifying vulnerabilities and mitigating threats in Windows network environments. All topics will be covered in the context of securing Windows Servers, Clients and supporting technology.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Linux Infrastructure and Security
INFO8471

Description:

This course will challenge students at an enterprise level by having them design and deploy measures and countermeasures to secure Linux network infrastructure, including local and remote resources. Industry standards will be explored and applied throughout this course. Students will gain practical experience by evaluating and synthesizing technology and tools based on organization requirements. They will be able to manage risk by identifying vulnerabilities and mitigating threats in Linux network environments. All topics will be covered in the context of securing Linux networks and supporting technology.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

IT Security Planning, Audit and Compliance
INFO8481

Description: This course will cover the principles of security planning, audit, governance and controls in the context of IT systems. Topics in this course will reinforce the importance of planning and auditing for compliance to industry and organization standards using best practice methodologies. Supporting monitoring, management, and logging tools will also be covered.
  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Network Security I
INFO8491

Description:

Being the first of two advanced network security courses in this program, Network Security I will focus on understanding and securing networks and devices at an enterprise level. This includes using advanced methodologies for designing, building and securing heterogenous network environments. Students will also utilize current methods and tools necessary to integrate and secure public as well as private network spaces.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Fundamentals of Information Security
INFO8835

Description: Information and cyber security covers a wide range topics and it is essential to have solid foundational knowledge to design and implement security solutions. This course will cover the three basic tenets that are at the foundation of modern information security practices: confidentiality, integrity, and availability. Topics will include the historical background of information security, encryption, data classification, malware and penetration testing to support the security of data, infrastructure and systems.
  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Level 2

Course details

Career Management
CDEV8132

Description: This course focuses on career management skills needed to navigate the evolving workplace. Students will evaluate their skills, attitudes, and expectations within their chosen careers and explore emerging trends in the workplace. Students will refine their networking strategies and create marketing documents to position them for success. Mock interviews will provide the opportunity for practice, feedback, and reflection as students prepare for future interviews. Students will explore communication strategies that support workplace success and advancement. By the end of this course, students will have created a personalized career management plan.
  • Hours: 28
  • Credits: 2
  • Pre-Requisites:
  • CoRequisites:

Network Security II
INFO8501

Description: Building from Network Security I this course will provide further coverage of more advanced network security topics, including firewalls, intrusion protection systems (IPS), network access controls (NAC), and other supporting technologies.
  • Hours: 56
  • Credits: 4
  • Pre-Requisites: INFO8490 OR INFO8491
  • CoRequisites:

Fundamentals of Computer Forensics
INFO8845

Description: Management of investigations of the state of IT systems is a key role for security professionals. It is critical that governance and analysis are conducted usig ethical as well as legal methodologies. Topics for this course will include techniques for evidence collection and required controls thereof for looking at IT data and metadata from both active and inactive sources.
  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Virtualization and Cloud Security
INFO8855

Description: With the increasing global adoption of virtual and cloud technologies, specific approaches are needed in responding to the security implications of these environments. Topics covered will include supply chain and data residency considerations, network implications of distributed infrastructure, and security risks and opportunities with virtual and cloud systems from Infrastructure-as-a-Service to Software-as-a-Service
  • Hours: 56
  • Credits: 4
  • Pre-Requisites: INFO8460 OR INFO8461 AND INFO8470 OR INFO8471 AND INFO8490 OR INFO8491
  • CoRequisites:

Wireless and Mobile Security
INFO8865

Description: With the rapid proliferation of wireless technology, the demand for wireless network capacity and attempted compromise of wireless resources presents and ever increasing challenge. This course will explore approaches to optimize and manage security in wireless technologies. Topics will include the design and implementation of wireless networks using security best practices, mobile device security and management, and the impact of “Internet of Things” to secure wireless infrastructure and data for an organization.
  • Hours: 56
  • Credits: 4
  • Pre-Requisites: INFO8490 OR INFO8491
  • CoRequisites:

Emerging Security Technologies
INFO8875

Description:

Data and cyber security change extremely rapidly, presenting a huge challenge to security professionals. In this course, students research the latest threats and attacks, as well as new and upcoming approaches and tools to secure resources. Topics may include malware, denial of service attack techniques, human security factors, data exfiltration approaches, etc. and will evolve over time to reflect current trends.

  • Hours: 56
  • Credits: 4
  • Pre-Requisites:
  • CoRequisites:

Program outcomes

  1. Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.
  2. Comply with security policies, standards, and regulations typical to an organization in the design and implementation of security solutions.
  3. Plan, implement, and evaluate security policies and strategies using project management principles to effectively respond to the needs of the organization’s information security requirements.
  4. Outline the processes and procedures involved in the maintenance and deployment of security solutions.
  5. Assess and test networked and virtualized IT systems with respect to security threats such as theft, damage, as well as alternation and/or interruption of services.
  6. Install, configure and troubleshoot system and network enhancements to promote security in an organization.
  7. Develop security strategies and processes for business communications that respond to the needs of all stakeholders.
  8. Evaluate the effectiveness of a security system through security audits to identify and correct security issues.
  9. Develop and deliver appropriate internal security documentation and training to ensure compliance with security policies.
  10. Communicate security protocols, policies, and audit results and related documentation to any level of the organization.