Applying as a Canadian applicant
Domestic students should apply online or by phone at 1-888-892-2228.
Applying as an International applicant
Campus tours
Campus tours are one of the best ways to experience Conestoga. During this time, we are offering online guided tours to show you all Conestoga has to offer.
Book your tourVirtual tours
If you can't make an on-campus tour or attend one of our events, the virtual tour is a great way to visit us.
View our Virtual tourCourses - May 2025
Level 1
Course details
Conestoga 101
CON0101
- Hours: 1
- Credits: 0
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Windows Infrastructure and Security
INFO8461
This course will have the Students engaged at an enterprise level in the design and deployment of measures and countermeasures to secure Windows-based infrastructure, including local and networked resources. Industry standards will be explored and applied throughout this course. Students will gain practical experience by evaluating and synthesizing technology and tools based on organizational requirements. They will be able to manage risk by identifying vulnerabilities and mitigating threats in Windows network environments. All topics will be covered in the context of securing Windows Servers, Clients and supporting technology.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Linux Infrastructure and Security
INFO8471
This course will challenge students at an enterprise level by having them design and deploy measures and countermeasures to secure Linux network infrastructure, including local and remote resources. Industry standards will be explored and applied throughout this course. Students will gain practical experience by evaluating and synthesizing technology and tools based on organization requirements. They will be able to manage risk by identifying vulnerabilities and mitigating threats in Linux network environments. All topics will be covered in the context of securing Linux networks and supporting technology.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
IT Security Planning, Audit and Compliance
INFO8481
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Network Security I
INFO8491
Being the first of two advanced network security courses in this program, Network Security I will focus on understanding and securing networks and devices at an enterprise level. This includes using advanced methodologies for designing, building and securing heterogenous network environments. Students will also utilize current methods and tools necessary to integrate and secure public as well as private network spaces.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Fundamentals of Information Security
INFO8835
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Level 2
Course details
Career Management
CDEV8132
- Hours: 28
- Credits: 2
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: $10.55
Network Security II
INFO8501
- Hours: 56
- Credits: 4
- Pre-Requisites: INFO8490 OR INFO8491
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Fundamentals of Computer Forensics
INFO8845
Management of investigations of the state of IT systems is a key role for security professionals. It is critical that governance and analysis are conducted using ethical as well as legal methodologies. Topics for this course will include techniques for evidence collection and required controls thereof for looking at IT data and metadata from both active and inactive sources.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Virtualization and Cloud Security
INFO8855
- Hours: 56
- Credits: 4
- Pre-Requisites: INFO8460 OR INFO8461 AND INFO8470 OR INFO8471 AND INFO8490 OR INFO8491
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Wireless and Mobile Security
INFO8865
- Hours: 56
- Credits: 4
- Pre-Requisites: INFO8490 OR INFO8491
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Emerging Security Technologies
INFO8875
Data and cyber security change extremely rapidly, presenting a huge challenge to security professionals. In this course, students research the latest threats and attacks, as well as new and upcoming approaches and tools to secure resources. Topics may include malware, denial of service attack techniques, human security factors, data exfiltration approaches, etc. and will evolve over time to reflect current trends.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
- Estimated required text and/or learning resource costs: No cost.
Please note:
Estimated required text and/or learning resource costs are based on the most recent available data through the Conestoga Campus Store.
Program outcomes
- Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.
- Comply with security policies, standards, and regulations typical to an organization in the design and implementation of security solutions.
- Plan, implement, and evaluate security policies and strategies using project management principles to effectively respond to the needs of the organization’s information security requirements.
- Outline the processes and procedures involved in the maintenance and deployment of security solutions.
- Assess and test networked and virtualized IT systems with respect to security threats such as theft, damage, as well as alternation and/or interruption of services.
- Install, configure and troubleshoot system and network enhancements to promote security in an organization.
- Develop security strategies and processes for business communications that respond to the needs of all stakeholders.
- Evaluate the effectiveness of a security system through security audits to identify and correct security issues.
- Develop and deliver appropriate internal security documentation and training to ensure compliance with security policies.
- Communicate security protocols, policies, and audit results and related documentation to any level of the organization.