Applying as a Canadian applicant
Domestic students should apply online or by phone at 1-888-892-2228.
Applying as an International applicant
Campus tours
Campus tours are one of the best ways to experience Conestoga. During this time, we are offering online guided tours to show you all Conestoga has to offer.
Book your tourVirtual tours
If you can't make an on-campus tour or attend one of our events, the virtual tour is a great way to visit us.
View our Virtual tourCourses - May 2025
Level 1
Course details
Conestoga 101
CON0101
- Hours: 1
- Credits: 0
- Pre-Requisites:
- CoRequisites:
Windows Infrastructure and Security
INFO8461
This course will have the Students engaged at an enterprise level in the design and deployment of measures and countermeasures to secure Windows-based infrastructure, including local and networked resources. Industry standards will be explored and applied throughout this course. Students will gain practical experience by evaluating and synthesizing technology and tools based on organizational requirements. They will be able to manage risk by identifying vulnerabilities and mitigating threats in Windows network environments. All topics will be covered in the context of securing Windows Servers, Clients and supporting technology.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
Linux Infrastructure and Security
INFO8471
This course will challenge students at an enterprise level by having them design and deploy measures and countermeasures to secure Linux network infrastructure, including local and remote resources. Industry standards will be explored and applied throughout this course. Students will gain practical experience by evaluating and synthesizing technology and tools based on organization requirements. They will be able to manage risk by identifying vulnerabilities and mitigating threats in Linux network environments. All topics will be covered in the context of securing Linux networks and supporting technology.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
IT Security Planning, Audit and Compliance
INFO8481
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
Network Security I
INFO8491
Being the first of two advanced network security courses in this program, Network Security I will focus on understanding and securing networks and devices at an enterprise level. This includes using advanced methodologies for designing, building and securing heterogenous network environments. Students will also utilize current methods and tools necessary to integrate and secure public as well as private network spaces.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
Fundamentals of Information Security
INFO8835
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
Level 2
Course details
Career Management
CDEV8132
- Hours: 28
- Credits: 2
- Pre-Requisites:
- CoRequisites:
Network Security II
INFO8501
- Hours: 56
- Credits: 4
- Pre-Requisites: INFO8490 OR INFO8491
- CoRequisites:
Fundamentals of Computer Forensics
INFO8845
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
Virtualization and Cloud Security
INFO8855
- Hours: 56
- Credits: 4
- Pre-Requisites: INFO8460 OR INFO8461 AND INFO8470 OR INFO8471 AND INFO8490 OR INFO8491
- CoRequisites:
Wireless and Mobile Security
INFO8865
- Hours: 56
- Credits: 4
- Pre-Requisites: INFO8490 OR INFO8491
- CoRequisites:
Emerging Security Technologies
INFO8875
Data and cyber security change extremely rapidly, presenting a huge challenge to security professionals. In this course, students research the latest threats and attacks, as well as new and upcoming approaches and tools to secure resources. Topics may include malware, denial of service attack techniques, human security factors, data exfiltration approaches, etc. and will evolve over time to reflect current trends.
- Hours: 56
- Credits: 4
- Pre-Requisites:
- CoRequisites:
Program outcomes
- Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.
- Comply with security policies, standards, and regulations typical to an organization in the design and implementation of security solutions.
- Plan, implement, and evaluate security policies and strategies using project management principles to effectively respond to the needs of the organization’s information security requirements.
- Outline the processes and procedures involved in the maintenance and deployment of security solutions.
- Assess and test networked and virtualized IT systems with respect to security threats such as theft, damage, as well as alternation and/or interruption of services.
- Install, configure and troubleshoot system and network enhancements to promote security in an organization.
- Develop security strategies and processes for business communications that respond to the needs of all stakeholders.
- Evaluate the effectiveness of a security system through security audits to identify and correct security issues.
- Develop and deliver appropriate internal security documentation and training to ensure compliance with security policies.
- Communicate security protocols, policies, and audit results and related documentation to any level of the organization.