Campus | Start Date | Tuition/Fees |
---|---|---|
Saint John | September 2025 (Blended Delivery) | Domestic | International |
Saint John | September 2025 (Blended Delivery) Advanced Placement Year 2 Entry | Domestic | International |
Security violations, data breaches, and privacy failures are an ever-growing threat to businesses and individuals. Through classroom theory and hands-on projects, you'll learn how to identify, analyze, and mitigate threats to internal IT systems and/or networks. You'll explore the systems, tools, and concepts used to minimize the risk to an organization's cyberspace, and the standards and procedures to protect the confidentiality, integrity, and availability of information and information systems. As one of the world's fastest growing technology fields, the demand for cyber security professionals has never been greater.
Advanced Placement
Students with a diploma or degree in Network Administration or equivalent, may qualify for advanced placement and direct entry into year two of the program. Click here for more details.
The requirements for this Graduate Diploma may be achieved within two years of full-time study.
Profile F
Cybersecurity and information security is an area with a shortage of skilled applicants, and industry demand is expected to continue to grow as cyber threats become more sophisticated.
As a graduate of the program, you are well prepared for positions in which you identify and document requirements, assess physical and technical security risks to data, software, and hardware, as well as help develop policies, procedures, and contingency plans to minimize the impacts of security breaches.
You may find work in a range of positions such as Cyber Security Analyst, Network Security Operator/Specialist, System Administrator, Cyber Security Incident Responder/Handler, Vulnerability Assessment Analyst, Penetration Tester, or Digital Forensics Analyst.
Students may be required by host agencies or employers to provide a current criminal records check and/or a reliability or secret clearance from a service recognized by the host agency or employer before they may start their work placement.
Technology Requirements
พรพรสำฦต is a connected learning environment. All programs require a minimum specification, including access to the internet and a laptop. Your computer should meet your program technology requirements to ensure the software required for your program operates effectively. Free wifi is provided on all campuses.
Courses are subject to change.
This course is the first of three networking courses. It introduces learners to the architecture, models, protocols, and networking elements that connect users, devices, applications, and data through the internet and across modern computer networks. Learners apply this knowledge to build simple local area networks (LANs) that integrate a router, a switch, end devices, IP addressing schemes, and foundational network security.
The course material is delivered in accordance with Cisco™ Certified Network Associate (CCNA) curriculum.
This course is the second of three networking courses. It builds upon the knowledge and skills acquired in Networks I by addressing the architecture, components, switching technologies, and router operations that support business grade networks. It introduces wireless local area networks (WLAN) as well as security concepts. Learners apply their knowledge to configure and troubleshoot routers and switches for advanced functionality using security best practices and resolve common issues with protocols in both IPv4 and IPv6 networks.
The course material is delivered in accordance with Cisco™ Certified Network Associate (CCNA) curriculum.
Prerequisites:
In this course, learners acquire the knowledge and skills to implement and maintain a Microsoft operating system in an enterprise environment. Through a combination of classroom lectures, demonstrations and lab work, they learn to install and configure a Windows Operating System (OS). Topics include: pre-installation and post-installation system settings, security features, system maintenance, network connectivity, plan for resiliency and fault tolerance, as well as application management.
Prerequisites:
In this course, learners acquire the knowledge and skills to implement a Windows Server directory service and related infrastructure components. Students learn to implement and configure Windows Server services, including Active Directory Domain Services, Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), printing, and remote access.
Prerequisites:
This course provides learners with the knowledge and skills to control and manipulate the operating system environment using a text-based interface.
Linux adoption continues to rise world-wide as individual users, government entities and industries ranging from automotive to space exploration embrace open-source technologies. This course covers the fundamentals of operating in a Linux-based operating system while in the command line environment.
This course builds upon the knowledge and skill acquired in Linux I.โฏ Here, learners develop knowledge and skills related to file systems and partitioning, logical volumes, Security Enhanced Linux (SELinux), firewalling, and troubleshooting.โฏ
Prerequisites:
This course provides an introduction to the meaning of community service. Students learn how community service can enhance a student’s educational experience, personal growth, employability, and civic responsibility. Students participate in one day of volunteering to enhance their understanding of civic responsibility and to help the New Brunswick Community College realize its vision of transforming lives and communities.
This course is designed to provide students with a fundamental understanding of security principles and practices as it relates to cybersecurity. Learners explore historical events, their impact on the evolution of the profession, and emerging trends in cybersecurity. In addition, learners will examine human and technical vulnerabilities in order to employ mitigation strategies and security defense techniques.
Prerequisites:
This course is designed to introduce learners to risk analysis and audit processes. Learners will learn how to perform a basic risk assessment and propose appropriate cybersecurity controls to mitigate identified threats all while navigating common legal and ethical concerns. With an emphasis on taking a hands-on approach, this course ensures that learners will gain a profound understanding of the risk assessment process and its application in real-world scenarios.
Prerequisites:
This course introduces learners to the knowledge and skills needed to secure an enterprise network.โฏStudents will explore the implementation of basic enterprise-grade network solutions as well as learning to use packet analysis to perform network security related tasks. Emphasis will be placed on understanding core network security concepts and the administration of an enterprise network.
Prerequisites:
This course provides learners with the knowledge and skills required to perform penetration testing in an enterprise environment. Learners will explore the methods of penetration testing using common tools while engaging in lectures and labs. Emphasis is placed on using skills and knowledge to exploit vulnerabilities by executing their own basic pen test.
Prerequisites:
This course provides learners with a basic understanding of incident response and computer forensics. Emphasis is placed on how to detect, classify, and handle security incidents by using an incident response process. Learners will explore forensic principles and processes, including evidence collection, artifacts, and analysis.
Prerequisites:
This course provides learners with knowledge and skills required to implement and manage encryption across a network environment. Learners will implement PKI infrastructure that is leveraged to encrypt for services such as remote management, web server access, full disk encryption, email, and smart card logon.
Prerequisites:
This course provides learners with in-depth knowledge of tools and techniques to maintain an organization’s security posture with cloud workloads. Learners will explore cloud security areas such identity and access, data and applications security, and security operations. Emphasis will be placed on the hands-on management of cloud workloads.
Prerequisites:
This course is designed to provide learners with the knowledge and skills to secure an enterprise network. Learners will explore various network security solutions/techniques and their role in securing modern networks.
Prerequisites:
This course is designed to provide learners with the skills required to deploy and manage endpoint security products. Learners will explore anti-malware, data loss prevention, and host intrusion detection and prevention software to mitigate risk.
Prerequisites:
This course is designed to provide learners with the knowledge and skills to work with a security information and event management (SIEM) product to detect malicious activities. Emphasis will be placed on the integration and analysis of vulnerability information, endpoint events, network events, and network traffic analysis.
Prerequisites:
This capstone gives learners the opportunity to perform attack and defense tactics within a gamified scenario. This ‘capture the flag’ style activity provides learners with real-world penetration testing experience. Learners will also leverage defensive tools and techniques to protect their network and critical assets from attack. A focus will be placed on ethical hacking/pentesting, vulnerability and risk management and reporting, continuous monitoring and response against motivated attackers, forensics, and hardening of network and host systems.
A safe and healthy workplace is the responsibility of the employer and the employee. This course introduces students to the importance of working safely and addresses how employers and employees can control the hazards and risks associated with the workplace. Students will also learn about the roles and responsibilities of key stakeholders including WorkSafeNB, the employer and the employee in ensuring workplaces are safe.
This course is designed to provide learners with an introductory knowledge of virtualization and cloud technologies. Emphasis is placed on providing learners with practical knowledge and skills to effectively manage and implement virtual environments.
In this course, learners acquire the knowledge and skills necessary to implement and deploy cloud services. This includes cloud compute, storage, and network services. Emphasis will be placed on the hands-on deployment and management of cloud services.
Prerequisites:
21220 - Cybersecurity specialists
21222 - Information systems specialists
22220 - Computer network and web technicians
Disclaimer: This web copy provides guidance to prospective students, applicants, current students, faculty and staff. Although advice is readily available on request, the responsibility for program selection ultimately rests with the student. พรพรสำฦต, admission requirements and other related information is subject to change.