fbpx

Diploma in Cyber Security
with Artificial Intelligence

Due to the increasing dependency on digitalization and Internet-of-Things (IoT), various security incidents have grown at an exponential rate in recent years, and the annual cost to the global economy from cybercrime is 400+ billion USD.

The concept of cyber security data science allows making the computing process more actionable and intelligent as compared to traditional ones in the domain of cyber security. This program provides a machine learning based multi-layered framework for the purpose of cyber security modeling. Overall, the goal is not only to discuss cyber security data science and relevant methods but also to focus the applicability on data-driven intelligent decision making for protecting the systems from growing cyber-attacks.

What to expect:

Mode of Delivery

Instructor-led classroom training, Online, Hybrid

Duration

45 weeks / 990 Hours

Tuition

Local $14,962 / Intl $18,862 CAD

Certification

Diploma

Intake

Bi-monthly

Admission Requirements

  • The student has an Ontario Secondary School Diploma or equivalent OR is 18 years of age or older on or before the program begins AND can pass a qualifying test (Wonderlic – 19) that has been approved by the Superintendent.

Program Curriculum:

  • CompTIA A+
  • CompTIA Network+
  • Installing and Configuring Windows Server
  • Shell Programming for UNIX System Administrators
  • Python for Data Science & for Ethical Hacking
  • CompTIA Security+
  • Blockchain, IoT, Machine Learning & AI for Cyber security Professionals
  • Certified Ethical Hacker
  • Certified Cloud Security Professional
  • Certified Information Systems Security Professional (CISSP)
  • ITIL – Information Technology Infrastructure Library
  • Personal Development & Effective Communication

Job Market Potential

Median Income:

$82K+ per annum through salary or contract based on experience, organization, location and duties involved.

Previous Education/Skills Required:

Prior exposure to IT is preferred.

Possible Job Titles:

Application Security Administrator, Artificial Intelligence Security Specialist, Chief Information Security Officer, Cloud Security Architect, Data Security Analyst, Information Assurance Analyst

To view the Bring Your Own Device Policy, please click here.

Fast Facts

Ontario’s labour market information can help you plan your career.

Job Outlook (2021-2025) Cybersecurity

The time is now to take action on your future!

Contact us today.
risk management
ai in cybersecurity
security teams
ai powered
sensitive information
machine learning
information security
national institute of standards
unauthorized access
standards and technology
cyber threats
cybersecurity professionals
admission requirements
data security
ai and machine learning
critical infrastructure
credit card
computer systems
risk management
ai in cybersecurity
security teams
ai powered
sensitive information
machine learning
information security
national institute of standards
unauthorized access
standards and technology
cyber threats
cybersecurity professionals
admission requirements
data security
ai and machine learning
critical infrastructure
credit card
computer systems
security operations
security solutions
amount of data
ransomware attacks
sensitive data
security officers
malicious software
ddos attack
data breach
artificial intelligence ai
iot devices
national security
real time
security strategy
mobile devices
deep learning
operating systems
cybersecurity field
cyber attacks
threat intelligence
cybersecurity jobs
network security
sensitive data
false positives
cloud security
data sets
neural networks
ai technologies
attack surface
endpoint security
information technology
malicious activities
time consuming
ai technologies
attack surface
endpoint security
information technology
malicious activities
time consuming
certification programs
specialist certifications
ai systems
computer network
cybersecurity framework
identity and access management
english language
post secondary
college and community social innovation fund
kind contributions
natural sciences and engineering research council
phishing emails
threat detection
application security
incident response
leveraging ai
volumes of data
security threat
threat actor
cybersecurity teams
security protects
threat actors
detect and respond
detection and response
machine learning algorithms
threat detection and responses
ai tools
generative ai
X