
Cybersecurity Essentials Analyst
Fast-Track Your Cybersecurity Career
Cybersecurity jobs are in high demand and this 12-week certificate program is your gateway to the field. Designed for beginners, this program builds the technical skills needed to protect networks, secure data and detect vulnerabilities.
Gain essential cybersecurity training in: Network security configuration and fundamentals, Shell scripting and automation, Python for cybersecurity, Penetration testing tools and Ethical hacking fundamentals.
By the end of the program, you’ll be ready to pursue entry-level roles and certifications in cybersecurity.
Courses
- Shell Scripting Foundations
- Lab Design and Automation
- Introduction to Python
- Tools for Pen-Testing
- Foundations for Ethical Hacking
Program Delivery Options
The certificate is delivered online either full or part time and will be delivered by an instructor. Both delivery options will total 285 hours of course time.
- Full time: Weekdays, 5 hours per day for 12 weeks
- Part time: Two evenings per week and Saturday mornings across 8 months

Related Careers
- Entry-level Cybersecurity Analyst
- Junior Security Operations Centre (SOC) Analyst
- Cybersecurity Consultant
- Junior Penetration Tester
- Cybersecurity Technician
Admission Requirements
We are looking for previous work experience in IT support, A+ Certification (or related educational credential which includes training in Hardware and Operating systems).
You will need to provide either a letter from an employer or prior learning certificate.
Note: a $400.00 deposit is required to reserve a seat
Technology Requirements
This course takes place entirely online. You will need your own personal computer/laptop with reliable wifi and permissions to download software or Cybersecurity tools.
Graduation Requirements
You must receive a minimum 65% average in all 5 courses.
Program Costs

Financial Aid Options
Student life can be very expensive, and few individuals have enough money to pay up-front for their post-secondary education.
Students enrolled in continuing education programs may qualify for program-dependent funding opportunities.
Courses
Shell Scripting Foundations
This hands-on course introduces IT professionals to the powerful world of two industry-standard tools: PowerShell and Bash. This course will include how to automate tasks, manage systems and boost your productivity with practical scripts. Using real-world examples and guided exercises, you'll gain the skills to create scripts for system administration, file manipulation, user management, task scheduling and more.
Lab Design and Automation
Learn to architect and deploy advanced IT labs using virtualization tools (VirtualBox/VMware), containerized environments (Docker) and network simulations (GNS3). This course helps you create flexible, cost-effective labs for cybersecurity, networking and DevOps testing—all on your personal system.
Introduction to Python
Start your programming journey with Python—one of the most popular and versatile programming languages today. This beginner-friendly course builds a solid coding foundation through hands-on practice and real-world problem solving. Perfect for those exploring careers in software development, cybersecurity, data science or automation.
Tools for Pen-Testing
Step into the world of ethical hacking with a hands-on look at the essential tools used by penetration testers. This course introduces the most widely used and effective tools for discovering vulnerabilities, exploiting weaknesses and assessing the security of networks, systems and applications. You’ll gain practical experience using real-world tools in lab environments, understanding how they work, when to use them and how to interpret the results.
Foundations for Ethical Hacking
Discover methods of ethical hackers in this course, designed to introduce you to the core principles of penetration testing and offensive security. Learn how ethical hackers think, how they approach systems and networks and use their skills to identify and fix security flaws before malicious actors can exploit them.