
Cybersecurity Specialist
Level-Up Your Cybersecurity Career
This program will equip you with the skills needed for intermediate cybersecurity roles. Build on your previous training by gaining specialized knowledge in cyber defense, incident response, digital forensics and system security fundamentals while exploring key cybersecurity laws and regulations. The program culminates in a real-world capstone project where you'll apply the skills you've learned to solve current cybersecurity challenges within your organization.
Upskilling
This certificate provides upskilling for Cyber Security Essentials graduates, IT graduates from other programs, or for highly experienced IT professionals that do not have credentials to match their experience.
Program Delivery Options
The certificate is delivered online either full or part time and will be delivered by an instructor. Both delivery options will total 240 hours of course time.
- Full time: Weekdays, 5 hours per day for 14 weeks
- Part time: Evenings and Saturday mornings across 23 weeks

Related Careers
- Intermediate Cybersecurity Analyst
- Intermediate Security Operations Centre (SOC) Analyst
- Cybersecurity Consultant
- Intermediate Penetration Tester
- Cybersecurity Technician
- Cybersecurity Investigator
Admission Requirements
Students must complete the Cybersecurity Essentials Analyst Certificate. Or provide proof of Ethical Hacker Certification and knowledge of Python Scripting.
Supporting documents of the above requirements must be provided as part of the application process.
Technology Requirements
This course takes place entirely online. You will need your own personal computer/laptop with reliable wifi and permissions to download software or Cybersecurity tools.
Graduation Requirements
You must receive a minimum 65% average in all 5 courses.
Program Costs

Financial Aid Options
Student life can be very expensive, and few individuals have enough money to pay up-front for their post-secondary education.
Students enrolled in continuing education programs may qualify for program-dependent funding opportunities.
Courses
Cybersecurity Defense
Learn to gather threat intelligence and use policies to proactively secure data, as well as take action to understand emerging tactics, techniques, and procedures of all threats. Students will learn to lure potential attackers to fake sites to monitor sources of attack and create strategies. Learning methodologies for active defence include:
- Fake emails
- Deploying fake database data
- Embedding web beacons
- Active data baiting on web application platforms
Incident Handling and Forensics
Develop skills in handling incidents and responding. Hands-on labs will teach the tactical procedures and techniques required to plan, record, triage, notify, and contain security breaches. Specifically:
- Containment
- Eradication
- Evidence Gathering
- Forensic Analysis
System Security Fundamentals
This course is designed to provide the key concepts that are considered when setting up a cybersecurity system. It dives deeper into the fundamental principles of information security, information controls, and security management. Upon completion, students will be able to assess data to be protected and identify the most effective way to initiate security protection using fundamental and control principles.
Cybersecurity Legislation
With the growing need for cybersecurity in all types of organizations, it is essential to understand federal and regional cybersecurity strategies and legislation. Students will learn how to align their practice with local and national cybersecurity legislation and policies.
Cybersecurity Capstone Project
Experience a guided approach to setting up and managing cybersecurity with the hands-on capstone project. Students will utilize prior learning from this program and real-world experience to design, set up, and manage cybersecurity threats and data protection.