*New for Fall 2020*

Online Info Session

Tuesday, October 18, 2022
5:00 p.m. EST

Info Session

Cybercrime is at an all-time high and has the potential to affect everyone. The Canadian labour market has an acute shortage of technically and analytically skilled experts needed to fill cybersecurity professional jobs that can help thwart this global threat. Canadian employers lament that they can’t fill the large number of roles.

To address this, The G. Raymond Chang School of Continuing Education has created a new, fully online Cybersecurity Fast Track Course Series program as part of the federal government’s mandate to offer Canadians and Permanent Residents a four-week, open admissions, career-ready program in cybersecurity.

This program may be financed using the Canada Tax Credit Benefit. As part of your tuition, you may request at any time pre-arranged phone meetings with our cybersecurity tutor or with your course instructors.

In this two-course course series, comprising 78 hours of instruction, students gain hands-on, experiential learning by applying open-source cybersecurity technical applications. Specialized software and tools are also used in order to perform penetration testing, digital forensics, data protection, and network privacy solutions in private and public sector closed networks and cloud-based enterprise environments. 

Various security techniques that are essential for any security professional will be introduced using state of the art virtual desktop infrastructure environment. The environment will have many virtual machines with pre-installed and configured tools to perform the various tasks expected from a security professional. 

This course series will also cover some of the most popular techniques, including, CIA Triad, the different types of hacking, auditing, digital forensic, and incident response. Digital forensic techniques are used in the evidentiary process and the various methodologies intrinsic to computer forensics with an emphasis on computer incident response and information system protection.

Not ready to enrol but want to learn more?

Fill out this form and a representative from The Chang School will contact you.

Express interest

For more information, email Client Services at ce@torontomu.ca and Academic Coordinator Alex Ferworn at aferworn@torontomu.ca

What Will You Learn

Learn How To:

  • expertly utilize network protection solutions (analytical and technical) with an emphasis on firewalls, intrusion detection, and resolution and closure of breaches while considering complexities of enterprise infrastructures, hardware, software, applications, ethics, people, policies, and international law 
  • knowledgeably lead and/or champion the technical layers of effective response and containment of cyber threats or breaches and of the digital forensics’ expertise function within a network environment or an enterprise infrastructure

Who Teaches the Courses?

Our instructors are selected through a highly competitive process and are expert cybersecurity practitioners in the industry.

Visit our Instructor Profile Directory to read instructor bios.

Industry and Careers

Full-time analysts with highly developed skills in cybersecurity are required by:

  • financial institutions, such as banks
  • IT companies
  • major corporations
  • consulting firms
  • law enforcement
  • government entities

These specialists provide protection and security while upholding international and national laws in cybersecurity.

Recommended Course Sequence

Both of the following courses may be taken concurrently, or,  alternatively, one after the other:

CKDF 110 Computer Network Security
Learning outcomes comprise technical and analytic competencies for penetration testing, breach closure implementations and data protection and privacy solutions, among others of Kali Linux, Wireshark, Nmap, Nessus, Ncrack, Metasploit, Hping3, online virus scanners, WebGoat, IPTables, and Snort.

CKDF 130 Digital Forensics Systems 
Learning outcomes comprise technical and analytic competencies for the extraction of volatile data from a breach and legal presentation of this data (e.g. data from which will hold up in any court of law internationally) using Oracle VM VirtualBox together with forensic analysis using among others, Autopsy and Honey Pots, Network Security examination with Wireshark, mobile forensic analysis with iPhone Analyzer tool, and creating a timeline of non-volatile data using FTK Images.

Course Series Requirements

This is an open admissions program, which means you can enrol in these cybersecurity courses right away. No prior background is required. 

Contact Us

For more information, email Client Services at ce@torontomu.ca and Academic Coordinator Alex Ferworn at aferworn@torontomu.ca

Additional Details