fbpx

Cybersecurity & Intelligence Engineering (CSIE)

Cybersecurity & Intelligence Engineering Program at OCMT

Filling the Global Cybersecurity Gap

OCMT's program addresses the worldwide shortage of Cybersecurity Experts, with students in high demand even before graduation. The competency-based education, featuring practical scenarios, prepares the next generation of skilled Cybersecurity and Intelligence Experts, contributing to closing the global skills gap.

The world needs millions of Cybersecurity Experts. There is a shortage of good Cybersecurity professionals. The students of this program are already being sought after before they complete their program. The truth is, that Canada needs Cybersecurity professionals, just in the same way the world requires the services of seasoned Cybersecurity and intelligence practitioners.

OCMT is proud to contribute to solving the global cybersecurity skills gap by offering competency-based education using practical and case scenarios to equip the next Cybersecurity and Intelligence Experts.

Additional Information

  • This program also collaborates with Palo Alto and Fortinet Security Academy for additional skill acquisition.
  • Taught by experienced industry experts and researchers in cybersecurity, and accompanied by 6 months internship, inclusive.

Program Details

Duration

21 months

The program delivery schedule might vary in some situations. Please contact the Registrar to learn more.

Delivery

At OCMT, courses are delivered online.

Entry Dates

March, June, September, & December

Admission Requirements

1. Applicants with a prior Degree or Diploma in either a 3-year Diploma or a University degree in Engineering, Technology, Computer-related programs, Information Systems, Mathematics, or Physics; or holders of professional designations in CISSP, CISM, GIAC, and CCNA are eligible for admission.

2. Applicants must hold a University degree/College Diploma in related disciplines, including Mathematics, Engineering, Computer Science, Management Information Systems, Physics, Information Technology, Security, and Networking, or possess security certifications. Applicants without a specific degree or diploma in the mentioned disciplines should have at least 5 years of IT-related experience or a combination of academic background and experience.

Your Career

  • IT Systems and Network Administrator
  • Information Security Analyst
  • Cybersecurity Analyst
  • Cybersecurity Consultant
  • Cybersecurity Engineer
  • Cloud Security Analyst
  • Threat Analyst
  • Threat Intelligence Specialist
  • Ethical Hacker
  • Secure Code and Mitigation Specialist

and more…

Additional Information

  • This program also collaborates with Palo Alto and Fortinet Security Academy for additional skill acquisition.
  • Taught by experienced industry experts and researchers in cybersecurity, and accompanied by 6 months internship, inclusive.

Important Facts

“The Fast-Growing Job With A Huge Skills Gap: Cyber Security” – Forbes.com

“Canada must close cybersecurity skill gap” – The Globe and Mail

“Cybersecurity sector struggles to fill skill gap” – Financial Times, UK

“Global Cybersecurity workforce shortage by 1.8million” – Venturebeat.com

What behavioral skills do you need to be a successful Cybersecurity Expert?

  • Critical Thinking
  • Analytical Skills
  • Open Mind
  • Think like a Hacker

Cybersecurity Salary range in Canada

  • The average salary for Cybersecurity-related jobs is $94,007 per year. 
  • Immense opportunities abound for experienced Cybersecurity Experts to work remotely outside of the office.
  • Possibility to be self-employed
  • There is a significant demand for jobs in Cybersecurity
  • According to online publications, entry-level positions start at an average of $66,000 while most experienced workers could earn an average of $132,000, plus other emoluments.
  • Hourly workers/independent consultants command a higher per-diem rate.

If your credential is in a non-IT related discipline, you can enroll in alternative programs that complement your academic and professional experiences such as Enterprise Resource Planning Systems (ERPS), Accounting and Business Finance (ABF), or Brand Promotion and Media Technology (BPMT).

Semester 1

Course Name Learning Outcome
Introduction to Python Programming
At the end of this course, students are expected to have a good understanding of Python programming concepts and understand how Python programming can be applied to achieve optimal cybersecurity protection.
Computer Networking and Operating System
Server administration, Wire LANs and Wireless LANs, System Administration, Enterprise IDS Implementation and Testing, Security Incidence Response processes, Malware and Compromise Analysis Process and tools, Malware Incident Response process, The Internet of things, Trend of network development, Internet Technology, Security Information and Event Management Configuration, Customization and Support, Network Security, IP architecture, Network Access Control (NAC) solutions, Network security risks, threats, and remediation mechanism, Troubleshooting skills, Network management and analysis tools, Network technologies, architecture principles and design, Network technologies, architecture principles, and design, VMware virtualized infrastructure (vSphere/ESX/vCenter) and distributed network switches, Network security tools, such as firewalls, IPS, VPN, Anti-Virus, and NAC, To gain skills in network security tools, such as firewalls, IPS, VPN, Anti-Virus, and NAC
Cognitive/AI/Machine Learning for Security
Algorithms, Artificial Intelligence for Cybersecurity, Social Network Analysis, Cognitive Analytics, Image Analytics, Artificial Intelligence, Applying Machine learning and Rule Induction, Pattern Recognition, Construction of Computer Applications.
Identity and Access Management
Implementing Identity and Access Management for Organizations, Enterprise Structure, and Connected Systems, Impact of Laws and Regulations on Identity and Access Management, Information Architecture, Information Classification, Digital connectivity, Understanding how to create an identity for Organizations, Personnel, and Technology, Identity and Access Management, The implication of Law on Identity and Access Management., IAM Project Management, Change management, Concept of Confidentiality, Integrity, and Availability (CIA), Authentication, Information Classification

Semester 2

Course Name Learning Outcome
Ethical Hacking System and Exploit Development
Identify elements of Information Security, Writing tools and test scripts, Debugging programming languages, Cryptography, Operating System - Windows and Linux, HTTP and HTTP proxy tools, Networking, Common application vulnerabilities, Security scanning tools both black-box and white box, Legal and Ethical Issues in IT Security, Network Security and Penetration Testing, Hacker Techniques, Tools, and Incident Handling, Ethical Hacking and Network Defense, Wireless and Mobile Device Security, Operating System Security, Security Policies
Security Management and Standards for Enterprise Protection
Contextualize the concepts of current cybersecurity law and policy, Understand, Analyze, and report on Computer crime scenes, Development of cybersecurity law and policy in the public or non-public sectors. Recognize the restrictions of the current cybersecurity law and policy and propose the evolving trend for the future ones, Documentation of cybersecurity process requirements and analysis, Understand the cybersecurity laws applicable in Canada and leaner’s jurisdiction, Understand the investigative techniques during a cyber crime investigation, Compliance testing on applicable Cybersecurity laws, gather data and make analysis, prepare drafts and write final cybersecurity gap analysis reports.
Enterprise Security Architecture
Development of security strategy and roadmap, Enterprise security risk assessment and management., Knowledge of laws and regulations governing integrity of the financial reporting, Knowledge of security frameworks, and standards – ISO27000, NIST, COBiT, Create authentication, authorization, and federation architectures, Architect Identity and Access management systems, Maintain the enterprise repository of security technologies and applications, Contribute to creation and maintenance of security policies and standards, Review the architectures of business and infrastructure solutions and verify that information security concerns are addressed, Architect security solutions in support of security initiatives, Create security reference architectures, Identity Management products, Defense-in-depth, Firewall configurations and de-militarized zone, UNIX Security, Hardware security modules, Data Loss Prevention products, Public Key Infrastructure, Key management products, Privileged access products, Security federation products, Access Management products
Incident Response Management
Incident Response policies, Incident Monitoring, Incident Handling, Incident response planning, Pseudo cyber attacks and incident response, Security Information and Event Management (SIEM), Incident response manual and procedure development, Incident response plan and monitoring, Operational Security Excellence, IT Operational security activities

Semester 3

Course Name Learning Outcome
Cloud Security and Big Data
Introduction to Cloud Computing, Creating data visualization and analytic diagram, Developing model by using analytic tools such as Revolution R and Spark, Machine learning techniques, Data preparation, and transformation using the popular Hadoop components, Identifying, assess, and solve business problems with big data analytics, Architecture, design and feasibility of Big Data Analytics, Understanding and using of big data analytics, Intrusion Detection and Incident Response in cloud computing, Identity and Access Management (IAM), Securing Data in the Cloud, Compliance issues and Legal Considerations of cloud computing, Understanding Policies, and Governance for Cloud Computing Security, Infrastructure Security in the Cloud, Security Bottlenecks in the Cloud, Apache Hadoop, Data Visualization, SQL, Statistical and Quantitative Analysis, Machine Learning and Data Mining, NoSQL, Apache Spark, Database, Cloud Data Security, Data Migration, Creativity and Problem Solving, General Purpose Programming Languages
Threat Intelligence
At the end of this course, students are expected to demonstrate the knowledge of threat intelligence by using data to analyze the severity of threat levels and interpret the outcome in practical form to prevent cybersecurity incidents.
GDPR, and Personal Data Protection
At the end of this course, the students are expected to demonstrate knowledge of applying the GDPR and Personal Data Protection Acts to safeguarding personal information and keeping the enterprises compliant with sections of GDPR and related Personal Data Protection legislation.
Risk Management and Information Assurance
Governance, Risk, and Compliance, Develop Key performance indicators based on risk assessment, Risk-driven cyber security strategy, Risk Identification, Strategic Risk Management, Risk Analysis, Gain insights into various categories of risks, mitigation techniques, investigations, research, and case studies, Improve strategic planning, increasing the potential or likelihood of achieving strategic objectives, Develop a clear and concise definition of risk appetite based on the aggregate enterprise-level risk tolerance, Quantify all types of risks, including strategic, operational, financial, legal and insurance, Conduct qualitative risk assessments to identify/prioritize major risks from among all identified risk sources, Design and implement an appropriate ERM framework and risk governance structure customized to any type of organization, Employ and Apply ERM techniques to enhance risk decision-making even at the conventional risk management level, Develop business cases for both business and mitigation risk-reward decision-making team, Strategic thinking and Observation, Curiosity: Appetite for continuous learning new technologies and approaches of performing audit on information system and resources, Perform system audits using traditional and automated techniques

Semester 4

Course Name Learning Outcome
Business Communication
Reports and Business Proposals, Mechanism; Process Description, Communication Skills, Writing Skills
Inclusive Society
At the end of this course, students are expected to demonstrate (by their actions, narratives, practice, and performance from tests and exams) a good understanding of inclusion, and how to build a culture that organically appreciates everyone as members of one body with a demonstrable approach to promoting equality in policies, and its implementation.
Cybersecurity Capstone Project
At the end of this exercise, students should demonstrate skills in team building, collaboration, teamwork, conflict resolution, and project delivery.
Copyright 2024 © All rights Reserved.
Scroll to top