Honours Bachelor of Information Sciences – Cyber Security Online

Enhance your career-ready computer science and security capabilities in our groundbreaking cyber security program.

Apply by: 2024/12/13
Start classes: 2025/01/06
Apply Now

Program Overview

Earn your cyber security bachelor’s degree online

Stand out in the job market with the knowledge and capabilities you need to succeed in the rapidly growing field of cyber security. The first cyber security degree in Canada, Sheridan College’s Honours Bachelor of Information Sciences – Cyber Security online program imparts knowledge about ethical hacking and penetration testing techniques, legislation and the latest tools in a learning environment led by professionals with industry experience. Enhance your career marketability with industry certifications in a program designed for working adults, allowing you to balance work and other commitments. Plus, your previous credentials and related experience may count as credit to help you finish this program more conveniently.

Internship and applied research opportunities

At Sheridan, we believe the best way to learn is through hands-on experience. In the second half of the program you can work for our industry partners through an internship work-term. Students who have already obtained more than 420 hours of program-related work experience can apply to have that previous experience applied to the internship credit during their studies. You can also sharpen your research skills by providing computer science support to any of Sheridan's various applied research projects.

As a graduate of this cyber security program, you will gain knowledge and capabilities in:

  • Computer security
  • Database security
  • Ethical hacking
  • IS intrusion detection and prevention
  • Network security
  • Computer security
  • Database security
  • Ethical hacking
  • IS intrusion detection and prevention
  • Network security

Also available online:

At Sheridan, we offer a variety of innovative online programs that can help you advance. Explore other undergraduate programs.

Total Tuition: $25,624
Transfer Credits: Past completed credits might apply towards your program
Credit Hours: 144
Apply Now

Need More Information?

Call +1-833-588-4325

Call +1-833-588-4325

Tuition

An affordable bachelor's in cyber security program

When you earn your cyber security bachelor’s online, you’re investing in your future.

Tuition breakdown:

Total Tuition: $25,624
Credit Hours: 144

Calendar

Keep track of this program’s important dates

Sheridan College online programs are delivered in an accelerated online format ideal for flexibility and convenience. We offer multiple start dates per year, so you can select the one that suits your schedule.

Next Apply Date 2024/12/13
Start Class 2025/01/06
TermStart DateApp DeadlineDocument DeadlineRegistration DeadlineTuition DeadlineClass End DateTerm Length
Winter A2025/01/062024/12/132024/12/132025/01/062025/01/312025/02/217 weeks
Winter B2025/03/032025/02/252025/02/252025/03/032025/03/312025/04/177 weeks
Spring/Summer A2025/05/052025/04/292025/04/292025/05/052025/05/312025/06/207 weeks
Spring/Summer B2025/06/302025/06/242025/06/242025/06/302025/07/312025/08/157 weeks

Ready To Take the Next Step?

Apply Now

Admissions

Application to this online program is streamlined

Review the streamlined admission process below for the online cyber security bachelor's degree program from Sheridan College.

Admission Requirements:

  • Ontario Secondary School Diploma or equivalent
  • Complete an online application

You must meet the following requirements for admission to this Honours Bachelor of Information Sciences – Cyber Security online program.

  • Ontario Secondary School Diploma or equivalent, including these required courses:
    • English, Grade 12 (ENG4U)

PLUS

    • Any Grade 12 science (U or M) or Grade 12 Computer Science (U) or Grade 12 Computer Engineering Technology (U or M)
    • Any Grade 12 mathematics (U)
    • Three other Grade 12 credits (U or M)
    • Minimum 65% overall average

OR

    • Two semesters of postsecondary education including required courses with a minimum 65% overall average

Courses

A look at the cyber security Bachelor of Information Sciences curriculum

To graduate from the Honours Bachelor of Information Sciences – Cyber Security program, you must complete a total of 144 credit hours, including 117 core credit hours, six credit hours of professional electives and 21 credit hours from breadth electives.

Duration: 7 Weeks weeks
Credit Hours: 3
Students will learn about the basic information security/cyber security terminology which is a foundation of cyber security. Students will be able to identify the attack surface categories. Students will be able to implement data loss prevention strategies. Students will learn about maintaining the balance between Cyber Security and Availability of IT assets/infrastructure.

Learning outcomes:

  • Provide guidance to senior management in the design of an information security system
  • Evaluate the common approaches to information security system procedures
  • Use the components of an information security system assessment appropriately
  • Apply the main processes of an information security system to support the business case
  • Analyze processes which negatively impact the business information system
  • Analyze corporate information security policies and procedures
  • Evaluate corporate information security policies and procedures
  • Conduct an information security system assessment using an information security systems methodology
  • Present applied information security system issues in a concise way to multi-level groups
  • Exemplify generally accepted professional standards including honest and ethical conduct, organized in the planning, execution and validation of work, punctuality with regard to the delivery of work, a willingness to approach problems from several perspectives, a willingness to accept direction and an understanding of the limits of their knowledge
Duration: 7 Weeks weeks
Credit Hours: 4
Students focus on the design and implementation of computer programs using modern programming languages. Students learn algorithm design, programming fundamentals, memory concepts and design considerations when generating a programming solution to a given problem. Students learn in a practical environment how to use the procedural programming control statements, built-in data types of the languages, string manipulations, file processing techniques, and fundamental concepts of object-oriented programming. Lectures, hands-on exercises and assignment experiences systematically teach the student about control structures, functions, recursion, basic data structure processing, record processing, file processing, and command-line arguments processing as well as applying this knowledge to efficiently implement programming solutions to problems.
Duration: 7 Weeks weeks
Credit Hours: 4
Students are introduced to some of the fundamental mathematical disciplines related to computing and security such as: sets, functions, sequences and sums, relations, mathematical induction and recursion, counting, discrete probability, graph theory, and trees. Through interactive lectures and exercises, students gain a foundational understanding of these concepts as a basis for their learning in subsequent courses.

Learning outcomes:

  • Solve problems involving set operations, relations and functions
  • Perform operations with sequences and series
  • Perform mathematical induction to prove basic problems
  • Recognize and use the process of recursion and solve recurrence relations
  • Apply principles of mathematical induction to verify a variety of statements in finite mathematics
  • Solve problems in which the number of possibilities is finite using basic counting techniques, permutations and combinations
  • Apply the theory of discrete probability to various disciplines
  • Apply the concepts of introductory graph theory to specific problems
  • Solve various problems in tree theory
Duration: 7 Weeks weeks
Credit Hours: 3
In this course, the student will learn the basic concepts and techniques of data communication systems. Students will be able to differentiate between circuit and packet switching. Successful students will be able to identify characteristics of different transmission media like twisted-pair cables, coax and wireless. Students will also learn to analyze the needs of the network and select the most suitable transmission medium. Students will learn to explain the functions of hubs, switches and routers and where each component fits in a network. Students will be able to illustrate how core Internet protocols work together to move data from one user to another. By the end of this course students will be able to set up a simple firewall, use network troubleshooting tools to diagnose simple network problems, examine packets using a packet analyzer, and send secure email to others.

Learning outcomes:

  • Identify the advantages of packet switching in digital networks over circuit switching
  • Compare analog and digital signals, different transmission media, multiplexing techniques and determine where each is best used
  • Explain the functions of different LAN components and locate where each component fits in a network
  • Identify security issues and dangers inherent in data communication networks
  • Calculate data rates in bits per second for different types of data
  • Troubleshoot basic network problems using a packet analyzer
  • Analyze packet contents using a packet analyzer
  • Protect a computer system by configuring a personal firewall
  • Select the appropriate transmission media to build a network
  • Select the right networking devices to build a LAN
  • Exemplify generally accepted professional standards including: honest and ethical conduct organized in the planning execution and validation of work, punctuality with regard to the delivery of work, a willingness to approach problems from several perspectives, a willingness to accept direction, an understanding of the limits of their knowledge and the consequences of this
Duration: 7 Weeks weeks
Credit Hours: 3
This course is an introduction to the LINUX operating system. It includes an explanation of concept and purpose of the operating systems, LINUX command line editors, utilities, file systems, file security, advanced file processing, processes, shell environment, shell scripts, and standard LINUX tools. Students will learn the basics of Cloud Computing with Linux. It also includes the introduction to virtualization, hypervisors, and cloud computing security in Linux. Students will learn the concept of Linux deployment on cloud to host applications and Cloud Computing Security in Linux which includes introduction to Access Control, Auditing, Authentication and Authorization.

Learning outcomes:

  • Demonstrate understanding of the basic structure and functionality of the LINUX operating system
  • Demonstrate use of LINUX utilities
  • Evaluate and assess how LINUX manages files, directories and processes
  • Analyze the information about the user environment
  • Evaluate the information about other users in the multiuser LINUX based systems
  • Implement customization of individual user environments
  • Demonstrate proficiency in use of LINUX command-line utilities
  • Demonstrate proficiency in redirection, pipes and filters to make commands more efficient
  • Assess, analyze and manage LINUX processes
  • Assess the differences between major popular shells and their scripting languages
  • Demonstrate proficiency in writing, running and debugging shell scripts
Duration: 7 Weeks weeks
Credit Hours: 3
In this course students will build upon their general information security industry knowledge base, developed throughout their first 7 semesters and during their internship. Through research and discussion activities, students will explore the latest trends in industry and offer critique and evaluation that would be expected of an information security professional. Students will engage in discussions and debates on the merits of new technologies, research findings and cybercrime legislation. Students will also have the opportunity to learn from guest lecturers from industry and academia who will offer their perspective and expertise on information security trends and discoveries.
Duration: 7 Weeks weeks
Credit Hours: 3
This course introduces students to writings and theories on professional ethics, values and principles of concern to information specialists and information service providers. It will challenge students to think creatively and critically in their application of ethics concepts in social, organizational, historical, and contemporary contexts. The course elaborates on the relationships between professional ethics and law, including copyright, intellectual freedom, privacy, and confidentiality.

Learning outcomes:

  • Recognize, analyze and evaluate the social impact of some current information technologies
  • Infer benefits and risks of proposed information technologies
  • Discuss and analyze issues of privacy, personal information and freedom of speech in cyberspace
  • Differentiate issues of intellectual property, open access and fair use
  • Demonstrate the ability to perform analysis of various case studies in information technology ethics
  • Articulate the legal requirements pertaining to information security management in business and other settings
  • Explain the roles and responsibilities of a computer professional
  • Apply the principles of intellectual freedom to the information security profession
  • Discuss ethical issues relating to professional activities such as: penetration testing, IT security consulting, personal information management, computer forensics investigation, copyright and open access
  • Demonstrate the ability to deliver information services that are both legal in Canada and the U.S. and consistent with professional ethics as they have developed over time
  • Make informed decisions on complex ethics cases related to information access and service
  • Analyze the importance of professional conduct in the workplace, including interpersonal interactions, sensitivity to organizational culture, ability to take initiative and risks and socially responsible behaviour
  • Defend the ethical stances they have taken, using ACM Code of Ethics and Professional Conduct or similar ethical frameworks such as: GIAC Code of Ethics, SANS IT Code of Ethics, etc.
Duration: 7 Weeks weeks
Credit Hours: 3
Students build upon their procedural programming skills and explore the fundamental concepts, structures, and techniques of object-oriented programming. They use an industry-standard programming language and utilize sound design, implementation, documentation, and quality assurance methods. Students use several resources to support their learning, including textbook readings, online materials, and classroom demonstrations. Importantly, students write several object-oriented, desktop computer programs of increasing complexity using an industry-standard programming language. Students apply these concepts to problems in the domain of information systems security.
Duration: 7 Weeks weeks
Credit Hours: 4
Students learn additional topics essential for computer and security related studies. Students cover topics including number base concepts and Boolean algebra. Through interactive lectures and exercises, students learn foundational principles by which computers operate. The number theory concepts and algorithms students learn in this course are also fundamental for contemporary cryptology.

Learning outcomes:

  • Apply the rules and concepts common to place values of number systems, specifically the binary, octal, decimal and hexadecimal number systems
  • Convert numbers from/to binary, octal, decimal and hexadecimal number systems
  • Perform the arithmetic operations in various bases
  • Use proving techniques in logic to determine the validity of logic statements
  • Recognize and construct logically valid arguments
  • Construct and interpret simple and compound logic statements
  • Use concepts and constructs of Boolean algebra to solve discrete mathematics related problems
  • Simplify compound logic statements
  • Solve problems in number theory as it applies to congruencies modulo n, Euclidean algorithm and basic facts about prime numbers
  • Perform mathematical induction to prove or disprove number theory and related statements
  • Apply the theory of prime numbers in solving problems, including prime factorization, use of Fermat theorem, use of Euler totient function, pseudo-primality testing, and related techniques later used in cryptography and cryptanalysis
  • Apply modulus arithmetic in order to solve practical mathematical and cryptographic problems
Duration: 7 Weeks weeks
Credit Hours: 3
Students learn the principles and practices of systems administration. The course will focus on the various functions of a System Administrator in both virtual and cloud-based LINUX environments: provisioning, orchestration, installation and configuration procedures for servers and containers, file systems and disk management practices, backup and recovery procedures, networking fundamentals, intranet/internet services, security issues, identity and access management practices, and the role and responsibilities of Systems Administrators. Students learn in an applied, hands-on, and practical environment where they are equipped with system administration skills that are relevant for industry.

Learning outcomes:

  • Use operating system services and tools such as kernel, shells, process control, file systems and services, and identity and access management services
  • Describe network service principles and practices
  • Identify security principles and practices
  • Configure a Linux operating system
  • Perform essential operating system functions: boot, shut down, control processes, mount, secure and backup files and file system
  • Install software packages
  • Implement administrative shell scripts
  • Configure network services
  • Implement security, backup, recovery and emergency diagnosis services
  • Provision cloud-based resources including network services, servers and containers
  • Author infrastructure as code using DevOps best practices
  • Orchestrate virtual resources and containers in a cloud environment
Duration: 7 Weeks weeks
Credit Hours: 3
The first year course introduces the student to the purpose, theory, and methods of data modeling. The student will be able to identify the techniques involved in data modeling as well as the level of difficulty associated with each element of data modeling. Students will learn the diagramming conventions associated with Entity Relationship Diagrams, how to model entities and how to model the different relationships between entities. The student will also learn how to determine the degree of each relationship, the nature of recursive relationships, network structures, roles, and normalization. In addition students will learn to identify named objects, the relationships between these objects, and the best ways to model these objects based on the user's needs.

Learning outcomes:

  • Identify business entities and the relationships between these entities from a business case study
  • Use a variety of techniques to gather requirements, create conceptual models and produce diagrams to illustrate normalization
  • Select an appropriate name for the relationship based on the nature of that relationship
  • Assess the degree and optionality of the relationship
  • Draw the entity-relationship model using proper diagramming conventions
  • Select the appropriate entity attributes based on business requirements for the storage of information
  • Select unique identifiers from the attributes, relationships or the appropriate combination of both
  • Design and test models for exclusivity, time and connection traps (identify and model exclusive entities and relationships, assess and resolve fan and chasm traps, evaluate the results of convergent and divergent modeling)
  • Define and explain the benefits of normalization as used in the design of business models
  • Construct and place tables in third normal form
  • Exemplify generally accepted professional standards including honest and ethical conduct, organized in the planning, execution and validation of work, punctuality with regard to the delivery of work, a willingness to approach problems from several perspectives, a willingness to accept direction, an understanding of the limits of their knowledge and the consequences of this
Duration: 7 Weeks weeks
Credit Hours: 3
In this course, students will learn how to assess threats and risks to information systems and to develop the business case to support solutions for dealing with these concerns. Students will also learn appropriate processes for the systematic valuation of IT security risks and begin to apply these to the development of recommendations to reduce the risk to an acceptable level. Students will demonstrate their ability to conduct an information risk assessment using a variety of modeling techniques.

Learning outcomes:

  • Assess the security threats posed to corporate information assets
  • Evaluate the common approaches to information asset risk management
  • Use the components of an information risk assessment appropriately
  • Apply the main stages of a qualitative information risk analysis to support the business case
  • Analyze threats which negatively impact the business information system
  • Analyze corporate information security requirements
  • Evaluate corporate information security requirements
  • Conduct an information risk assessment using a comparison risk ranking methodology
  • Present applied risk issues in a concise way to multi-level groups
  • Exemplify generally accepted professional standards including honest and ethical conduct, organized in the planning, execution and validation of work, punctuality with regard to the delivery of work, a willingness to approach problems from several perspectives, a willingness to accept direction, an understanding of the limits of their knowledge and the consequences of this
Duration: 7 Weeks weeks
Credit Hours: 3
In this course, students will enhance their understanding of the C/C++ programming language and acquire skills to address security-related issues. C/C++ serves as the foundational syntax for other object-oriented languages and is utilized to introduce problem analysis, algorithm design, and program implementation to students. Throughout the course, students will learn how to construct reusable objects, employ encapsulation and inheritance, and apply polymorphism effectively. They will also gain proficiency in modeling class relationships using containers, inheritance hierarchies, and polymorphism in the C++ programming language. Additionally, students will develop the ability to create multi-threaded C++ programs. The course will focus on problem-solving within the context of software security, necessitating the use of the security features offered by a modern, industry-standard programming language.

Learning outcomes:

  • Design classes that handle dynamically allocated resources and utilize logical constructs to efficiently solve tasks with linear complexity
  • Implement programs that demonstrate multiple inheritance and polymorphism, enhancing the code's reusability
  • Write computer programs that leverage the performance advantages of library class implementations for stacks, queues, lists, sets, and maps
  • Manage binary-oriented persistent data using object stream input and output techniques, including binary data handling and exception-handling
  • Develop programs that incorporate security measures, mitigation strategies, and run-time data protection for both stack and dynamic memories, while also managing storage effectively
  • Design multi-tasked solutions using threads along with thread libraries to improve the performance of the programs
  • Develop computer programs involving multiple abstract and concrete classes, as well as interfaces, using modern integrated development environment
  • Collaborate in a team environment while working on larger-scale computer programs
  • Conform to standards of professional practice with respect to code quality, project management and personal integrity
Duration: 7 Weeks weeks
Credit Hours: 3
This course is an introduction to the major methods of applied statistics. The course provides students with the skills necessary for designing a statistical study; organizing appropriate research and data collection; presenting data visually; calculating and interpreting numerical characteristics of data; and, communicating the findings to others. Basic statistical methods are discussed and practiced. In the course students use Excel and scientific calculators to speed up the calculations and obtain more professional reports. Although the students are exposed to a variety of real-life situations in which statistics is applied, the course specifically addresses applications in cryptography, data recovery, and there liability of information transfer.

Learning outcomes:

  • Apply basic statistical methods to organize and study sets of data
  • Classify data and display data in Excel
  • Calculate descriptive statistics in Excel and on a calculator
  • Determine relationships between variables using correlation coefficient and linear regression, two-way tables and segmented bar graphs
  • Calculate probabilities of simple and compound events
  • Apply appropriate discrete probability distributions
  • Collect random samples
  • Calculate probability for continuous variable using the normal distribution
  • Create confidence intervals for proportions and means
  • Perform hypothesis testing for proportions and means
  • Analyze paired data
  • Communicate verbally to different audiences -- individuals, small group, entire class
  • Express ideas in mathematical language using written notation
  • Evaluate statistics produced by a third party
Duration: 7 Weeks weeks
Credit Hours: 3
Identify the characteristics of different networks, analyze the routing protocol needs and select the best routing protocol for the network. Recognize the function of layer 2 switches, and VLANs, the role of Spanning Tree Protocol in preventing switching loops and broadcast storms, and design and implement access control lists to prevent certain packets from entering or leaving your network. Create an IP addressing scheme for a network. Trace a packet as it travels on the Internet from source to destination, and describe in detail what happens to it as it travels through routers and switches. Troubleshoot, diagnose and fix network problems that prevent packets from reaching their destination.

Learning outcomes:

  • Decipher packet headers to troubleshoot network problems
  • Analyze network requirements and design a suitable IP address subnetting scheme accordingly
  • Design and implement a network configuration using routers and switches
  • Differentiate between different routing protocols
  • Implement a suitable routing protocol based on network needs
  • Explain the Layer 2 switching process, and security implications of using switches instead of hubs
  • Apply the STP algorithm to a network to determine which ports will be blocked to prevent switching loops
  • Perform management tasks on routers and switches
  • Compare WAN protocols, and select the right one for a network
  • Identify, troubleshoot, and solve network problems
  • Demonstrate attitudes consistent with professional practice
Duration: 7 Weeks weeks
Credit Hours: 4
This course introduces students to computer organization, processor (CPU) design strategies, CPU components, and explains the principles underlying the functionality of the computer system. Students analyze and differentiate contemporary computer architecture design concepts, their goals and scope, and their differences and similarities. The primary focus of this course is assembly language programming.

Learning outcomes:

  • Select digital components (MUX, DEMUX, decoder, priority decoder, PLA, shifters, full adder, flip flops and clocks) using Boolean algebra methodology, and logical gates
  • Describe the basic architecture of the von Neumann machine including system bus, memory, and the fetch-decode-execute-write model
  • Demonstrate how data is stored in computer memory and CPU registers: integers (signed and unsigned), floating point data using IEEE754 standards, and machine and low-level programming language instructions
  • Describe micro-architectures, instruction sets, and assembly language levels for various CPU designs
  • Compare modern computer architecture design concepts
  • Identify how parallel processing is achieved within various architecture models using: pipelining, scalar processing, superscalar processing
  • Explain how cache, pipeline depth and superscalar instruction issues affect the performance of a processor
  • Describe the architectural features of modern computer systems such as: array processors, multiprocessor systems, cluster architectures, and other parallel architectures
  • Explain the fundamental limitations and bottlenecks in modern processors
  • Develop programs using assembly programming language
Duration: 7 Weeks weeks
Credit Hours: 3
In this course, students learn server-side technologies by configuring a web server. This course focuses on a modern web application development platform which uses a distributed multi-tiered application model for enterprise applications. Students learn how application logic is divided into components according to function. Specifically, student learning focuses on the client-tier components that run on the client machine (application clients) and web-tier components that run on the server. Students learn to configure and deploy enterprise applications that connect to a server using a web server management system.

Learning outcomes:

  • Describe HTTP/HTTPS protocols and explain their relation to web application development
  • Differentiate client-side and server-side roles and responsibilities in designing and implementing a web application
  • Design web pages and web application front ends using markup language, styling, and client scripting languages
  • Design multi-page, data-driven, object-oriented, dynamic web applications using best practices in web application design and industry proven design patterns
  • Build multi-tier, data-driven web applications using modern web application hosting techniques, business layer management tools and database connectivity APIs
  • Distinguish between business logic tier, presentation tier, and data tier components and articulate their role in web applications
  • Develop web application components using software design principles and demonstrating understanding regarding the separation of the components' responsibilities
  • Design and implement secure web applications and anticipate the security requirements of the web applications
  • Make web applications available for user through appropriate production environments
Duration: 7 Weeks weeks
Credit Hours: 3
In this course, students will learn the protocols used in distributed network technologies and their security issues. They will trace the way in which data is transferred in networks. They will analyze network traffic in detail, including the contents of layer 2, 3, and 4 headers. They will be able to dissect packets and extract header contents using tools like TCPdump and Wireshark. They will use TCPdump filters to capture packets of interest. They will examine the different types of ICMP messages and why they are sent. Students will learn how DNS is used to convert hostnames into IP addresses. Students will use Linux tools (e.g. nmap) to gather information about networks and hosts. They will use traffic generation tools like hping3 to create crafted packets. Students will learn about the HTTP protocol and related topics such as its cookies, APIs, and methods. Students will configure an Active Directory server and set up different types of authentication.

Learning outcomes:

  • Analyze and extract contents of IP and embedded protocol headers to detect malicious traffic
  • Design and write TCPdump filters to extract packets needed for analysis
  • Identify different types of ICMP messages and reasons they are sent
  • Predict the correct traffic a host will generate in response to different types of packets
  • Explain the role of DNS in everyday Internet usage and identity different DNS message types
  • Use Linux tools to probe, map and gather information about networks and hosts
  • Differentiate between the components of the HTTP protocol and identify their purpose
  • Explain the difference between Content Delivery Networks (CDN) and Cloud Computing
  • Employ appropriate industry terminology in all submitted work
  • Submit all evaluated work according to schedule
Duration: 7 Weeks weeks
Credit Hours: 3
In this course, students will learn about computer forensics, the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Students will investigate a wide range of computer crime or misuse, including theft of trade secrets, theft of or destruction of intellectual property, and fraud. Students will draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information and how to apply this information during discovery, depositions, or actual litigation.

Learning outcomes:

  • Use various techniques and tools to protect the subject computer system during the forensic examination from any possible alteration, damage, data corruption or virus introduction
  • Use tools in order to discover all files on the subject system regardless of operating system
  • Recover discovered deleted files
  • Reveal the contents of hidden, temporary and swap files used by the application programs and operating system
  • Access the contents of protected or encrypted files
  • Analyze the relevant data found in special areas of a disk, including unallocated space and slack space
  • Prepare an overall analysis of the subject computer system, as well as a listing of all possibly relevant files and discovered file data
  • Provide an analysis of the system layout, file structures discovered, discovered data and authorship information, any attempts to hide, delete, protect, encrypt information, and anything else that has been discovered and appears to be relevant to the overall computer system examination
  • Provide expert consultation and/or testimony, as required
Duration: 7 Weeks weeks
Credit Hours: 3
In this course the students learn to analyze and evaluate the configuration of a database to secure it against unauthenticated users. Oracle has a plethora of different security and auditing methods and this course will focus on implementing these methods during every phase of application design. In particular this course will examine the four main ways in which data access security can be implemented in a relational database: grant security; role based security; grant execute security; or virtual private databases. Students will also look at the different techniques available for auditing a database such as fine grained auditing, auditing with LogMiner, auditing the system level triggers, and auditing with object triggers.

Learning outcomes:

  • Evaluate the security configuration in an existing database to determine effectiveness
  • Analyze the specific object-level and system-level privileges and determine how these privileges can be grouped into roles and assigned to database users
  • Evaluate the Virtual Private Database technology and its ability to restrict access to selected rows in the database (fine-grained access control)
  • Evaluate role-based security and apply security to a relational database
  • Assess the overlapping features available in Oracle security implementation tools
  • Evaluate the interrelationships between the granting of object-level privileges and system level privileges to different users
  • Analyze the cascading effects of granting object and system-level privileges to multiple users
  • Analyze and evaluate the Transparent Data Encryption to enforce Tablespace and table-level security
  • Demonstrate proficiency with Oracle's data dictionary
  • Analyze the strengths and weaknesses of auditing techniques available to a database administrator
  • Create and analyze the backup and recovery procedures that are available to a database administrator to plan for loss of data
Duration: 7 Weeks weeks
Credit Hours: 4
Students explore data structures and algorithms, including their design, analysis, and implementation. Students characterize the running time of algorithms using theoretical as well as experimental analysis. They also investigate the importance of organizing data using standard data structures such as stacks, queues, linked lists, trees, heaps, and graphs and appreciate that the way data is organized and accessed greatly impacts the time and space efficiency of the algorithms that operate on them. Throughout the course, students will examine efficient algorithms and data structures utilized in various applications including shortest paths, text processing, and cryptography. The course employs pseudocode to illustrate algorithms, but students reinforce their programming skills by implementing algorithms in high-level programming languages like C. Furthermore, students explore advanced topics such as NP-Completeness.

Learning outcomes:

  • Describe a variety of fundamental algorithms including sorting algorithms, graph algorithms, text processing algorithms, number-theoretic and cryptography algorithms
  • Implement a variety of fundamental data structures including stacks, queues, lists, heaps, hash tables and search trees
  • Explain the use of big-O, Omega, and Theta notation to describe the amount of work done by an algorithm
  • Determine the asymptotic time complexity, both theoretically and experimentally, of various algorithms
  • Describe the usage of amortized analysis for appropriate algorithms
  • Determine and solve recurrence relations that describe the time complexity of recursively defined algorithms
  • Explain the use of randomization in the design of an algorithm such as QuickSort or QuickSelect, particularly where a deterministic algorithm is asymptotically less efficient
  • Describe fundamental algorithmic techniques such as divide-and-conquer and the greedy method and how they are used in a variety of algorithms for various applications such as sorting, schedulling and shortest path determination
  • Design an algorithm and choose an appropriate data structure to solve standard and non-standard problems in order to achieve an appropriate time and space complexity
  • Define the classes P and NP and explain the significance of NP-completeness
Duration: 7 Weeks weeks
Credit Hours: 3
Students apply software development processes together with software engineering and their applications in the development and management of software systems. Students construct high quality software systems by practicing requirement specification, software design, implementation, testing, and maintenance techniques. Students participate in interactive lectures, presentations and demonstrations as well as in numerous hands-on labs where they explore fundamental software engineering techniques and learn to apply these techniques using industry-standard CASE tools and software development environments.
Duration: 7 Weeks weeks
Credit Hours: 4
Cryptography, in particular public-key cryptography, has become an important computing and mathematics discipline whose implementation provides the foundation for information security in many applications. Symmetric and public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail and personal data protection. This course is about cryptology, with emphasis on cryptography and coding, covering essentials of classical and contemporary symmetric and asymmetric cryptography algorithms, stream and block ciphers, digital signatures and cryptographic hash functions. The emphasis will be in understanding fundamental concepts.

Learning outcomes:

  • Demonstrate competence in the fundamentals of cryptographic and coding principles
  • Analyze computational complexity of classical and modern cryptographic algorithms
  • Demonstrate knowledge, analyze and implement series of cryptographic protocols for authentication, authorization, cryptographic key management and secret sharing
  • Implement cryptographic algorithms in OOP and structured programming paradigms
  • Use mathematical techniques to analyze the quality of pseudo-random generating algorithms and functions, and to build similar on their own
  • Show competence in analyzing, measuring and interpreting the level of correlation between information security and encryption key length
  • Perform attack on cryptographic algorithms for encryption, decryption and hashing
  • Explore and analyze the public key infrastructure (PKI) protocols, roles, key management and implementation problems
  • Do research regarding cryptographic standards and patents, digital rights and their protection
Duration: 7 Weeks weeks
Credit Hours: 1
Students explore effective Internship job search and self-marketing strategies in preparation for their work-term(s) and career development. Students familiarize themselves with the responsibilities and rights of a student as it relates to professionalism, ethical behavior and relevant policies/legislation during an Internship job search and work-term. Students explore competency development and cultivate an understanding of their personal employability skills and competencies through self-assessment and reflection. They investigate the current industry requirements for their field of study and develop effective job search and self-marketing strategies. Students create job search self-marketing tools that articulate relevant employability skills and competencies to help achieve their employment goals. In addition, students learn effective interview skills and techniques to confidently prepare themselves for employment interviews. Through experiential activities, reflective practice, in-class discussions, and assignments, students are guided to prepare for successful job search and work-term(s).
Duration: 7 Weeks weeks
Credit Hours: 3
Students apply software development processes together with software engineering and their applications in the development and management of software systems. Students construct high quality software systems by practicing requirement specification, software design, implementation, testing, and maintenance techniques. Students participate in interactive lectures, presentations and demonstrations as well as in numerous hands-on labs where they explore fundamental software engineering techniques and learn to apply these techniques using industry-standard CASE tools and software development environments.
Duration: 7 Weeks weeks
Credit Hours: 3
In this course, students configure three parameters; default parameters, inherent vulnerabilities in the database and user created parameters. Each parameter will be discussed, analyzed and solutions will be offered.
Duration: 7 Weeks weeks
Credit Hours: 3
Students are introduced to the essential concepts in the design and implementation of modern multiprogramming operating systems, operating systems protection and security mechanisms, virtualization, and distributed systems. Students are shown specific examples of such operating systems, the services provided, the way those services are implemented, and the underlying problems and solutions encountered in a multiprogramming computer system environment. Students also learn about systems programming which gives a practical insight into the system call interface and demonstrates how to design complex software to get the most from the operating system using system calls, inter-process communication and threads subroutine libraries. Students complete a detailed study of the UNIX system call interface - the programming interface between the UNIX kernel and applications software running in the UNIX environment. Students leverage their previously obtained insight into shell and C language programming and learn about files, signals, semaphores, POSIX threads, and client-server communication. Students learn through interactive lectures, discussions, labs and assignments.
Duration: 7 Weeks weeks
Credit Hours: 3
This course presents security auditing from technical, legal, and business perspectives. Most companies rely on electronic management of data, documents, and key electronic processes, so information technology plays an important role in internal control. The main objective of information security auditing is to ensure that the information technology and business systems are adequately controlled, monitored, and accessed. Information security auditing allows organizations to comply with government security regulations, a regulatory requirement. Companies listed on Canadian exchanges must comply with the requirements set by the Canadian Securities Administrators, while interlisted companies must also comply with the U.S. Sarbanes-Oxley Act. Achieving compliance requires tremendous investments of time and resources. Students are introduced to principle security-related laws, policy and guidance. Students learn how to plan audit services in accordance with information security audit standards, guidelines, and best practices as well as how to assess whether an organization has the structure, policies, accountability, mechanisms, and monitoring practices in place to achieve the requirements of corporate governance of IT.
Duration: 7 Weeks weeks
Credit Hours: 4
Students are introduced to concluding topics on advanced cryptographic algorithms, protocols and standards, as well as computational algorithms and methods used in applied cryptology. They are also introduced to methods and concepts of computer calculation involving large integers, computation algorithms optimization issues and numerical analysis software use and development. The course also presents digital signatures, hash functions, authentication schemes, some interactive proof protocols, and use of cryptographic tools and methods in securing network communication. Course also covers some of the issues that typically occur in implementation of cryptography and cryptanalysis such as: generating of large prime numbers, primality testing, prime factorization of large numbers, modulo arithmetic, and randomness testing, are particularly emphasized. Course includes strong implementation and hands-on components.
Duration: 7 Weeks weeks
Credit Hours: 3
Students will learn the function of intrusion detection systems (IDS) and their place in a network. Students learn to identify the characteristics of different networks and their different IDS needs. Students use Snort and Linux. Snort is a popular open source intrusion detection system used to build and enhance your IDS skills. By the end of the course, students are able to plan, install and configure Snort. Students select pre-existing rules to identify and respond to any known network attack. Students are able to create their own Snort rules to identify suspicious network traffic. Students identify the functions of other tools to use alongside Snort to enhance the IDS setup, tools such as ACID, Barnyard and Swatch. Students test and evaluate the effectiveness of an IDS setup and rules, using testing and evasion tools like Stick and Snort. Students determine the need for active response tools like Snortsam and Fwsnort and how to use them to protect a network from malicious packets.
Duration: 7 Weeks weeks
Credit Hours: 3
In this course students build upon the foundational skills developed in the Information Systems Forensics and Investigations course, such as the analysis of seized hard disks and other traditional storage media in conjunction with a small-scale investigation. Through simulated incident response activities, students explore the wide range of systems and environments that an enterprise-class digital forensic analyst would be expected to navigate. Students engage in the hands-on collection and analysis of forensic artifacts from network infrastructure devices, databases, live computer memory and mobile devices while applying the forensic principles of evidentiary integrity. Students also have the opportunity to participate in the legal side of forensics by examining the litigation support role that digital forensics plays within an electronic discovery engagement. Methods of instruction include interactive lectures, hands-on activities, and assignments.
Duration: 7 Weeks weeks
Credit Hours: 4
Students complete the Graduation Project (Phase 1) course which is the first part of an 8-month long capstone project that integrates everything the students have learned in their coursework into one "end-to-end" experience. Students learn how to design and maintain the project plan. They also decide on the IS security-related project topic and obtain internal and external approval for the proposed project. By the end of the term, student groups should have completed the proof of concept/prototyping project phase. Students work on capstone projects in supervised teams. Teams select an appropriate project related to some aspects of IS security, and then learn to develop a plan that leads to success. Teamwork, communication and organizational skills are emphasized in a real-world styled environment.
Duration: 7 Weeks weeks
Credit Hours: 3
Students study IEEE wireless LAN standards. They discuss various types of threats and attacks in wireless networks. Students identify the security vulnerabilities of the original IEEE 802.11 standard. They explore passive wireless discovery, and active attacks. They examine common security models used in WLANs including IEEE 802.11i and Wi-Fi protected Access (WPA and WPA2). Through interactive lectures, hands-on activities and assignments, students examine different types of wireless tools and appliances used to avoid and protect against wireless attacks as well as discuss the best options for implementation.
Duration: 7 Weeks weeks
Credit Hours: 6
Graduation Project (Phase 2) is the final part of an 8-month long capstone project assignment that integrates everything the students have learned in their coursework into one "end-to-end" experience. In this phase, students continue and complete work on the project defined in the first phase of the Graduation Project course. By the end of the term, student groups should have completed the project and presented project final report and deliverables. Students work on capstone projects in supervised teams. Teams select an appropriate project related to some aspects of IS security, and then learn to develop a plan that leads to success. Teamwork, communication, and organizational skills are emphasized as if in a real-world environment.
Duration: 7 Weeks weeks
Credit Hours: 3
Students are introduced to the state-of-the-art process of lawful penetration testing and ethical hacking of applications, systems, and network-connected devices. They apply many of the tools, utilities, and protocols used in penetration testing and vulnerability assessment. Students review, investigate, and interpret legal and ethical aspects of penetration testing activities. Students will master the penetration methodology and the set of technical tasks with the intent to break through the defenses of a computer system or network, the goal being to pro-actively find, identify, and patch security holes and vulnerabilities to prevent unauthorized system compromise. They will develop the key skills to conduct such an assignment, understand and interpret the results and produce a report of their findings.
Duration: 7 Weeks weeks
Credit Hours: 3
Students examine classical and contemporary philosophical views on living a philosophical life in the face of life's dilemmas. They examine their own lives to determine what contributes to a philosophically good life for them. Main foci include philosophical perspectives on friendship, pleasure, happiness, morality, personal identity, freedom, and responsibility. Various philosophical readings, audio-visuals, and lectures introduce students to philosophical ideas and ways of examining life. Philosophical thought experiments and dilemmas hone thinking and problem-solving skills, and foster self-knowledge. Reflective decision-making projects, and other individual evaluation components aim to augment and intensify students' philosophical explorations.
Duration: 7 Weeks weeks
Credit Hours: 3
Students examine the political, social, and cultural forces that have shaped European history from the French Revolution to the end of World War Two. They identify how and why the Modern era developed and evolved, and how it has contributed to the contemporary world. Students explore the nature and development of the French Revolution and its impact on the development of modern Western civilization. In addition to the French Revolution, they analyze the major themes and events of the Restoration, Industrial Revolution, Revolutions of 1848, European Imperialism, and the Era of the World Wars. Through a combination of group activities, discussions and debates, individual and collaborative research, and interactive lectures, students also examine the roots and development of modern statehood, representative government, nationalism, liberalism, and industrialism.
Duration: 7 Weeks weeks
Credit Hours: 3
Students examine the complex and dynamic relationship between leadership, facilitation, and creativity. Through the study of cross-disciplinary theory, they assess conceptions of leadership within a global context and explore processes, methodologies, structures, styles, and skills associated with creative leadership and problem solving. Students also examine cultural factors influencing creative leadership and facilitation abilities in a cross-cultural, international context. Through interdisciplinary readings, interactive lectures, in-class activities, a leadership project and self-reflections, students nurture their creative leadership and problem-solving capacities.
Duration: 7 Weeks weeks
Credit Hours: 3
Students critically examine four aspects of creativity-the creative person, process, product, and press-and increase the degree to which they recognize and nurture their own creative potential. Supported by interdisciplinary research and theory, they also assess the increasing importance and global context of creativity skills in the 21st century. Through interactive lectures, experiential learning activities, written assignments and presentations, students explore foundational concepts in creativity studies and enhance their own creative capacities.

For the 6 credits of professional electives for the Honours Bachelor of Cyber Security students select from:

INFO32297: Security and Privacy in the Cloud OR PROG36577: Reverse Engineering and Exploit Development

AND

INFO43921: Malware OR SYST45904: Data Analytics and AI/ML

Duration: 7 Weeks weeks
Credit Hours: 3
Students explore cloud security, including cloud security design principles and industry compliance requirements. They learn how to deploy and manage secure cloud-based services. The course facilitates learning about the CIA triad and how to implement various CIA protection mechanisms in the cloud. It also provides the best industry practices to identify and mitigate risks for promoting cloud protection using various cloud-based security models. Students will be able to identify vulnerabilities, risks, subjects, objects, threat vectors, threat actors, attacks, and other security/privacy-related issues.
Duration: 7 Weeks weeks
Credit Hours: 3
This professional elective course on reverse engineering and exploit development delves deep into the intricacies of dissecting and analyzing software structures, fostering the ability to identify and mitigate vulnerabilities within applications. Students will gain hands-on experience in leveraging batch scripting for security-centric operations, learning the use of powerful tools such as IDA for dynamic software analysis, and exploring advanced techniques like fuzzing to stress-test software resilience. The course draws inspiration from real-world case studies, equipping learners not only with the skills to uncover software vulnerabilities but also emphasize responsible and ethical exploitation practices.
Duration: 7 Weeks weeks
Credit Hours: 3
Duration: 7 Weeks weeks
Credit Hours: 3
Students are introduced to state-of-the-art malware functionality and protection against malware. Students are provided with the full technical detail that security practitioners need to handle increasingly complex attacks. Students review and investigate and interpret legal and ethical malware related issues.

Gain real-world work experience before graduation

In the Honours Bachelor of Information Science – Cyber Security program, you'll have the benefit of completing a mandatory work term as part of your business degree. This provides valuable work experience and allows you to practice and finesse skills and concepts learned in class. Students who have already obtained more than 420 hours of program-related work experience can apply to have that previous experience applied to the internship credit during their studies.

Duration: 7 Weeks weeks
Credit Hours: 1
Students explore effective Internship job search and self-marketing strategies in preparation for their work-term(s) and career development. Students familiarize themselves with the responsibilities and rights of a student as it relates to professionalism, ethical behavior and relevant policies/legislation during an Internship job search and work-term. Students explore competency development and cultivate an understanding of their personal employability skills and competencies through self-assessment and reflection. They investigate the current industry requirements for their field of study and develop effective job search and self-marketing strategies. Students create job search self-marketing tools that articulate relevant employability skills and competencies to help achieve their employment goals. In addition, students learn effective interview skills and techniques to confidently prepare themselves for employment interviews. Through experiential activities, reflective practice, in-class discussions, and assignments, students are guided to prepare for successful job search and work-term(s).
Duration: 7 Weeks weeks
Credit Hours: 3
Students in the degree Internship work-term apply skills and competencies within a Sheridan-approved work-term. Students self-assess and practice competencies within a work-term setting, develop meaningful and measurable competency learning goals and a plan of action appropriate to the work-term expectations. Throughout the work-term experience, students evaluate their growth and development of competency learning goals. Students interact with industry professionals while developing and expanding skills and competencies in a professional work-term environment. Students gain an understanding of work-term accountabilities for their role as well as the importance of collaboration and teamwork. Students reflect on their experience cultivating self-awareness and growth from real world experiences. Students practice professionalism, and judgment as well as compliance with work-term expectations specific to their role, accountabilities and industry. Through self-assessments, on-going reflection, employer competency assessment/evaluation, and work-term assignments, students are guided to complete a successful work-term and prepare for future career success.

Need More Information?

Submit this form, and an Enrolment Specialist will contact you to answer your questions.

Or call +1-833-588-4325

For inquiries outside of Canada and the US, please call Sheridan College at 905-845-9430 (press option 4) or email at infosheridan@sheridancollege.ca.

** By submitting this form, I am providing my digital signature agreeing that Sheridan College and its agent, Risepoint, may email me or contact me regarding educational services by telephone and/or text message utilizing automated technology or a pre-recorded message at the telephone number(s) provided above. I understand this consent is not a condition to attend Sheridan College or to purchase any other goods or services and that I may unsubscribe from such communication at any time. Privacy Policy.

Take the next step

Start your application today!

Or call +1-833-588-4325 +1-833-588-4325

for help with any questions you have.