About our College

Willis College offers a career-focused approach to adult education, enabling graduates to transition into careers in business, technology, and healthcare.  Over the years, this adult private career college has played a major role in seeing more than 150,000 graduates,   leading successful lives in Canadian communities and around the world.

Cyber Security Analyst - Business, Technology, & Healthcare Programs | Willis College

Search Programs

Cyber Security Analyst

Cyber Security Analyst Diploma Program

(66 Weeks offered in Ottawa and Arnprior)

Every day we read of another company being hacked. At present, attacks outpace defence. One reason for this is the lack of an adequate Cybersecurity workforce. The Cybersecurity workforce shortfall remains a critical vulnerability for Government, Healthcare, Finance, Infrastructure Operators, and private citizens. New solutions are needed to build the Cybersecurity workforce necessary in a networked world. The Cybersecurity Analyst Diploma Program is one of the most effective ways to start a career in Cybersecurity. Willis College provides globally recognized Cybersecurity education as well as industry recognized certifications. You can acquire skills that are applicable and transferable to a variety of security job roles within an operations environment to start a lucrative career in Cybersecurity. In this program, you learn the foundational knowledge and best practices for securing: Windows and Linux workstations and servers, software, network services, routers and switches, email and database infrastructure, and wireless devices. Additionally you learn how to scan networks for vulnerabilities and to produce reports and plans to mitigate those vulnerabilities. Operations style training within a live lab environment is used to help you develop the critical skills needed in defending against complex cyber attacks. This program provides you with hands on training with a focus on threat analysis, risk mitigation, and malware remediation through staged cyber attack simulations and live threat scenarios – carried out with both real and virtual hosts and network appliances.


Computing Hardware and Host Based Security Foundations – 5 weeks

This course covers the hardware and software foundations needed to securely deploy workstations and servers. Topics covered include: assembly, installation, configuration, upgrading, and troubleshooting of PC based hosts. You develop hands on experience within a scenario based lab environment in order to identify software and hardware host based vulnerability issues. You also execute industry best practices for remediation procedures. This course leads to CompTIA A+ Certification.

Windows Network Administration and Security – 12 weeks

This course consist of 3 separate modules and provides you with the knowledge and skills necessary to design key Windows network infrastructure, including the configuration of networking services, virtualization, Active Directory, DNS, Group Policies, encryption, and security. You develop the knowledge and skills of standard practices for vulnerability analysis and server hardening for both real and virtual machines. You develop and implement several mitigation strategies including: application vulnerability patching; administrative controls; server hardening; policy enforcement; network access protection and privilege restriction. Additionally you will learn advanced topics such as: Rights Management, Federation Services, Dynamic Access Control and Failover Clustering. This course leads to Microsoft Certification.

Microsoft Application Services and Security I – Databases – 3 weeks

This course provides you with the knowledge and skills necessary to install and administer Microsoft SQL databases. You develop hands on experience in managing server tools, web services, task automation, and security management. You develop and implement several mitigation strategies including: application vulnerability patching, administrative controls, server hardening, policy enforcement, privilege restriction and backups

Microsoft Application Services and Security II – Messaging Systems – 3 weeks

This course provides you with the knowledge and skills necessary to install and administer Microsoft Exchange servers. You develop hands on experience in managing server tools, mail services, messaging systems, web services task automation, and security management. You develop and implement several mitigation strategies including: application vulnerability patching, administrative controls, server hardening, policy enforcement, privilege restriction and backups.

Linux Systems Administration and Security – 5 weeks

Students will acquire the fundamental knowledge and hands on experience with Linux systems architecture, package management, system services, file systems, administrative tasks, security, data, and accessibility. This course will provide students with advance level knowledge and “hands on” training with Linux device management, E-mail, network services, kernel compilation and Linux security. Within a Linux network lab environment, students will develop the required knowledge, skills and abilities to patch, secure and harden Linux infrastructure. Students will also be introduced to the various industry standard distributions of Secure Edition (SE).

Practicum Placement (Co-op) – 8 weeks

Upon successfully completing all academic and financial commitments of the program, you are hosted by a private or public technical institution. You could perform or job shadow a combination of the following activities at the work place: Work with IT managers, security professionals and service engineers in the public sector and leading corporations, test, and troubleshoot network, desktop and server security support issues, practice skills to work well with others and exhibit professional demeanor in the work place.

Network Architecture Design and Operations – 5 weeks

This course provides you with foundational knowledge and skills required to configure, manage, and troubleshoot today’s wired and wireless network infrastructure. This course also provides you with an understanding of emerging technologies such as unified communications, mobile, cloud, and virtualization technologies. Within a lab environment, you design and implement a secure and trusted network infrastructure and gain a solid understanding of network operations and management. This course leads to CompTIA Net+ Certification.

Network Security Technology I – Routing & Switching – 5 Weeks

In this course the student learns network design and troubleshooting, routed and routing protocols, router configurations, LAN switching theory, virtual LANs, router and switch security, WAN theory and design and WAN technology. This course leads to a Cisco CCNA certification.

Network Security and Unified Threat Management – 6 weeks

This course consists of two modules. In this course, you gain a knowledge and understanding of commercial network security and Unified Threat Management (UTM) solutions. Students install and configure a live security environment implementing firewall policies, VPNs, virus detection, web filtering, application control, and user authentication. Advanced level design threat management lab scenarios include: threat malware mitigation, firewall policies, SSL, IPsec and VPN tunnelling.

Labs & Certification Preparation – 3 Weeks

During these labs, you practice your skills by completing labbased scenarios to reinforce learning and are familiarized with the testing objectives to write an Industry certification. You can access web based labs, videos, and practice exam questions.

Career Management – 1 week

At Willis College, we know that getting your career started is the most important step. We work diligently with leading companies to arrange interviews for you on campus and/or at their location. Some interviews are conducted by our past graduates, who have earned positions of authority in their respective companies. The career development seminars prepare you for these opportunities and cover such topics as: • Self-assessment and the IT job market • Resume writing and cover letters • Interview skills • Job realities • Job hunting techniques

Cyber Security Operations and Threat Analysis – 5 weeks

Because attackers have learned to evade traditional signature based solutions, an analytics based approach within the IT security industry is increasingly important for most organizations. The behavioural analytics skills covered in this course provide you with security skills to identify and combat malware and advanced persistent threats (APTs) across a broad attack surface. Trained within an operational style lab environment, you develop the skills required to perform network reconnaissance, threat identification, threat mitigation, vulnerabilities analysis, security incidents investigation, security issues monitoring, and cyber security threat analysis.This course leads to CompTIA CySA+ Certification.

Effective Learning & Career Planning – 1 week

This course will help the student establish appropriate learning expectations and the skills necessary to understand and build high-performance college and career skills and behaviors. It introduces various concepts in career and study planning and how to effectively manage personal resources to achieve career and academic goals.

Business IT Skills – 1 week

As an integrated approach to the overall curriculum design, this module will provide students with a structured learning framework that will assist them in the development of the required blend of technical knowledge and soft skills needed to be competitive upon entering the labour market.

Hands-On Ethical Hacking and Network Defense – 3 weeks

This course provides you with knowledge and hands on skills in Ethical Hacking, Red Team/Blue Team, and Cyber Defence Counter Measures. Through exposure to various live lab attack scenarios, you gain a solid understanding of hacker attack vectors, techniques, methodologies, and tools. Working in Blue Teams/ Red Teams, you participate in complex threat scenarios with a focus on Foot Printing and Reconnaissance, Social Engineering, Network Scanning, Enumeration, and Cryptography. Using secure live lab simulations, students “Hack to Learn” in order to better understand and defend against the “Hacker Mindset”. Real world attack simulations include: System Hacking, Denial of Service and Session Hijacking, Web Application/Server Attacks, SQL injections, Wireless/Mobile Hacking, Evasion of IDS/Firewalls/ Honeypots, and offensive security tactics. Upon successful completion of this course, you will possess the necessary knowledge and skills within the domain of Hacking and Penetration Testing to effectively deploy countermeasures against these threats.

Veteran Friendly Transition Program (VFTP) Services

The Veteran Friendly Transition Program (VFTP) is offered the George L. Sparks Learning Center in Ottawa, and the Joan D. Bray Learning Center in Arnprior. VFTP is a service that supports you, the Veteran, during your transition from service. It includes career coaching, employment counselling, Veteran peer support, and training classes on all aspects of transition. The aim of the program is to provide you with a flexible and supportive Veteran-friendly learning environment that will enable you to find gainful and meaningful employment following your service to Canada. Program components include the following: • Veteran Career Support Program • Veteran Personal Support Program • Veteran Training Support Program • Veteran Employment Support Program

Note: This program is designed, developed, and delivered for Canadian Veterans ONLY.  This program does not require approval under the PCC Act, 2005.


Request Info for Courses

WordPress Video Lightbox