About our College

Willis College offers a career-focused approach to adult education, enabling graduates to transition into careers in business, technology, and healthcare.  Over the years, this adult private career college has played a major role in seeing more than 150,000 graduates,   leading successful lives in Canadian communities and around the world.

Cyber Security Analyst Diploma Program

Cyber Security Analyst Diploma Program

66 Weeks

The Willis College Cyber Security Analyst Program (CSA) prepares students for a career in many areas of Cyber Security. These careers include: Cyber Security Operator, Cyber Security Analyst, Penetration Tester, Security Administrator, and other related Analyst, Tester and Specialist roles.  Students will become skilled in the configuration of security devices, computers, routers, switches, operating systems, email, databases, applications, script development and secure coding practices. Additionally, students will be able to analyze, identify and document security vulnerabilities – and provide strategies for mitigating those vulnerabilities.

 

All instructional material in this program is based upon industry standard certification requirements from well-known experts in the field such as: CompTIA, Cisco, Microsoft, The Linux Professional Institute, EC-council, and industry experts Sophos, Fortinet, Check Point and Sonicwall.

 

In this program students will learn to:

  1. Securely deploy computers, operating systems, networking hardware and applications.
  2. Securely deploy Windows servers, domains, roles and services.
  3. Securely deploy Linux based servers and services.
  4. Securely deploy crucial services such as DHCP, DNS, Access Policy and Authentication.
  5. Securely deploy crucial Microsoft business infrastructure such as Exchange and SQL Server.
  6. Test for and identify system wide vulnerabilities and provide documented evidence and suggestions for mitigating those vulnerabilities.
  7. Deploy network security devices and apply industry best practices to strengthen security and mitigate vulnerabilities.
  8. Think like a Hacker – and know a Hacker’s tools and methods of exploitation so countermeasures can be taken to secure against them.
  9. Plan, build and maintain software, scripts and software related tools. Debug and test code, and identify flaws and vulnerabilities and correct them.

The following sections provide details of the individual courses that comprise the CSA Program.

 

Computing Hardware and Host Based Security

This course will cover the hardware and software foundations utilized within a host based computing environment. Topics covered will include assembly, installation, configuration, upgrading and troubleshooting of PC based hosts.  Students will develop “hands on” experience within a scenario based lab environment in order to identify software and hardware host based vulnerability issues and will execute industry best practice remediation procedures.

This course is based upon material which covers CompTIA A+ Certification exam requirements.

 

Network Architecture Design and Operations

This course will provide students with foundational knowledge and skills required to configure, manage, and troubleshoot today’s wired and wireless network devices. This course will also provide students with an understanding of emerging technologies such as unified communications, mobile, cloud, and virtualization technologies.  Within a lab environment students will design and implement a secure and trusted network infrastructure and will gain a solid understanding of network operations and management.

This course is based upon material which covers CompTIA Net+ Certification exam requirements.

Windows Network Administration and Security

This course will provide students with the knowledge and skills to design and secure Windows network infrastructure including the configuration of networking services, virtualization, Active Directory, DNS, group policies, encryption and security. Using real hardware and a Microsoft Azure Cloud environment, students will also learn to administer and manage server accounts, network services, group policies and network security.  Students will learn to apply best practices for vulnerability analysis and server hardening. Students will develop and implement several mitigation strategies including, application vulnerability patching, administrative controls, server hardening, policy enforcement and privilege restriction.

This course is based upon material which covers Microsoft Server Administration Certification exam requirements.

Microsoft Application Services and Security

This course will provide students with the knowledge and skills to install and administer Windows database, mail and web application servers. Students will develop “Hands on” experience in managing server tools, mail services, messaging systems, web services task automation and security management. Students will develop and implement several mitigation strategies including, application vulnerability patching, administrative controls, server hardening, policy enforcement, data backup and privilege restriction.

This course is based upon material which covers Microsoft Exchange and SQL Server Certification exam requirements.

 

Linux Network Engineering and Security

Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone. This growth creates a high demand for qualified Linux professionals. Students will acquire the fundamental knowledge and hands on experience with Linux systems architecture, package management, system services, filesystems, administrative tasks, security, data, and accessibility.

This course is based upon material which covers LPIC-1 Exam 1 Certification exam requirements.

 

Linux Systems Administration and Security

This course will provide students with advance level knowledge and “hands on” training with Linux device management, E-mail, network services, kernel compilation and Linux security. Within a Linux network lab environment, students will develop the required knowledge, skills and abilities to patch, secure and harden Linux infrastructure. Students will also be introduced to the various industry standard distributions of Secure Edition (SE) Linux.

This course is based upon material which covers LPIC-1 Exam 2 Certification exam requirements.

 

Network Security and Defense Foundations

IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With large amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. Students will gain a solid understanding of network security practices including control fundamentals, security threats, network attacks, vulnerability assessment, penetration testing, security controls, wireless security and Computer Forensics

This course is based upon material which covers CompTIA Sec+ Certification exam requirements.

 

Network Security and Unified Threat Management

In this course students will gain the knowledge and understanding of commercial network security and Unified Threat Management (UTM) Solutions. Students will install and configure a live security environment implementing firewall policies, VPNs, virus detection, web filtering, application control, user authentication.  Advanced level design threat management lab scenarios will include threat malware mitigation, firewall policies, SSL, IPsec and VPN tunneling.

This course is based upon material which covers industry partner certification exam requirements.

 

Cyber Security Operations and Threat Analysis

As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioral analytics skills covered in this course will provide students with security skills to identify and combat malware, advanced persistent threats (APTs) across a broad attack surface. Trained within an operational style lab environment students will develop the required skills perform, network reconnaissance, threat identification, threat mitigation, vulnerabilities analysis, security incidents investigation, security issues monitoring and cyber security threat analysis.

This course is based upon material which covers CompTIA CSA+ Certification exam requirements.

 

Ethical Hacking and Counter Measures

This course will provide students with knowledge and hands on skills in Ethical Hacking, Red Team / Blue Team and Cyber Defense Counter Measures.  With exposure to various live lab attack scenarios, students will gain a solid understanding of Hacker attack vectors, techniques, methodologies and tools.  Working within Blue Teams / Red Teams, students will participate in complex threat scenarios with a focus on Foot Printing and Reconnaissance, Social Engineering, Network Scanning, Enumeration and Cryptography.

Through secure live lab simulations you will “Hack to Learn” in order to better understand and defend against the “Hacker Mindset”.  Real world attack simulations include, System Hacking, Denial of Service and Session Hijacking, Web Application / Server Attacks, SQL injections, Wireless / Mobile Hacking, Evasion of  IDS / Firewalls / Honeypots and offensive security tactics.  Upon completion of this course you will possess the necessary knowledge and skills within the domain of Hacking and Penetration Testing.

This course is based upon material which covers EC-Council Certification exam requirements.

 

Software Development, Scripting and Tools

In this course students will gain the knowledge and skills to develop, debug, troubleshoot and analyze computer code and scripts. They will additionally learn how to install and maintain software development tools and to identify and rectify security flaws and vulnerabilities in code and scripts. Topics covered will include: Java and JavaScript development, capturing design and security requirements via design documents and flowcharts, awareness and identification of attack surfaces in software systems, testing software and upgrading and patching software tools and systems.

 

Veteran Specific Details

Veteran friendly education and training are delivered by leading Canadian Academic InstitutionsWillis College, est. 1866, was chosen as the location for the pilot because it has worked with Veterans throughout its history, providing job-ready education and training programs in the shortest period of time to allow Veterans to find work following their retirement from service.

If you are a Veteran student currently attending Willis College in Ottawa or Arnprior, you will be supported with the Veteran Friendly Transition Program services such as Veteran Career Support, Veteran Personal Support, Veteran Training Support, and Veteran Employment Support free of charge.

 

Request Program Info

WordPress Video Lightbox