CyberSecurity Analyst

CyberSecurity Analyst

Take the next step towards your new career

Find out more information about start dates, requirements, tuition & financial aid

Get More Information
Ottawa Campus
On Campus ,   Online
Program Length:
64 weeks
Diploma Issued:

Become A CyberSecurity Analyst

Every day we read of another company being hacked. At present, these attacks outpace the defence, and one reason for this is the lack of an adequate CyberSecurity workforce. The CyberSecurity workforce shortfall remains a critical vulnerability for governments, healthcare, and finance, as well as for infrastructure operators and private citizens. New solutions are needed to build the CyberSecurity workforce necessary for a networked world. The CyberSecurity Analyst diploma program is one of the most effective ways to start a career in CyberSecurity. Willis College provides globally recognized CyberSecurity education as well as industry-recognized certifications. You can acquire skills that are applicable and transferable to a variety of security job roles in the operations environment and start a lucrative career in CyberSecurity. In this program, you will learn foundational knowledge and best practices for securing Windows and Linux workstations and servers, as well as software, network services, routers and switches, email and database infrastructure, and wireless devices. You will also learn how to scan networks for vulnerabilities and produce reports and plans which will mitigate those vulnerabilities. Operations-style training within a live lab environment is used to help develop the critical skills needed in defending against complex cyber attacks. This program provides hands-on training with a focus on threat analysis, risk mitigation, and malware remediation through staged cyber-attack simulations and live threat scenarios carried out with both real and virtual hosts and network appliances. In this program, students will learn to:

  • Securely deploy computers, operating systems, networking hardware, and applications.
  • Securely deploy Windows servers, domains, roles, and services.
  • Securely deploy Linux based servers and services.
  • Securely deploy vital services such as DHCP, DNS, Access Policy, and Authentication.
  • Securely deploy crucial Microsoft business infrastructures such as Exchange and SQL Server.
  • Test for and identify system-wide vulnerabilities and provide documented evidence and suggestions for mitigating those vulnerabilities.
  • Deploy network security devices and apply industry best practices to strengthen security and mitigate vulnerabilities.
  • Think like a Hacker – and know a Hacker’s tools and methods of exploitation so countermeasures can be taken to secure against them.

Total program length is 64 weeks
60 weeks of instruction
Up to 4 weeks of breaks

Our Ottawa, Ontario campus is registered with the Ontario Ministry of Colleges and Universities under the Private Career Colleges Act, 2005.

Willis Cybersecurity Academy

Willis College has taken the lead in addressing the critical Cybersecurity and Network Security skills shortage by establishing Willis Cybersecurity Academy. The academy is equipped with our partner’s state-of-the-art network devices and uses an industry-standard curriculum taught by our professional instructors. All of this combines to provide a comprehensive offensive and defensive cybersecurity training environment. Graduates of this program go on to work for leading corporations like Sophos, Check Point, Fortinet, Bell Canada, the public sector, and other leading organizations.

Job Market

Successful graduates of this CyberSecurity Analyst course may pursue a wide variety of interesting and rewarding professions, including:

  • CyberSecurity Analyst
  • CyberSecurity Operator
  • Computer Network Technician
  • Network Security Analyst
  • Risk/Vulnerability Analyst
  • Cyber Incident Response Analyst
  • Cyber Intrusion Analyst
  • Penetration Tester
  • Blue Team Specialist
  • Red Team Specialist
  • Network Systems and Data Communications Analyst
  • Intrusion Detection System (IDS) Administrator
  • Enterprise Network Defence (END) Administrator

Employers of Willis College CyberSecurity Graduates

  • Consulting firms
  • CyberSecurity agencies
  • Government agencies
  • Independent software vendors
  • IT security agencies
  • Managed Security Service Providers (MSSPs)
  • System Integrators
  • Value-added resellers

Why Choose Online Learning

Welcome To Willis College Online. A Different Way To Learn.

Online learning is broken. The traditional online learning model of sending a student their learning materials and expecting them to complete things alone each week doesn’t work. Students feel alone, not sure if they are doing things right, constantly feel the pressure of feeling behind in their work, and the goal of graduating and finding a career seems far off in the distance. To fix this problem, we have taken an entirely different approach to how online learning is done. Willis College Online is bringing the benefits of learning on-campus right into your home.

What makes Willis College Online different?

  • Learn 100% online: Each online program is delivered 100% online with freedom in your schedule as to when you want to learn.
  • Instructor-led program: You will have the choice to either attend live lectures each day online or watch later on-demand. As well, since each lecture is recorded, you will have the ability to go back and review the materials taught by your instructor.
  • Instructor-paced program: You don’t need to worry if you are falling behind. Your instructor keeps you on pace to graduate on time
  • Live daily instructor access: Your instructor maintains regularly scheduled office hours to help you with any concepts or material
  • Mandatory weekly group Q&A sessions with your instructor: This allows your learning cohort a chance to interact with one another and the instructor to get questions answered weekly
  • Finish in under a year: Successful students will graduate in under a year
  • Career support from day one: One-on-one employment & practicum support for graduating student
  • Learn from anywhere in Canada: Our number one goal is to help you prepare for the right career no matter where you live in Canada

Willis College Online is the newest and easiest way to get started towards your new career. Financial aid may be available to those who qualify. Take the next step and speak to one of our Admissions Advisors today.

Admission Requirements

Admission Requirements:
Canadian High School diploma or equivalent. Willis College Admission’s Team uses the Wonderlic assessment tool.

For Mature Students:
If you don’t have a High School Diploma, we have admissions options specifically for you depending on which province you are in enrolling. Please contact us to see how our Admissions Team can help you achieve your new career.

Are you looking to apply as an International Student?

Find out more about international student admissions requirements.

Program Outline

Please click on the course title to see the course description.

  • Career Management

    Our Career Management course will introduce students to and teach them how to apply the most effective strategies to achieve employment in the career of their choice. Topics that are covered; effective job search strategies, cover letter and strategic resume writing, interview preparation and effective interviewing skills.
  • Cloud Security

    This course will cover various cloud concepts that will teach the skills needed to maintain, optimize and secure cloud infrastructure services.
  • Coding for Pentesters

    This course will cover various coding languages and concepts to allow penetration testers to develop customer code/scripts. Languages such as Perl, Python, Ruby, Powershell, PHP are covered. Concepts such as scanner scripting, information gathering, exploitation scripting and post-exploitation scripting are taught.
  • Computer Hardware and Host Based Security Foundations

    This course will cover the hardware and software foundations utilized within a host-based computing environment. Topics covered will include assembly, installation, configuration, upgrading and troubleshooting of PC-based hosts. Students will develop & hands experience within a scenario-based lab environment in order to identify software and hardware host-based vulnerability issues and will execute industry best of practiced remediation procedures.
  • Cybersecurity Operations and Threat Analysis

    As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioural analytics skills covered in this course will provide students with security skills to identify and combat malware, advanced persistent threats (APTs) across a broad attack surface. Trained within an operational style lab environment students will develop the required skills to perform, network reconnaissance, threat identification, threat mitigation, vulnerabilities analysis, security incidents investigation, security issues monitoring and cyber security threat analysis.
  • Digital Forensics

    This course will cover various digital forensic concepts that will introduce the student to Digital Forensics - its tools, methods and procedures. Digital Forensics allows security experts to detect subtle attacks that don’t display any easily noticeable evidence that they are occurring or have occurred. Digital Forensics allows security experts to gather proof and actionable evidence in the event legal action must be taken as a result of the cybersecurity attack. Digital Forensics knowledge gives security experts a deeper understanding of the operations of computers, software, protocols, security methods and hardware.
  • Ethical Hacking and Countermeasures

    This course will provide students with the knowledge and hands-on skills in Ethical Hacking, Red Team / Blue Team and Cyber Defense Countermeasures. With exposure to various live lab attack scenarios, students will gain a solid understanding of Hacker attack vectors, techniques, methodologies and tools. Working within Blue Teams / Red Teams, students will participate in complex threat scenarios with a focus on Foot Printing and Reconnaissance, Social Engineering, Network Scanning, Enumeration and Cryptography. Through secure live lab simulations, you will "Hack to Learn" in order to better understand and defend against the "Hacker Mindset". Real-world attack simulations include System Hacking, Denial of Service and Session Hijacking, Web Application / Server Attacks, SQL injections, Wireless / Mobile Hacking, Evasion of IDS / Firewalls / Honeypots and offensive security tactics. Upon completion of this course, you will possess the necessary knowledge and skills within the domain of H.
  • Helpdesk

    This course will cover the deployment and use of helpdesk IT support software that provides IT support services to end-users. Additionally, tools needed for identifying and managing computer resources as it relates to Helpdesk activity will be covered.
  • Linux Systems Administration and Security

    Linux has grown into an industry-leading software and service delivery platform that is used for everything from supercomputers and Web servers to virtualized systems and your Android phone. This growth creates a high demand for qualified Linux professionals. Students will acquire the fundamental knowledge and hands-on experience with Linux systems architecture, package management, system services, file systems, administrative tasks, security, data, and accessibility.
  • Network Architecture Design and Operations

    This course will provide students with the foundational knowledge and skills required to configure, manage, and troubleshoot today's wired and wireless network devices. This course will also provide students with an understanding of emerging technologies such as unified communications, mobile, cloud, and virtualization technologies. Within a lab environment, students will design and implement a secure and trusted network infrastructure and will gain a solid understanding of network operations and management.
  • Network Security and Defense Foundations and Advanced Report Writing

    IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With large amounts of data transmitted and stored on networks throughout the world, it is essential to have effective security practices in place. Students will gain a solid understanding of network security practices including control fundamentals, security threats, network attacks, vulnerability assessment, penetration testing, security controls, wireless security and Computer Forensics. Students will also learn to create advanced reports such as Penetration Testing and Vulnerability Analysis Reports.
  • Network Security and Unified Threat Management

    In this course, students will gain the knowledge and understanding of commercial network security and Unified Threat Management (UTM) Solutions. Students will install and configure a live security environment implementing firewall policies, VPNs, virus detection, web filtering, application control, user authentication. Advanced level design threat management lab scenarios will include threat malware mitigation, firewall policies, SSL, IPsec and VPN tunnelling.
  • Network Security Technology – Routing & Switching

    The student learns basic network design and troubleshooting, routed and routing protocols, router configurations, LAN switching theory, virtual LANs, Novell IPX, WAN theory and design, WAN technology, PPP, frame relay, and ISDN. IT follows the track for the Cisco CCNA certification.
  • Report Writing and Documentation

    This course will teach students how to generate various technical reports that they may have to create as part of their technical careers. The ability to gather technical information and express it in a well-organized and intelligible format that can be understood by management and technical peers alike is key for the dissemination of vital information. The types of reports covered will include: Network Asset Reports, Physical and Logical Network Topologies, Vulnerability Assessment Reports and Penetration Testing Reports.
  • Security Operations Centre Analysis

    As the security landscape is expanding, a SOC team offers high-quality IT security services to detect potential cyber threats/ attacks actively and quickly respond to security incidents. Organizations need skilled SOC Analysts who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats. The lab-intensive SOC Analyst training program emphasizes the holistic approach to delivering elementary as well as advanced knowledge of how to identify and validate intrusion attempts. Through this, the candidate will learn to use SIEM solutions and predictive capabilities using threat intelligence. The program also introduces the practical aspect of SIEM using advanced and the most frequently used tools. The candidate will learn to perform enhanced threat detection using the predictive capabilities of Threat Intelligence.
  • Threat Intelligence Analysis

    Traditional approaches to malicious attacks are slowly dying out, with new malware formed every four seconds. However, many organizations today still follow the basic, traditional methods to address these evolving techniques. Reacting to threats is extremely important but reacting also signifies that the damage is already done. Having a threat intelligence analyst will give organizations the chance to fight the unforeseen battles that are constantly arising in the cyber world. A skilled threat intelligence analyst will be able to gather large amounts of relevant threat information from a multitude of intelligence sources which will then be analyzed to provide threat intelligence that accurately predicts the potential threats that an organization may encounter.
  • Windows Administration Security I – Core Infrastructure

    The course is intended for students who have good Windows operating system knowledge and experience and want to acquire the skills and knowledge necessary to implement the core infrastructure services in an existing Windows Server environment.
  • Windows Administration Security II – Active Directory Services

    This course provides the student with the knowledge and skills to configure Active Directory Domain Services in a distributed environment, implement Group Policies, perform backup and restore, and monitor and troubleshoot Active Directory related issues.
  • Windows Administration Security III – Advanced Services

    This Advanced Windows Server® Services training allows students to learn how to provision and configure advanced services using Windows Server.
  • Windows Applications Security I – Databases

    This course will help introduce new features and functionality in Windows SQL day-to-day management, networking infrastructure, storage, and access control. Specific technologies covered will include Dynamic Access Control (DAC), Failover Clustering, Microsoft Online Backup, Security and Hyper-V.
  • Windows Applications Security II – Messaging Services

    In this course, students will learn to configure and manage a Microsoft Exchange Server messaging environment. This course will teach students guidelines, best practices, and considerations that will help them optimize their Exchange server deployment. It will also provide the knowledge and skills to plan, install, and manage the mailbox role, client access, transport, and Exchange infrastructure.
When I first started at Willis I was a shy, self-conscious girl… but Willis changed all that! My time at Willis was knowledgeable, fun and most importantly self-rewarding. The PSW program was amazing. I learned so much. All of the staff are absolutely awesome; they looked at you as a person and not just a number filling up a seat. Rachel Goyer Personal Support Worker

Take the First Step in Your Career

Fill in the form below to receive more information about our programs.

I agree to receive future communications from Willis College and understand I may opt out at any point in the future.
100% Privacy Guaranteed