Program Information

The Cyber Security and Computer Forensics, Ontario College Graduate Certificate program provides students with key concepts of information security, technical and practical job skills necessary to secure, protect and defend network infrastructures and an organization’s valuable data assets.

The curriculum provides for a broad understanding of cyber security concepts, industry best practices for information security and key security concepts that will protect an organization against fraud, data breaches and other vulnerabilities. The program is designed to prepare information and digital security professionals with the ability to manage, provide policies, standards, procedures, guidelines, policy framework, assess and mitigate risk and integrate advanced security solutions.

The growing Internet security sector requires an in-depth understanding of cyber security issues, and fundamental Internet architecture and protocols. In addition, network security skills such as packet, vulnerability, exploit analysis, and cyber security research are also discussed. Graduates will develop highly marketable skills that are required in the burgeoning cyber security field.

Fall 2023 Delivery Format

Term 1 classes will be delivered in person and students will be required to be on campus for the duration of the term. The 2023 Fall term begins on September 6. However, to allow for travel delays, classes will be remote until September 16. Students must be on campus to join in-person classes starting September 18, 2023.

This Lambton College program is licensed to and delivered by Queen's College (PDF), a licensed private career college in Mississauga, Ontario. Students that are registered at Lambton in Mississauga are students of a public college and as such, will receive full credit from Lambton College for all Lambton College courses completed at the Queen's College campus in Mississauga. Students who meet program graduation requirements will graduate with a credential from Lambton College. Students may be scheduled to have classes on Saturdays.

See Course List

Admission Requirements

A university degree in the information technology field.

The admissions process is competitive and meeting the minimum academic requirements does not guarantee admission.

Lambton College reserves the right to alter information including admission requirements and to cancel at any time a program or course; to change the location and/or term in which a program or course is offered; to change the program curriculum as necessary to meet current competencies or changes in the job market; to change the pathways third-party certification bodies; or to withdraw an offer of admission both prior to and after its acceptance by an applicant or student because of insufficient applications or registrations or over-acceptance of offers of admission. In the event Lambton College exercises such a right, Lambton College’s sole liability will be the return of monies paid by the applicant or student to Lambton College.

English Language Requirements

Applicants must demonstrate language proficiency by submitting one of the following scores:

  • IELTS of 6.5
  • TOEFL iBT 79
  • Passed Lambton Institute of English placement test 

Please Note: IELTS is the only proficiency score accepted by the Study Direct Stream (SDS) program. Additional country-specific requirements may also be applicable.

Meeting the minimum English requirements does not guarantee admission. Students with higher English proficiency scores will receive priority in the admission assessment process.

Technology Requirements

In order to keep pace with the requirements of each and every course in your program, it is mandatory to own a reliable laptop to complete tests and assignments.

Course List

ISN-1003: Principles of Information Security

This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, the terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management.

ISN-1103: Security Policies

Students study key structure elements and terms of written information protection policy and review typical policy contents. Students develop the related standards, procedures, and guidelines for implementing the policy. Students evaluate the tools needed to select, develop, and apply a security program that meets business goals.

ISN-1204: Operating Systems Security - Windows

Preparing students to recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications, this course introduces defence strategies through understanding of system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies.

ISN-1403: Legal and Ethical Issues in IT Security

This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.

ISN-1504: Linux, Firewalls and VPN's

This course explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.

ISN-1903: Wireless and Mobile Device Security

Students explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, the student discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.

ISN-1303: Ethical Hacking and Network Defense

This course prepares students to assess and then correct vulnerabilities present within information systems. Students are introduced to tools and penetration testing methodologies used by ethical hackers. What and who ethical hackers are and how they protect corporate and government data from cyber-attacks is discussed. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types" systems are also investigated.

ISN-1604: Hacker Techniques, Tools and Incident Handling

Students examine and analyze the landscape, key terms and concepts. Security professional need to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.

ISN-1703: Mobile Application Security Design

This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Students are introduced to a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

ISN-1803: Computer Forensics and Investigation

The objective of this course is to introduce computer forensics and methods of investigations. Students examine and discover information through computer forensics, triage and eDiscovery methods.. Students are introduced to digital forensic tools in order to acquire, preserve, and manage digital evidence to support investigations. They will also learn to analyze cyber intrusion, examine organizational policy violations and resolve disputes. Important concepts such as chain of custody and documentation of evidence/procedures are also covered. Students evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.

ISN-2003: Network Security and Penetration Testing

Students examine the realm of network security, spotlighting the latest threats and vulnerabilities. The students address how and why people attack computers and networks--equipping them with the knowledge and techniques to successfully consider methods of combatting hackers.

ISN-2104: Capstone Information Security Project

This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity, and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design phase through presentation of the final product.

JSS-1001: Job Search and Success

This course is designed to give the student an understanding of how to conduct a job search and how to succeed in the work place. This includes self-reflection, effectively designing a cover letter and resume, online job searches utilizing social media, behavioural based interviewing as well as marketing oneself effectively in a job interview. Job safety, successful work strategies and harassment and discrimination plan of action is also discussed.

Academic Break

ISN-2204: Ethical Hacking and Countermeasures: Attack Phases

Students learn how to scan, test, hack and secure their own systems in a controlled lab environment. Students explore how intruders escalate privileges and methods to secure a system. Students also learn about various methods including Introduction to Ethical Hacking, Foot Printing, Scanning, Enumeration, System Hacking and Penetration Testing.

ISN-2304: Ethical Hacking and Countermeasures: Threats and Defense Mechanisms

Students learn how to scan, test, hack and secure their own systems in a controlled lab environment. Students will discover how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about various methods including Trojans and Backdoors. Viruses, Worms, Sniffers, Social Engineering, Phishing, Denial of Service and Buffer Overflows.

ISN-2404: Ethical Hacking and Countermeasures: Web Applications and Data Servers

Students learn how to scan, test, hack and secure their own systems in a controlled lab environment. Students will explore how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about various methods including Session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web-Based Password Cracking Techniques, Hacking Web Browsers, SQL Injection and Hacking Database Servers.

ISN-2504: Ethical Hacking and Countermeasures: Secure Network Infrastructures

In this course, the students will learn about cryptography, hacking wireless networks, and evading network security technologies (i.e. IDS, Firewalls, and Honeypots). Cryptography is the most important and fundamental concept in information security. In the Cryptography module, the students will gain an insight into the cryptographic science, algorithms, tools, techniques, and solutions such as Public Key Infrastructure (PKI), email encryption, and disk encryption. Moreover, the students will learn about the security concerns and attacks to the cryptographic technologies. The security of today's Wireless Networks is heavily reliant of cryptographic techniques. Once the students gained the necessary knowledge and experiment about the cryptography, they'll be ready to step into the realm of "Hacking the Wireless Networks". In this module, the students will learn and practice the wireless hacking techniques which are being used by the hackers to compromise the wireless networks. This includes a comprehensive understanding of concepts, threats, tools, techniques, and penetration testing techniques associated to the wireless networks. The students will also discuss the security controls and countermeasures to preserve the security posture of wireless networks. In the last module of this course, the students will learn about Firewall (FW), Intrusion Detection System (IDS), and Honeypot, as well as the tools and techniques that the hackers use to evade them. The students will learn the penetration testing tools and techniques to examine these network security technologies, and will determine and analyze the security controls and countermeasures.

ISN-2604: Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

In this course, the students will learn about the concepts and the information security aspects of Cloud Computing and Mobile Platforms. The students will gain an insight into cloud penetration testing and cloud security threats, attack vectors, tools, and necessary security controls and techniques to preserve the security posture of cloud technologies. Moreover, the students will be able to conduct a cloud security audit and prepare cloud security guidelines. This course introduces the Mobile Device Management (MDM) and Bring Your Own Device (BYOD), and covers multiple aspects of mobile security, including the anatomy of mobile attacks, mobile attack vectors, associated vulnerabilities and risks, security issue arising from the app stores, app sandboxing issues, mobile spam, pairing mobile devices on open Bluetooth and Wi-Fi connections. The students will also learn Mobile Hacking techniques on iOS, Android OS, Windows Mobile OS and Blackberry, as well as the technical tools and techniques to protect the mobile platforms.

CPL-1049: Work Term - Full-Time*

Co-operative education provides students with the opportunity to apply classroom learning to the workplace, undertake career sampling and gain valuable work experience that may assist students in leveraging employment after graduation. For further information regarding co-op, please refer to:


CPL-5559: WIL Project

Work Integrated Learning (WIL) Project is aimed at enriching students by connecting different program areas of study, cutting across subject-matter lines, and emphasizing unifying concepts. The focus of the WIL Project is to make connections between study and industry by engaging students in relevant and meaningful activities that are connected to and practiced within the professional workplace. WIL Project allows students to enhance and strengthen their employability prospects post-graduation by fine tuning skills and knowledge and meeting the expectations of today's employers. Students are required to attend the scheduled shifts in the WIL office, reporting to the WIL Supervisor. Weekly real-world challenges are presented in the WIL office, designed by industry professionals. In addition to the weekly assigned deliverables, students are also offered professional development sessions, and exposed to industry guest speakers, enhancing their opportunity to develop their professional network.

Co-op Eligibility

*In order to be eligible to participate in a full-time Co-op Work Term (CPL-1049) students must have a GPA of 2.8 or greater.

Failing to do so will require the students to enroll in CPL-5559 WIL Project at an additional cost to the student.

See the Costs tab for current fees.

Program Maps

Students are required to follow their prescribed program map and are not allowed to take unscheduled breaks for any reason.

Current Students

Current students can view program maps from previous years on the mylambton website. 

You will need to login with your C# and password in order to access your program map.

Employment Opportunities

In the information security field, there are several roles an information network security administration graduate could hold including: network administrator, systems security analyst, network security analyst, computer security consultant, computer support specialist, systems administrator, computer scientist, database administrator, computer specialist, network systems and data communication analyst and digital forensics investigator.

Graduates who gain several years of specialized work experience may also hold positions as information security managers or network security supervisors.

For information about post-graduate work eligibility for international students, please review the Post-Graduate Work Permit Program information.

For more information, please contact the appropriate campus:

Sarnia Campus
905-890-7833 x 222
Back to Top