Cyber Security & Computer Forensics

International

Course List

Term 1

ISN-1003: Principles of Information Security

This course provides students with a background in information security, security management, and the technical components of security. Students gain an overview of the entire field of information security: the history, the terminology, and the management aspects of information security programs with sufficient detail to facilitate an understanding of information security systems and their management.

ISN-1103: Security Policies

Students study key structure elements and terms of written information protection policy and review typical policy contents. Students develop the related standards, procedures, and guidelines for implementing the policy. Students evaluate the tools needed to select, develop, and apply a security program that meets business goals.

ISN-1204: Operating Systems Security - Windows

Preparing students to recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications, this course introduces defense strategies through understanding of system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies.

ISN-1403: Legal and Ethical Issues in IT Security

This course explores legal and ethical issues faced in the information technology field. Students learn about ethical issues within an organization as they relate to relationships internally as well as with customers, partners, and society. Students explore how Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion.

ISN-1504: Linux, Firewalls and VPN's

This course explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.

ISN-1903: Wireless and Mobile Device Security

Students explore the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, the student discusses risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. Students will look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.

Term 2

ISN-1303: Ethical Hacking and Network Defense

This course prepares students to assess and then correct vulnerabilities present within information systems. Students are introduced to tools and penetration testing methodologies used by ethical hackers. What and who ethical hackers are and how they protect corporate and government data from cyber-attacks is discussed. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types" systems are also investigated.

ISN-1604: Hacker Techniques, Tools and Incident Handling

Students examine and analyze the landscape, key terms and concepts. Security professional need to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.

ISN-1703: Mobile Application Security Design

This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Students are introduced to a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

ISN-1803: Computer Forensics and Investigation

The objective of this course is to introduce computer forensics and methods of investigations. Students examine and discover information through computer forensics, triage and eDiscovery methods.. Students are introduced to digital forensic tools in order to acquire, preserve, and manage digital evidence to support investigations. They will also learn to analyze cyber intrusion, examine organizational policy violations and resolve disputes. Important concepts such as chain of custody and documentation of evidence/procedures are also covered. Students evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.

ISN-2003: Network Security and Penetration Testing

Students examine the realm of network security, spotlighting the latest threats and vulnerabilities. The students address how and why people attack computers and networks--equipping them with the knowledge and techniques to successfully consider methods of combatting hackers.

ISN-2104: Capstone Information Security Project

This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity, and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design phase through presentation of the final product.

Term 3

CPP-1001: Co-op Preparation

This workshop will provide an overview of the roles and responsibilities of the Co-operative Education Students and the Co-operative Education Advisors as well as the Co-operative Education policy. It will provide students with employment preparatory skills specifically related to Co-operative Education work terms and will prepare students for their Co-operative Education work term job search.

ISN-2204: Ethical Hacking and Countermeasures: Attack Phases

Students learn how to scan, test, hack and secure their own systems in a controlled lab environment. Students explore how intruders escalate privileges and methods to secure a system. Students also learn about various methods including Introduction to Ethical Hacking, Foot Printing, Scanning, Enumeration, System Hacking and Penetration Testing.

ISN-2304: Ethical Hacking and Countermeasures: Threats and Defense Mechanisms

Students learn how to scan, test, hack and secure their own systems in a controlled lab environment. Students will discover how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about various methods including Trojans and Backdoors. Viruses, Worms, Sniffers, Social Engineering, Phishing, Denial of Service and Buffer Overflows.

ISN-2404: Ethical Hacking and Countermeasures: Web Applications and Data Servers

Students learn how to scan, test, hack and secure their own systems in a controlled lab environment. Students will explore how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about various methods including Session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web-Based Password Cracking Techniques, Hacking Web Browsers, SQL Injection and Hacking Database Servers.

ISN-2504: Ethical Hacking and Countermeasures: Secure Network Infrastructures

In this course, the students will learn about cryptography, hacking wireless networks, and evading network security technologies (i.e. IDS, Firewalls, and Honeypots). Cryptography is the most important and fundamental concept in information security. In the Cryptography module, the students will gain an insight into the cryptographic science, algorithms, tools, techniques, and solutions such as Public Key Infrastructure (PKI), email encryption, and disk encryption. Moreover, the students will learn about the security concerns and attacks to the cryptographic technologies. The security of today's Wireless Networks is heavily reliant of cryptographic techniques. Once the students gained the necessary knowledge and experiment about the cryptography, they'll be ready to step into the realm of "Hacking the Wireless Networks". In this module, the students will learn and practice the wireless hacking techniques which are being used by the hackers to compromise the wireless networks. This includes a comprehensive understanding of concepts, threats, tools, techniques, and penetration testing techniques associated to the wireless networks. The students will also discuss the security controls and countermeasures to preserve the security posture of wireless networks. In the last module of this course, the students will learn about Firewall (FW), Intrusion Detection System (IDS), and Honeypot, as well as the tools and techniques that the hackers use to evade them. The students will learn the penetration testing tools and techniques to examine these network security technologies, and will determine and analyze the security controls and countermeasures.

ISN-2604: Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

In this course, the students will learn about the concepts and the information security aspects of Cloud Computing and Mobile Platforms. The students will gain an insight into cloud penetration testing and cloud security threats, attack vectors, tools, and necessary security controls and techniques to preserve the security posture of cloud technologies. Moreover, the students will be able to conduct a cloud security audit and prepare cloud security guidelines. This course introduces the Mobile Device Management (MDM) and Bring Your Own Device (BYOD), and covers multiple aspects of mobile security, including the anatomy of mobile attacks, mobile attack vectors, associated vulnerabilities and risks, security issue arising from the app stores, app sandboxing issues, mobile spam, pairing mobile devices on open Bluetooth and Wi-Fi connections. The students will also learn Mobile Hacking techniques on iOS, Android OS, Windows Mobile OS and Blackberry, as well as the technical tools and techniques to protect the mobile platforms.

Term 4

CPL-1049: Work Term - Full-Time*

Co-operative education provides students with the opportunity to apply classroom learning to the workplace, undertake career sampling and gain valuable work experience that may assist students to find permanent employment after graduation. For further information regarding Co-op, please refer to www.lambtoncollege.ca/mycareer

-or-

ALP-5559: Applied Project

Applied Project is aimed at enriching student success by combining the skills students have learned throughout their program. Within the course, students are taught valuable proposal development skills, project management techniques and presentation skills through weekly workshops. Moreover, the project should, by its very nature, attempt to enhance and strengthen the student's employability prospects post-graduation by exposing them to skills and knowledge in demand from today's employers. This course allows participants to integrate and apply skills and knowledge gained from a number of previous courses of study taken in the program. These skills are used to complete an applied research or design project on a real-world challenge presented by an instructor or an industry partner. The student or student teams are expected to meet with the project supervisor during mutually agreed upon times and are required to attend each in-class session during the week.

*In order to be eligible to participate in a full-time Co-op Work Term (CPL-1049) students must have a GPA of 2.8 or greater. Failing to do so will require the students to enroll in CPL-5559 WIL Project at an additional cost to the student. This additional cost can be viewed by selecting the Additional Fees tab.

Program Maps

Click on the term you began your program.

Current students can view program maps from previous years on the mylambton website. 

You will need to login with your C# and password in order to access your program map.

Disclaimer

Lambton College reserves the right to alter information including admission requirements and fees and to cancel at any time a program or course; to change the location and/or term in which a program or course is offered; to change the program curriculum as necessary to meet current competencies or changes in the job market or for budgetary reasons; to change the pathways third-party certification bodies; or to withdraw an offer of admission both prior to and after its acceptance by an applicant or student because of insufficient applications or registrations, over-acceptance of offers of admission, budgetary constraints, or for other such reasons.  In the event Lambton College exercises such a right, Lambton College’s sole liability will be the return of monies paid by the applicant or student to Lambton College.


International Education
Any questions or inquiries please e-mail:
international@lambtoncollege.ca


Back to Top