Skip to main page content

Computer Systems Technician - Cyber Security

CYBS
City: Sarnia
Two-Year In-Person Ontario College Diploma
SEP Open

Overview

Learn to build, secure, and manage IT systems. Explore everything from coding, cloud computing, and cyber defense.

The Lambton College Computer Systems Technician – Cyber Security, Ontario College Diploma is an innovative 2-year program designed to prepare students for the rapidly evolving IT industry, with a specific focus on internet security. Covering a wide range of foundational and advanced topics, including networking, databases, cloud computing, and cyber security, the program balances theoretical knowledge and hands-on experience. Students are equipped to operate, maintain, protect, and manage diverse IT infrastructures, preparing them to address the challenges of today’s dynamic technology landscape.

The curriculum begins with essential courses that establish a strong foundation in IT. Students explore PC repair, Python programming, networking fundamentals, databases, front-end web development, and cloud administration. These courses equip students with comprehensive skills to troubleshoot, code, manage networks, handle data, design user-friendly interfaces, and secure cloud environments, fostering well-rounded, versatile cyber security professionals. As students’ progress, they dive into advanced topics such as artificial intelligence, ITIL, information security, and project management.

By the third term, the program emphasizes cyber security practices. Key areas include legal and ethical issues, security policies, continuity planning and disaster recovery, ethical hacking and countermeasures, and DevOpsSec automation. Students gain critical skills to navigate the legal landscape, enforce robust security measures, ensure business continuity, ethically assess and thwart cyber threats, and streamline security operations through automation.

In the final term, students delve into cloud computing, hacker techniques and tools, incident handling, network security testing, identity access management, computer forensics and investigation, and complete cyber security capstones. These courses provide students with comprehensive expertise to manage and secure cloud environments, understand and counter hacking methods, respond effectively to security incidents, test network defenses, control user access, investigate cyber crimes, and integrate knowledge through hands-on capstone projects. This ensures students are well-prepared to tackle diverse cyber security challenges.

This diploma program emphasizes comprehensive security knowledge, technical skills, legal and ethical issues, security policies and planning, and hands-on experience. The curriculum addresses the growing demand for information and digital security professionals with skills in risk assessment, security solutions, and compliance with industry standards. Graduates are well-prepared for diverse career opportunities, such as cyber security analysts, network security specialists, ethical hackers, incident responders, or cloud security specialists, and are equipped to pursue further education or certifications in cyber security and related fields.

Admission Requirements

  • O.S.S.D. or equivalent

Mature Student Assessment is available for this program. For more information, please contact counselling@lambtoncollege.ca. Review the Mature Student Admission process.

Academic admission requirements can be obtained through Academic Upgrading and the Pre-Programs at Lambton College.

Costs

Scholarships Available

There are 8 scholarships available for this program, with a total value of $1,000!

Technology Requirements

In order to keep pace with the requirements of each and every course in your program, Lambton College requires that each student have access to a laptop while studying at our college.

Courses

ITP-1123
PC Repair Fundamentals

The course provides students with a comprehensive understanding of PC hardware components, their operation, maintenance, and repair. Students will also learn to support and configure various hardware components, and to troubleshoot and resolve problems arising in various environments. Upon successful completion of this course, students will be able to: diagnose and troubleshoot simple technical problems; understand the relationship between the hardware components, the operating system, and applications programs; utilize and implement common support-related methodologies, including maintenance schedules, and virus protection plans; provide proper customer service and support; communicate with clients, technical support, and help desk staff using appropriate PC hardware terminology.

CSD-1233
Python Programming

This course uses the Python programming language to reinforced programming logic and problem solving skills taught in CSD 1133, Problem Solving/Program Logic. Students implement Python programs to (1) design, test, and debug programs using a top-down modernized approach; (2) control the flow of a program with decision and repetitive structures and functions; (3) implement array processing; and (4) develop programs that process data from files including control break processing.

CIS-1103
Networking Basics

This course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes.

CSD-2203
Relational Database Design

A comprehensive introduction to relational database design and implementation, emphasizing theoretical concepts and practical applications. Using a hands-on approach, students (1) analyze user requirements and develop data models using Entity-Relationship Diagrams (ERD), normalization techniques, and relational data modeling principles; (2) create and modify database table structures using SQL Data Definition Language (DDL); (3) create test data and use SQL Data Manipulation Language (DML) to insert, update, delete, and query data; (4) implement and test database constraints to ensure data integrity; and (5) design and implement a comprehensive database system aligned with typical business requirements, concluding with detailed technical documentation.

CSD-1103
Front End Web Development I

Through a blend of theoretical concepts and practical applications, students master the creation of dynamic and engaging websites. Using a hands-on approach, students integrate modern web technologies to (1) design and implement well-structured and semantically meaningful web pages using HTML; (2) implement Cascading Style Sheets (CSS) to enhance the visual appeal of web pages, including techniques for layout, formatting, and responsive design; (3) incorporate JavaScript that adds interactivity, dynamic content, and functionality to web pages; and (4) design and publish a comprehensive and fully functional website.

CIS-1003
Foundational Cloud Administration

This course discusses basic components of Cloud Administration. In this course we will be installing and configuring virtualization on a local host and using only that host's resources. We will be exploring servers and their basic configurations and management functions. Students will be tasked with installing configuring resources, operating systems, and networking using a variety of OS platforms and virtualization components both locally and within a Cloud (SAN). Hands on labs, assignments, and quizzes will be used to evaluate the students on this skill.

GED-XXX3
General Education Elective

MTH-1163
General Mathematics I

This general course in mathematics reviews and enhances topics in arithmetic, algebra, linear graphs, measurement, and statistics. A problem solving approach is used throughout the course, and there are many practical applications.

AML-1413
Introduction to Artificial Intelligence

This course introduces the core concepts of Artificial Intelligence, its related fields, and its applications. It covers the principles and fundamentals of AI, including its history and current trends. Students will explore the role of AI in various industries, particularly within Canadian business contexts, to understand how AI-powered solutions are applied to real-world problems. The course examines the relationship between AI and big data, highlighting how large data sets drive AI advancements and insights. Additionally, the course analyzes the role of intelligent agents in AI, explaining their functions and behaviors. A significant component of the course is dedicated to exploring various AI learning methods, including supervised and unsupervised learning, classification, regression, clustering, dimensionality reduction, and deep learning. Students will also examine artificial neural networks, focusing on their components, strengths, limitations, and applications. Lastly, the course delves into the Internet of Things (IoT) and its connection to AI, providing a comprehensive understanding of how these technologies integrate. The laboratory portion offers hands-on practice, allowing students to apply their knowledge to real-life AI challenges.

ITP-1053
ITIL Foundations

The Information Technology Infrastructure Library (ITIL®) foundations course provides a practical understanding of Information Technology (IT) service management key concepts, key principles, common language, and practices that enable the ITIL service value system. This course introduces students to the basic principles and structure of ITIL and provides the preparation needed to challenge and successfully pass the ITIL V4.0 Foundation examination.

ISN-1003
Principles of Information Security

Students are introduced to the fundamental concepts, techniques and principles of securing information in computing environments. Students will gain a solid understanding of the key principles, technologies, and security best practices that are crucial for protecting digital assets, protecting privacy of sensitive data, and appropriately managing security risks. Key elements of information security will be taught in depth, including threat and risk assessment, risk management, access control security, cryptography and encryption, network security, identity access management and incident response. Students will learn hands-on techniques that are critical to protect sensitive information from unauthorized exposure, modification, disclosure, and destruction.

CIS-4103
Project Management

One of the most in-demand IT skills today isn't really an IT skill: it's Project Management. As more and more demands are placed on IT departments, there is more demand for Canadians who understand and can manage in a project-based environment. Using the principles as defined in accepted industry Project Management standards, this course provides a hands-on framework for how to initiate, plan, execute, monitor and control, and close a project. Through lectures, labs and assignments, students look at all stages of project development with an eye to the tips and tricks that do a successful project. In addition, this course prepares students to challenge the CompTIA Project+ or the Certified Associate in Project Management (CAPM)® certification exams. CAPM and PMI are registered marks of the Project Management Institute.

COM-1113
Workplace Communications

In this course, students write and speak in response to realistic workplace scenarios to build practical communication skills. They produce, revise, and edit written communication geared to the workplace and practice the oral communication and effective listening skills that will help them succeed in professional environments.

SUS-1003
Introduction to Sustainable Development

This course introduces the concept of sustainable development to a broad audience. Students are presented with the factors that affect the environmental, economic and social sustainability of our communities. The course investigates the development of human populations and how their need for resources (e.g. energy, food, water) has compromised the natural ecosystems. Social and economic factors are explored in the context of social equality and sustainability in the local and global economy. The effects of individual lifestyle changes on the sustainability of communities are also examined.

JSS-1001
Job Search & Success

This course provides student with skills and knowledge to help support their career search and succeed in the workplace. Students align their personal skill set and goals to guide them on their career paths. They will learn how to effectively conduct a job search, build a professional and well-tailored resume and cover letter, and develop and practice interview techniques. Students will also develop their personal brand to help support effective career networking and aid in their job search. Teamwork and collaboration in the workplace are also discussed. Self-reflection is used to inspire insight and support their professional career journey.

ISN-1403
Legal & Ethical Issues in IT Society

This course is designed to explore the evolving connection between information technology (IT) and legal, ethical and regulatory considerations. Students will acquire a thorough understanding of the critical legal and ethical challenges that arise in the context of IT usage and its impact on society. Students will explore emerging security topics, including privacy rights, intellectual property, cybersecurity, data protection, digital governance, and social implications of emerging technologies. By exploring real-world case studies, existing legal frameworks, and ethical scenarios, students will develop the analytical skills required to critically evaluate and navigate the legal and ethical landscape of IT society. The course will foster critical thinking and trigger discussions on controversial issues, encouraging students to examine the broader societal implications of technological advancements. By the end of the course, students will have built a solid foundation in the legal and ethical principles that govern modern IT society. Students will be able to analyze, evaluate, and articulate legal and ethical arguments related to IT issues, and make rational decisions that incorporate the diverse perspectives and potential consequences in the context of the digital landscape.

ISN-1103
Security Policies

Student will recognize the significance of security policies in safeguarding the organization's assets, mitigating risks, and adhering to regulatory requirements. Students will explore the fundamental concepts, principles, methodologies, and techniques associated with developing, implementing, and enforcing security policies across an organization.

ISN-3333
Security & Risk Management

In an era of increasing cyber threats and operational risks, organizations must develop robust strategies to ensure business continuity and recover swiftly from disruptions. This course provides a comprehensive exploration of Continuity Planning and Disaster Recovery (CP/DR) within a cybersecurity landscape. Students will learn how to design, implement, and manage business continuity plans (BCPs) and disaster recover plans (DRPs) to minimize downtime, protect critical assets, and maintain operational resilience. Key topics include risk assessment, incident response, crisis management, backup strategies, data recovery methods, compliance requirements, and real-world case studies of cybersecurity incidents.

ISN-2413
CompTIA Security+

The CompTIA Security+ Course is designed to introduce the basic concepts and skills required to prosper in the field of cybersecurity. This 12-week course is customized to meet the standards and objectives outlined by CompTIA for their Security+ certification. Upon completing this course, students will have acquired the required knowledge and skills to obtain the CompTIA Security+ certification. Students will be well-equipped to tackle various cybersecurity challenges and actively safeguard organizational assets and confidential data, ensuring their security and integrity.

ISN-2313
Ethical Hacking and Countermeasures

This course is designed to provide students with the knowledge and skills required to understand, identify, and remediate security vulnerabilities in the cloud, network, and web-based environments. As organizations constantly look to enhance their digital landscape, they also confront escalating threats from malicious actors attempting to exploit vulnerabilities in their technological environment. This course endeavours to establish a strong foundation in ethical hacking, with a focus on cloud computing, networking, and web-based attacks. Students will explore the methodologies and techniques employed by ethical hackers to evaluate the state of system security and develop strong countermeasures. Students will be actively exposed to state-of-the-art tools and technologies commonly employed in the industry, gaining practical experience in the process.

ISN-2513
DevOpsSec Automation

DevOpsS4ec, a combination of Development, Security, and Operations is increasingly gaining popularity across software development and IT operation shops due to its emphasis on security first approach, resource efficiency and increased collaboration between IT teams. The course introduces the principles, methodologies, approaches and tools that are critical to automate, optimize and streamline software development, release, deployment, and security processes. By blending theoretical knowledge with practical, hands-on exercises, students will acquire the necessary skills to leverage DevOps practices and security automation methods to improve software quality, boost efficiency, and reinforce security measures throughout the systems development lifecyle.

GED-XXX3
General Education Elective

ISN-1173
Cloud Computing for Cyber Security

As everything moves towards the cloud, so does the field of cybersecurity. But what is really so good about cloud computing that the cybersecurity profession is embracing it at such a fast speed? Students will learn about various technologies related to cloud computing and their application in the quickly evolving field of cybersecurity. The curriculum delves into the specific security obstacles and opportunities associated with cloud-based infrastructures, empowering students with the required expertise to ensure the security of cloud computing environments. Students will engage in practical exercises and case studies to apply their fundamental learning. They will have hands-on opportunities to work with various cloud computing platforms, security tools, and frameworks. Additionally, discussions and collaborative activities will enhance their problem-solving and decision-making skills in real-world cloud security scenarios. Upon successful completion of this course, students will be able to address the unique challenges and opportunities presented by cloud computing in the field of cybersecurity

ISN-1603
Hacker Techniques and Tools and Incident Handling

This course provides students with a detailed exposure to the methods, tools, and strategies used by bad actors (i.e. hackers) to breach and compromise computer systems and networks. Students will explore various hacking techniques and acquire hands-on experience in incident handling and response. Students will get into the mindset of hackers, gaining insights into their motives, methodologies, and techniques. They will learn about common attack vectors including network scanning, vulnerability exploitation, password cracking, social engineering, and malware deployment. By gaining exposure to the techniques employed by hackers, students will be equipped to defend and secure computer systems and networks against potential risks and threats. The course covers a wide variety of tools and technologies used in both offensive and defensive security. Students will have opportunities to explore popular hacking tools, including network analyzers, vulnerability scanners, password-cracking utilities, and intrusion detection systems. Practical exercises and simulations will enable students to apply these tools in real-world scenarios, honing their skills in identifying, mitigating, and responding to security incidents. The incident handling aspect of the course focuses on preparing students to effectively respond to security incidents. Students will develop incident response plans, and practice analyzing and containing security breaches within the boundaries of the law and respecting individual privacy rights.

ISN-2003
Network Security Testing

Students will examine the realm of network security principles and techniques, as well as acquire hands-on experience in conducting penetration tests to discover vulnerabilities in computer networks. The course explores a wide range of security measures, tools, and methodologies used to protect network infrastructure from potential threats and attacks. Students will explore network security concepts, including network architecture, protocols, encryption, access control, intrusion detection and prevention systems, firewalls, and virtual private networks (VPNs). Students will learn about different types of attacks and threats, such as malware, phishing, DoS (Denial of Service), and DDoS (Distributed Denial of Service), and study methods to detect, prevent, and mitigate these risks. Students will explore various tools and techniques used by security professionals to conduct penetration tests, including reconnaissance, scanning, enumeration, exploitation, and post-exploitation. The course will also provide oversight into common penetration testing methodologies and frameworks, such as the Open Web Application Security Project (OWASP) Testing Guide and the Penetration Testing Execution Standard (PTES).

ISN-4443
Identity Access Management

The Identity Access Management (IAM) course is designed to provide students with an in-depth understanding of how to manage and secure digital identities in modern IT environments. This course explores various authentication and authorization mechanisms, access control models, and the lifecycle of identity management. Students will learn how to implement and manage IAM solutions to protect sensitive data and ensure regulatory compliance.

ISN-1803
Computer Forensics and Investigation

The objective of this course is to introduce computer forensics and methods of investigations. Students examine and discover information through computer forensics, triage and eDiscovery methods.. Students are introduced to digital forensic tools in order to acquire, preserve, and manage digital evidence to support investigations. They will also learn to analyze cyber intrusion, examine organizational policy violations and resolve disputes. Important concepts such as chain of custody and documentation of evidence/procedures are also covered. Students evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.

ISN-2613
Cyber Security Capstone - Part I

The Cyber Security Capstone is a two-part, hands-on project that serves as the culmination of the Computer Systems Technician - Cyber Security program. This capstone challenges students to apply their technical, analytical, and problem-solving skills in a real-world security scenario, integrating knowledge gained throughout the program. In Capstone Project Part I, students engage in program planning, research, and design to develop a comprehensive cybersecurity solution for a simulated or real-world IT infrastructure. They conduct risk assessments, define security objectives, and implement penetration testing, network security strategies, and incident response frameworks. Students will leverage ethical hacking, cloud security, and forensics to identify vulnerabilities and propose mitigation measures.

ISN-2623
Cyber Security Capstone - Part II

In Capstone Project Part II, students focus on deploying, testing, and refining their security solutions. They implement automated security monitoring, enforce compliance measures, and conduct live penetration testing to assess system resilience. The project emphasizes collaboration, requiring students to document findings, present technical reports, and demonstrate their solutions to faculty and industry professionals. Throughout both phases, students utilize industry-standard tools such as Kali Linux, Wireshark, Splunk, AWS Security Hub, and SIEM platforms, ensuring they are prepared for the evolving cybersecurity landscape. By the end of the capstone, graduates will have gained critical hands-on experience in designing, implementing, and securing IT environments - readying them for careers as cybersecurity analysts, penetration testers, or network security specialists.

Have Questions?

If you have any questions about this program, the application process, or anything about studying at Lambton College, reach out to us.

* Indicates Required Field

Contact

After Graduation

Employment Opportunities

A woman standing in an office wearing a blue shirt and holding an ipad.

The demand for professionals with a deep understanding of servers, operating systems, databases, local and cloud networks and cyber security operating systems, networks and security continues to grow. Graduates of the program may work throughout the public and private sectors in careers such as desktop support technician, IT support desk, IT support, server technician, network technician, cybersecurity technician, or data centre technician.

More Information

Technology Requirements

It is recommended that students purchase a laptop with a Windows operating system.

Internet Speed Requirements

For best performance for students learning remotely, an internet connection with a minimum of 40 Mbps download and 10 Mbps upload speed is recommended in order to effectively use video conferencing and remote lecture delivery software as well as, other online resources remotely. Due to the large area over which students may be dispersed, we are unable to recommend a specific provider, so you will need to inquire around your area to find one that best suits your needs.

Minimum Laptop Requirements

In order to access the internet and virtually-delivered software and courseware, student laptops should include the following at a minimum. By meeting the following specifications, students will be equipped to access software and courseware on their laptop through the internet:

  • Intel i5 8th Gen Processor or equivalent
  • 16 GB of RAM (with a minimum of 8 GB)
  • 100 GB HDD or more
  • HD Graphics
  • Webcam with a microphone
  • Wireless 802.11n/ac 5ghz capable
  • Windows Operating System (Windows 11)

Please note that Chromebooks and MacBooks may not support all software required for your program; students should verify compatibility with their professors.

Software

To ensure students are getting the most our of their classroom experience, some software will be required.

Lambton College has made this software easily accessible online. Students can leverage our Microsoft Office 365 software packages and services. In addition, much of the software you require for your courses will be available on demand for use on any device - on or off campus.

⠀⠀⠀⠀⠀