Cyber Security & Computer Forensics

City: Mississauga
Two-Year with Co-op Ontario College Graduate Certificate
Sep Closed


Play a key role in the growing industry of cyber security by protecting computer systems, networks, and sensitive information from unauthorized access, attacks, and other threats.

The Cyber Security and Computer Forensics, Ontario College Graduate Certificate program provides students with key concepts of information security, technical and practical job skills necessary to secure, protect and defend network infrastructures and an organization’s valuable data assets.

The curriculum provides for a broad understanding of cyber security concepts, industry best practices for information security and key security concepts that will protect an organization against fraud, data breaches and other vulnerabilities. The program is designed to prepare information and digital security professionals with the ability to manage, provide policies, standards, procedures, guidelines, policy framework, assess and mitigate risk and integrate advanced security solutions.

The growing Internet security sector requires an in-depth understanding of cyber security issues, and fundamental Internet architecture and protocols. In addition, network security skills such as packet, vulnerability, exploit analysis, and cyber security research are also discussed. Graduates will develop highly marketable skills that are required in the burgeoning cyber security field.

Sakshi's Story

Hear how Sakshi completed her studies at Lambton in Mississauga and landed a job with TD Bank. She faced some challenges and struggles and gained an independence she didn't know she had.

This Lambton College program is licensed to and delivered by Queen's College (PDF), a licensed private career college in Mississauga, Ontario. Students who are registered at are students of a public college and as such, will receive full credit from Lambton College for all Lambton College courses completed at the Queen's College campus in Mississauga. Students who meet program graduation requirements will graduate with a credential from Lambton College. Students may be scheduled to have classes on Saturdays.

Admission Requirements

  • University degree in the information technology field

The admissions process is competitive and meeting the minimum academic requirements does not guarantee admission.

Lambton College reserves the right to alter information including admission requirements and to cancel a program or course at any time; to change the program curriculum as necessary to meet current competencies or changes in the job market; to change the pathways to third-party certification bodies; or to withdraw an offer of admission both prior to and after its acceptance by an applicant or student because of insufficient applications or registrations or over-acceptance of offers of admission. In the event Lambton College exercises such a right, Lambton College's sole liability will be the return of monies paid by the applicant or student to Lambton College.

English Language Requirements

  • IELTS of 6.5

- or -

  • TOEFL iBT 79

- or -

  • Passed Lambton Institute of English placement test

Please Note: IELTS is the only proficiency score accepted by the Study Direct Stream (SDS) program. Additional country-specific requirements may also be applicable.

Meeting the minimum English requirements does not guarantee admission. Students with higher English proficiency scores will receive priority in the admission assessment process.

Mississauga - A Great Place to Study

Hear from our staff and students about why our Mississauga campus gives you a great, well-rounded education in a bustling city centre.

Achieve your goals while immersing yourself in Canadian culture.


  • Term 1 $9,200.00
  • Term 2 $8,500.00
  • Term 3 $9,667.50
  • Co-op Term $0.00
Total Cost of Program

Tuition fees are estimates and are subject to change each academic year. Fees do not include books (unless specifically noted), supplies or living costs.

Lambton College reserves the right to alter information including admission requirements and to cancel at any time a program or course; to change the location and/or term in which a program or course is offered; to change the program curriculum as necessary to meet current competencies or changes in the job market; to change the pathways third-party certification bodies; or to withdraw an offer of admission both prior to and after its acceptance by an applicant or student because of insufficient applications or registrations or over-acceptance of offers of admission. In the event Lambton College exercises such a right, Lambton College’s sole liability will be the return of monies paid by the applicant or student to Lambton College.

Additional Fees

WIL Project Fees

Students who are not successful in securing a co-op or fail to meet the co-op requirements will need to register in CPL-5559 WIL Project.

There is an additional fee of $2,480 for each student enrolled in the WIL Project course.


The anticipated cost for textbooks in this program is approximately $500 - $700 per term. This amount accounts for both mandatory textbook costs (included in tuition fees) as well as textbook fees not included in your tuition fee amount.

Important Dates, Deadline & Late Fees

For additional information on registration dates, deadlines and late fees please refer to Registration Dates and Deadlines.

Student Fees

A student services fee is included in your tuition.

Health Insurance Coverage

Emergency medical insurance is mandatory for all international students at Lambton College. This includes students who are full-time and part-time and who are on a co-op. This insurance is provided by - a third party insurance provider.

See Insurance Costs & Details


Technology Requirements

In order to keep pace with the requirements of each and every course in your program, Lambton College requires that each student have access to a laptop while studying at our college.


Principles of Information Security

Students are introduced to the fundamental concepts, techniques and principles of securing information in computing environments. Students will gain a solid understanding of the key principles, technologies, and security best practices that are crucial for protecting digital assets, protecting privacy of sensitive data, and appropriately managing security risks. Key elements of information security will be taught in depth, including threat and risk assessment, risk management, access control security, cryptography and encryption, network security, identity access management and incident response. Students will learn hands-on techniques that are critical to protect sensitive information from unauthorized exposure, modification, disclosure, and destruction.

Security Policies

Student will recognize the significance of security policies in safeguarding the organization's assets, mitigating risks, and adhering to regulatory requirements. Students will explore the fundamental concepts, principles, methodologies, and techniques associated with developing, implementing, and enforcing security policies across an organization.

Introduction to Canadian Culture

By 2032, new immigrants will account for up to 80% of Canada's population growth, and one in four Canadians will have been born in another country (Business Development Centre, 2022). Developing personal and professional competencies is important for long-term success as citizens and employees in Canadian workplace environments. Students in this course engage in a series of activities that deepen their knowledge of Canadian culture. Topics such as geography, history and Indigenous perspectives are studied. Furthermore, students develop their soft skills by focusing on effective leadership skills, team interaction, management techniques and interpersonal skill development. Students also explore the meaning of a diverse work place environment, build a strategy for personal growth, and develop their written and oral communication skills.

Legal & Ethical Issues in IT Security

This course is designed to explore the evolving connection between information technology (IT) and legal, ethical and regulatory considerations. Students will acquire a thorough understanding of the critical legal and ethical challenges that arise in the context of IT usage and its impact on society. Students will explore emerging security topics, including privacy rights, intellectual property, cybersecurity, data protection, digital governance, and social implications of emerging technologies. By exploring real-world case studies, existing legal frameworks, and ethical scenarios, students will develop the analytical skills required to critically evaluate and navigate the legal and ethical landscape of IT society. The course will foster critical thinking and trigger discussions on controversial issues, encouraging students to examine the broader societal implications of technological advancements. By the end of the course, students will have built a solid foundation in the legal and ethical principles that govern modern IT society. Students will be able to analyze, evaluate, and articulate legal and ethical arguments related to IT issues, and make rational decisions that incorporate the diverse perspectives and potential consequences in the context of the digital landscape.

Introduction to Networking

Student will get introduced to the fundamental concepts, principles, standards, and technologies that form the foundation of various computer networks. Focusing on networking fundamentals, explaining the software, hardware and other IT components that facilitate modern day networking and bolster the business landscape. Students will learn how networks function, their operational mechanisms, and will learn how networks infrastructures are designed, configured and troubleshot. Students will explore various networking elements, protocols, and services, establishing a solid groundwork in network architecture, communication protocols, and network administration. Additionally, students will gain insights into network security and comprehend the vital role of effective network administration in maintaining a secure and reliable network infrastructure.

Wireless & Mobile Device Security

Students will acquire an understanding of the principles, techniques, and best practices for securing wireless networks and mobile devices. The swift evolution of wireless communication technologies and the prevalent use of mobile devices have given birth to new security challenges that need to be addressed to protect sensitive information from unauthorized exposure and modification and ensure availability of wireless networks. Students will explore several wireless technologies, including Wi-Fi, Bluetooth, and cellular networks, and learn about the vulnerabilities and threats geared towards these technologies. Students will also learn about security protocols and mechanisms that are used to secure wireless networks and mobile devices, including authentication, encryption, access control, and intrusion detection systems.

Ethical Hacking & Network Defense

This course prepares students to assess and then correct vulnerabilities present within information systems. Students are introduced to tools and penetration testing methodologies used by ethical hackers. What and who ethical hackers are and how they protect corporate and government data from cyber-attacks is discussed. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types" systems are also investigated.

Hacker Techniques, Tools & Incident Handling

This course provides students with a detailed exposure to the methods, tools, and strategies used by bad actors (i.e. hackers) to breach and compromise computer systems and networks. Students will explore various hacking techniques and acquire hands-on experience in incident handling and response. Students will get into the mindset of hackers, gaining insights into their motives, methodologies, and techniques. They will learn about common attack vectors including network scanning, vulnerability exploitation, password cracking, social engineering, and malware deployment. By gaining exposure to the techniques employed by hackers, students will be equipped to defend and secure computer systems and networks against potential risks and threats. The course covers a wide variety of tools and technologies used in both offensive and defensive security. Students will have opportunities to explore popular hacking tools, including network analyzers, vulnerability scanners, password-cracking utilities, and intrusion detection systems. Practical exercises and simulations will enable students to apply these tools in real-world scenarios, honing their skills in identifying, mitigating, and responding to security incidents. The incident handling aspect of the course focuses on preparing students to effectively respond to security incidents. Students will develop incident response plans, and practice analyzing and containing security breaches within the boundaries of the law and respecting individual privacy rights.

Cloud Computing for Cyber Security

As everything moves towards the cloud, so does the field of cybersecurity. But what is really so good about cloud computing that the cybersecurity profession is embracing it at such a fast speed? Students will learn about various technologies related to cloud computing and their application in the quickly evolving field of cybersecurity. The curriculum delves into the specific security obstacles and opportunities associated with cloud-based infrastructures, empowering students with the required expertise to ensure the security of cloud computing environments. Students will engage in practical exercises and case studies to apply their fundamental learning. They will have hands-on opportunities to work with various cloud computing platforms, security tools, and frameworks. Additionally, discussions and collaborative activities will enhance their problem-solving and decision-making skills in real-world cloud security scenarios. Upon successful completion of this course, students will be able to address the unique challenges and opportunities presented by cloud computing in the field of cybersecurity

Computer Forensics & Investigation

The objective of this course is to introduce computer forensics and methods of investigations. Students examine and discover information through computer forensics, triage and eDiscovery methods.. Students are introduced to digital forensic tools in order to acquire, preserve, and manage digital evidence to support investigations. They will also learn to analyze cyber intrusion, examine organizational policy violations and resolve disputes. Important concepts such as chain of custody and documentation of evidence/procedures are also covered. Students evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.

Network Security & Penetration Testing

Students will examine the realm of network security principles and techniques, as well as acquire hands-on experience in conducting penetration tests to discover vulnerabilities in computer networks. The course explores a wide range of security measures, tools, and methodologies used to protect network infrastructure from potential threats and attacks. Students will explore network security concepts, including network architecture, protocols, encryption, access control, intrusion detection and prevention systems, firewalls, and virtual private networks (VPNs). Students will learn about different types of attacks and threats, such as malware, phishing, DoS (Denial of Service), and DDoS (Distributed Denial of Service), and study methods to detect, prevent, and mitigate these risks. Students will explore various tools and techniques used by security professionals to conduct penetration tests, including reconnaissance, scanning, enumeration, exploitation, and post-exploitation. The course will also provide oversight into common penetration testing methodologies and frameworks, such as the Open Web Application Security Project (OWASP) Testing Guide and the Penetration Testing Execution Standard (PTES).

Capstone Information Security Project

This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity, and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design phase through presentation of the final product.

Job Search & Success

This course provides student with skills and knowledge to help support their career search and succeed in the workplace. Students align their personal skill set and goals to guide them on their career paths. They will learn how to effectively conduct a job search, build a professional and well-tailored resume and cover letter, and develop and practice interview techniques. Students will also develop their personal brand to help support effective career networking and aid in their job search. Teamwork and collaboration in the workplace are also discussed. Self-reflection is used to inspire insight and support their professional career journey.


Ethical Hacking & Countermeasures: Attack Phases & Techniques

This course provides students with a comprehensive understanding of ethical hacking principles, techniques and strategies, focusing on the various phases of an attack and the respective techniques employed. In today's increasingly interconnected digital world, the need for a robust cybersecurity posture is critical, and ethical hacking plays a key role in identifying vulnerabilities, addressing risks, and strengthening defense frontiers. Students will explore the various stages of an attack, beginning with reconnaissance and information gathering, progressing through scanning, enumeration, gaining access, maintaining access, and covering tracks. Students will gain practical insights into the tools, methodologies, techniques, and best practices ethical hackers use to simulate real-world cyberattacks. Upon completing this course, students will have the knowledge and practical skills needed to identify vulnerabilities, analyze attack vectors, and deploy countermeasures to protect systems and networks.

Ethical Hacking & Countermeasures: Cloud Networks & Web Attacks

This course is designed to provide students with the knowledge and skills required to understand, identify, and remediate security vulnerabilities in the cloud, network, and web-based environments. As organizations constantly look to enhance their digital landscape, they also confront escalating threats from malicious actors attempting to exploit vulnerabilities in their technological environment. This course endeavours to establish a strong foundation in ethical hacking, with a focus on cloud computing, networking, and web-based attacks. Students will explore the methodologies and techniques employed by ethical hackers to evaluate the state of system security and develop strong countermeasures. Students will be actively exposed to state-of-the-art tools and technologies commonly employed in the industry, gaining practical experience in the process.

CompTIA Security+

The CompTIA Security+ Course is designed to introduce the basic concepts and skills required to prosper in the field of cybersecurity. This 12-week course is customized to meet the standards and objectives outlined by CompTIA for their Security+ certification. Upon completing this course, students will have acquired the required knowledge and skills to obtain the CompTIA Security+ certification. Students will be well-equipped to tackle various cybersecurity challenges and actively safeguard organizational assets and confidential data, ensuring their security and integrity.

DevOpsSec Automation

DevOpsSec, a combination of Development, Security, and Operations, is increasingly gaining popularity across software development and IT operation shops due to its emphasis on security first approach, resource efficiency and increased collaboration between IT teams. The course introduces the principles, methodologies, approaches and tools that are critical to automate, optimize and streamline software development, release, deployment, and security processes. By blending theoretical knowledge with practical, hands-on exercises, students will acquire the necessary skills to leverage DevOps practices and security automation methods to improve software quality, boost efficiency, and reinforce security measures throughout the systems development lifecycle.

Cyber Security Capstone

Work Term (Full-Time)

Co-operative education provides students with the opportunity to apply classroom learning to the workplace, undertake career sampling and gain valuable work experience that may assist students in leveraging employment after graduation. For further information regarding co-op, please refer to:

--- OR ---
WIL Project

Work Integrated Learning (WIL) Project is aimed at enriching students by connecting different program areas of study, cutting across subject-matter lines, and emphasizing unifying concepts. The focus of the WIL Project is to make connections between study and industry by engaging students in relevant and meaningful activities that are connected to and practiced within the professional workplace. WIL Project allows students to enhance and strengthen their employability prospects post-graduation by fine tuning skills and knowledge and meeting the expectations of today's employers. Students are required to attend the scheduled shifts in the WIL office, reporting to the WIL Supervisor. Weekly real-world challenges are presented in the WIL office, designed by industry professionals. In addition to the weekly assigned deliverables, students are also offered professional development sessions, and exposed to industry guest speakers, enhancing their opportunity to develop their professional network.

Co-op Eligibility & WIL Project Fee

In order to be eligible to secure an approved full-time co-op work term (CPL-1049), students must have a GPA of 2.8 or greater and complete all the co-op eligibility requirements. Failing to do so will require students to enroll in CPL-5559 WIL Project at an additional cost.


Centre for Global Engagement


1457 London Road

Sarnia ON, N7S 6K4

After Graduation

Employment Opportunities

Two cyber security employees in data room looking at laptop.

In the information security field, there are several roles an information network security administration graduate could hold including: network administrator, systems security analyst, network security analyst, computer security consultant, computer support specialist, systems administrator, computer scientist, database administrator, computer specialist, network systems and data communication analyst and digital forensics investigator.

Graduates who gain several years of specialized work experience may also hold positions as information security managers or network security supervisors.

Looking for Support After Graduation?

The International Graduate Services & Support Centre (GSSC) is a place dedicated to assisting International alumni as they seek employment and settle into Canadian life following graduation.


About Co-op

Students in this program have the opportunity to gain valuable work experience by applying classroom learning during co-op experiences.

Learn more about co-op terms and the roles and responsibilities of students and co-op advisors.

More Information

Student Responsibilities

  • Course and program delivery schedules are proposed and subject to change for each intake.
  • Students are required to bring their own laptop with wireless capability.
  • Students are advised to bring an official copy of their most recent police clearance, driver's license, and vaccination record from their home country.
An international student smiling at desk on campus.
Set yourself up for success!

Technology Requirements

It is required that students purchase a laptop with a Windows operating system.

Internet Speed Requirements

For best performance for students learning remotely, an internet connection with a minimum of 40 Mbps download and 10 Mbps upload speed is recommended in order to effectively use video conferencing and remote lecture delivery software as well as, other online resources remotely. Due to the large area over which students may be dispersed, we are unable to recommend a specific provider, so you will need to inquire around your area to find one that best suits your needs.

Minimum Laptop Requirements

In order to access the internet and virtually-delivered software and courseware, student laptops should include the following at a minimum. By meeting the following specifications, students will be equipped to access software and courseware on their laptop through the internet:

  • Intel i5 8th Gen Processor or equivalent
  • 16 GB of RAM (with a minimum of 8 GB)
  • 100 GB HDD or more
  • HD Graphics
  • Webcam with a microphone
  • Wireless 802.11n/ac 5ghz capable
  • Windows Operating System (Windows 11)


To ensure students are getting the most our of their classroom experience, some software will be required.

Lambton College has made this software easily accessible online. Students can leverage our Microsoft Office 365 software packages and services. In addition, much of the software you require for your courses will be available on demand for use on any device - on or off campus.