Cyber Security

Online Ontario College Graduate Certificate


Develop highly marketable skills that are required in the burgeoning cyber security field.

The Cyber Security, Ontario College Graduate Certificate Program will provide students with key concepts of information security, technical and practical job skills necessary to secure, protect and defend network infrastructures and an organization’s valuable data assets.

The program curriculum provides students with a broad understanding of cyber security concepts, industry best practices for information security and key security concepts that will protect an organization against fraud, data breaches and other vulnerabilities. The Cyber Security program is designed to prepare information and cyber security professionals with the ability to manage, provide policies, standards, procedures, guidelines, policy framework, assess and mitigate risk and integrate advanced security solutions.

The growing internet security sector requires an in-depth understanding of cyber security issues, and fundamental internet architecture and protocols. In addition, network security skills such as packet, vulnerability, exploit analysis, and cyber security research are also discussed. Graduates will develop highly marketable skills that are required in the burgeoning cyber security field.

Admission Requirements

  • Information Technology or computer related degree or diploma
  • -or-

  • Equivalent work experience as determined by Lambton College

Applications for this program are not accepted through

Prior Learning Assessment

If you believe you have an equivalent level of knowledge and would like credit through Prior Learning Assessment, please contact or call 519-479-1023 at least two weeks before classes begin.

Two cyber security employees in data room looking at laptop.
Get credit for your work experience
Two graduates posing for photos on college grounds.
Be sure you meet admission requirements to earn your credential.

Credential Eligibility

If you are taking courses with the intention of completing this program and earning a credential, you must meet the Admission Requirements. It is your responsibility to supply proof of admission requirements to the Office of the Registrar before completing three courses in this program.

If you complete the program but fail to provide proof of admission requirements, you will be ineligible to receive your credential.


Course Fees

  • Exact costs can be obtained during the registration process. Visit the Course List and select an individual course for associated course fees.
See Financial Aid Options

Need help paying your course fees?

This program is eligible for the Ontario Student Assistance Program (OSAP).

Graduation Fees

  • Students who successfully complete all the academic requirements for this program should submit their intent to graduate in order to receive their credential. The graduate module can be completed on myLambton via Self Service.

    A graduation fee of about $75 is added to your account upon verification that admission requirements have been met. For exact fees contact your Enrolment Services Professional.


  • Textbook costs may be applicable to each course. Most textbooks can be purchased through, but some exceptions do apply. Some courses may have software or equipment requirements that are not included in the cost of the course and are the responsibility of the student. Please see individual course pages for course-specific textbook information.

Technology Requirements

In order to keep pace with the requirements of each and every course in your program, Lambton College requires that each student have access to a laptop while studying at our college.



Students are introduced to the fundamental concepts, techniques and principles of securing information in computing environments. Students will gain a solid understanding of the key principles, technologies, and security best practices that are crucial for protecting digital assets, protecting privacy of sensitive data, and appropriately managing security risks. Key elements of information security will be taught in depth, including threat and risk assessment, risk management, access control security, cryptography and encryption, network security, identity access management and incident response. Students will learn hands-on techniques that are critical to protect sensitive information from unauthorized exposure, modification, disclosure, and destruction.

Please contact us to find out when the next start date will be.


This course explores network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Students focus on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems.

Please contact us to find out when the next start date will be.


Student will recognize the significance of security policies in safeguarding the organization's assets, mitigating risks, and adhering to regulatory requirements. Students will explore the fundamental concepts, principles, methodologies, and techniques associated with developing, implementing, and enforcing security policies across an organization.

Please contact us to find out when the next start date will be.


Preparing students to recognize and understand the inherent vulnerabilities of Windows systems by using and understanding tools and techniques to decrease the risks arising from vulnerabilities in Microsoft Operating Systems and applications, this course introduces defence strategies through understanding of system and file permissions, password and account security, the Windows Registry, Malware prevention, encryption, and Directory Service management via policies.

Please contact us to find out when the next start date will be.


Students will acquire an understanding of the principles, techniques, and best practices for securing wireless networks and mobile devices. The swift evolution of wireless communication technologies and the prevalent use of mobile devices have given birth to new security challenges that need to be addressed to protect sensitive information from unauthorized exposure and modification and ensure availability of wireless networks.

Students will explore several wireless technologies, including Wi-Fi, Bluetooth, and cellular networks, and learn about the vulnerabilities and threats geared towards these technologies. Students will also learn about security protocols and mechanisms that are used to secure wireless networks and mobile devices, including authentication, encryption, access control, and intrusion detection systems.

Please contact us to find out when the next start date will be.


This course provides students with concepts of discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. Students are introduced to a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

Please contact us to find out when the next start date will be.


This course prepares students to assess and then correct vulnerabilities present within information systems. Students are introduced to tools and penetration testing methodologies used by ethical hackers. What and who ethical hackers are and how they protect corporate and government data from cyber-attacks is discussed. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types" systems are also investigated.

Please contact us to find out when the next start date will be.


Students will examine the realm of network security principles and techniques, as well as acquire hands-on experience in conducting penetration tests to discover vulnerabilities in computer networks. The course explores a wide range of security measures, tools, and methodologies used to protect network infrastructure from potential threats and attacks.

Students will explore network security concepts, including network architecture, protocols, encryption, access control, intrusion detection and prevention systems, firewalls, and virtual private networks (VPNs). Students will learn about different types of attacks and threats, such as malware, phishing, DoS (Denial of Service), and DDoS (Distributed Denial of Service), and study methods to detect, prevent, and mitigate these risks.

Students will explore various tools and techniques used by security professionals to conduct penetration tests, including reconnaissance, scanning, enumeration, exploitation, and post-exploitation. The course will also provide oversight into common penetration testing methodologies and frameworks, such as the Open Web Application Security Project (OWASP) Testing Guide and the Penetration Testing Execution Standard (PTES).

Please contact us to find out when the next start date will be.


The objective of this course is to introduce computer forensics and methods of investigations. Students examine and discover information through computer forensics, triage and eDiscovery methods.. Students are introduced to digital forensic tools in order to acquire, preserve, and manage digital evidence to support investigations. They will also learn to analyze cyber intrusion, examine organizational policy violations and resolve disputes. Important concepts such as chain of custody and documentation of evidence/procedures are also covered. Students evaluate how to conduct a high-tech investigation, from acquiring digital evidence to reporting its findings.

Please contact us to find out when the next start date will be.


This course integrates the knowledge and skills students have obtained throughout the program. Emphasis is placed on security policy, process planning, procedure definition, business continuity, and systems security architecture. Upon completion, students are able to design and implement comprehensive information security architecture from the planning and design phase through presentation of the final product.


Please contact us to find out when the next start date will be.


This course provides students with a detailed exposure to the methods, tools, and strategies used by bad actors (i.e. hackers) to breach and compromise computer systems and networks. Students will explore various hacking techniques and acquire hands-on experience in incident handling and response.

Students will get into the mindset of hackers, gaining insights into their motives, methodologies, and techniques. They will learn about common attack vectors including network scanning, vulnerability exploitation, password cracking, social engineering, and malware deployment. By gaining exposure to the techniques employed by hackers, students will be equipped to defend and secure computer systems and networks against potential risks and threats.

The course covers a wide variety of tools and technologies used in both offensive and defensive security. Students will have opportunities to explore popular hacking tools, including network analyzers, vulnerability scanners, password-cracking utilities, and intrusion detection systems. Practical exercises and simulations will enable students to apply these tools in real-world scenarios, honing their skills in identifying, mitigating, and responding to security incidents.

The incident handling aspect of the course focuses on preparing students to effectively respond to security incidents. Students will develop incident response plans, and practice analyzing and containing security breaches within the boundaries of the law and respecting individual privacy rights.

Please contact us to find out when the next start date will be.

Have Questions?

If you have any questions about our online programs, the courses offered, the registration process, or any other Online Education related questions, reach out to us.



Online Education


Room B2-280

After Graduation

Employment Opportunities


Career positions may include, but are not limited to:

  • IT Consultant
  • Computer Systems Analyst
  • Information Security Analyst
  • Information Security Quality Assurance Analyst
  • Systems Security Analyst

More Information

Prepare for Success

Remember to review the important dates associated with this program - some deadlines may be different depending on how your program is delivered and what section you're enrolled in.

Technology Requirements

It is required that students purchase a laptop with a Windows operating system.

Internet Speed Requirements

For best performance for students learning remotely, an internet connection with a minimum of 40 Mbps download and 10 Mbps upload speed is recommended in order to effectively use video conferencing and remote lecture delivery software as well as, other online resources remotely. Due to the large area over which students may be dispersed, we are unable to recommend a specific provider, so you will need to inquire around your area to find one that best suits your needs.

Minimum Laptop Requirements

In order to access the internet and virtually-delivered software and courseware, student laptops should include the following at a minimum. By meeting the following specifications, students will be equipped to access software and courseware on their laptop through the internet:

  • Intel i5 8th Gen Processor or equivalent
  • 16 GB of RAM (with a minimum of 8 GB)
  • 100 GB HDD or more
  • HD Graphics
  • Webcam with a microphone
  • Wireless 802.11n/ac 5ghz capable
  • Windows Operating System (Windows 11)


To ensure students are getting the most our of their classroom experience, some software will be required.

Lambton College has made this software easily accessible online. Students can leverage our Microsoft Office 365 software packages and services. In addition, much of the software you require for your courses will be available on demand for use on any device - on or off campus.