ad
Apply Now Request Information
Back To Top

ACS Program

Cybersecurity Specialist - LEA.DV

ACS

1425 hours

Qualified Instructors

This program can be offered at the campus(es) below. Please contact the campus of your choosing for program availability and delivery methods.

Location Icon

View Campus Availability

Dropdown Arrow
Delivery Icon

View Delivery Methods

Dropdown Arrow
In Person Icon

On Campus

Employment Rate

100%

*Jan-Dec 2023, CDI College QC;

Learn to Counter Cyber-Attacks, Detect Breaches, and Handle Security Incidents

CDI College's Cybersecurity Specialist – LEA.DV program equips students for cybersecurity roles, focusing on protecting organizational computer networks through encryption, firewalls, and antiviruses.

 

The curriculum includes auditing vulnerabilities, intrusion testing, and cyberattack prevention tactics. It also encompasses network management, IT services, and system deployment, with a focus on risk management strategies.

  • COMPUTER COMPONENTS
  • COMPUTER SYSTEM ADMINISTRATION
  • CYBER-ATTACKS & DEFENSE
  • CYBERSECURITY ISSUES & CHALLENGES
  • INTERNAL AUDITS
  • NETWORK INFRASTRUCTURE
  • NETWORK SECURITY
  • PENETRATION TESTS
  • REMOTE MANAGEMENT
Credential Image

Authorized by the Ministry of Higher Education. CDI College Business. Technology. Health Care (Permit 749747)

Program Intro Background

Program Courses

Job Function of Cybersecurity Specialists

Plus Icon Minus Icon

Background. Job function of the cybersecurity specialist. Exercise of the profession according to different work environments. Role of the cybersecurity specialist and those of related professions. Environmental requirements. Cybersecurity (trends, utility, risks, issues and challenges). Professional ethics at work. Main hardware and software components of a computer. File management. Personalization of a workstation. Creation of documents using common corporate communication and management tools (Microsoft Word ™, Microsoft Excel ™, Microsoft Powerpoint ™). Use of the Internet for communication and research. Work methods and ergonomics.

Computer Components and Equipment 1

Plus Icon Minus Icon

Understanding the operations of a microcomputer. Identification and description of the different components of a computer. Software and hardware issues. Analysis, configuration, update and troubleshooting of Windows PCs. Industrial Standard A+ for IT Support Technicians.

Computer Components and Equipment 2

Plus Icon Minus Icon

Software and hardware issues. Analysis, configuration, update and troubleshooting of Windows PCs. Advanced troubleshooting. Preventive maintenance and security. Industrial Standard A+ for IT Support Technicians.

Network Management

Plus Icon Minus Icon

Understanding of types of networks, standards and protocols. Identification and description of network hardware, cabling and topologies. Planning and implementation of local and wide area networks. The OSI Reference Model and its constituent layers. The TCP / IP architecture. Network upgrade, maintenance and debugging. Wireless networks. Understanding of computer security. Network virtualization. Cloud computing.

Configuration of a Network Workstation Computer

Plus Icon Minus Icon

Windows installation and configuration. Administration and management of users and the system. Networking and interconnection with other systems. System optimization and problem-solving.

Computer System Administration

Plus Icon Minus Icon

Optimal installation of Windows Server on a workstation. Presentation of Hyper-V virtualization. Virtual machine creation. Introduction to PowerShell language. Installation and configuration of the servers. Configuring Roles and Features (DHCP, DNS, File Server). Active Directory Installation and Administration. Creating and managing group policies. Server monitoring. Hard disk management.

Planning a Network Infrastructure

Plus Icon Minus Icon

Windows server in core mode (command line). Configuration tool called 'sconfig'. Role of an Active Directory in an enterprise. Advanced DNS (DNSSEC), DHCP, and IPAM services. Types of files managed by Windows. ISCSI and NFS storage. BranchCache configuration and deployment for file access. Resources for Dynamic Access Control. Deployment and management of an AD infrastructure. Approval relationships between domains. Role Sites and AD Services. AD replication. AD CS Certificate Services. AD RMS Rights Management. AD FS Federation Services.

System Resource Management

Plus Icon Minus Icon

Introduction to PowerShell scripting language. Windows administration tasks with PowerShell. Cmdlets under PowerShell. Windows registry databases (HKCU and HKLM). Certificate management. Administration of a Windows client computer. Collection of information on systems. File search. Gathering information through WMI classes. Management of software, installations, executions, and updates. Management of devices and remote stations. Cmdlets for remote communication of the .NET Framework. Remote management and administration. Scripts. Introduction to Windows PowerShell ISE.

Security+

Plus Icon Minus Icon

Recognition of security threats and their consequences. Identification of the origin of the security threats and main areas of vulnerability. Detection and neutralization of security threats to systems and networks. Implementation of procedures, practices, utilities, and security devices. Presentation of recovery methods after a system failure.

Secure Interconnection of Computer Systems

Plus Icon Minus Icon

Description of the TCP / IP and OSI models. Introduction to IOS (Internetwork Operating System). Modes of access to equipment. Configuration modes, Using the CLI (Command line interface: basic commands). Physical layer and data link (Ethernet, ARP, copper and optical media). Protocols. Routers. Introducing a corporate email system. Installation and configuration of the Microsoft Exchange Server ™ server. Integration of Active Directory and use of DNS with Exchange. Preparation of the directory used for the installation of Exchange. Consoles on Exchange Server. License management. Mailbox services. Database administration via the EAC (Exchange Administration Center) and via the Management shell. Outlook Anywhere and Outlook Web App. Exchange ActiveSync. Operation of transport services. Transport Edge role. Administration of user and resource mailboxes. Management of distribution groups. Management of address lists and offline address books. Securing and maintaining the email infrastructure.

Network Security Implementation

Plus Icon Minus Icon

General architecture of a virtualization system. Basic concepts of Hyper-V. Hyper-V virtualization architecture. Storage, network architecture and sizing of servers. Configuration, installation and administration of a virtualization platform. System Center Virtual Machine Manager. Migration of virtual machines with SCVMM. Backup and restore of Hyper-V virtual machines.

Secure Network Planning and Design

Plus Icon Minus Icon

SharePoint technologies (history, deployment models, related products, and news). Deployment planning, necessary components, and prerequisites. Server farm topology and migration from an earlier version. SharePoint installation. Security accounts. Command line tools. Central Administration Console. Service applications. Process of creating a Web application and their permissions. Site collections and solution deployment. Creating a web application using a script. Monitoring tools and optimization settings. Resources for troubleshooting.

Introduction to Cybersecurity

Plus Icon Minus Icon

Overview of cybersecurity prevention and response activities. Safety and risk analysis and management. Types of analysis. Risk analysis. Predictive analytics. Behavioral analysis. Forensic analysis. Security of assets. Security technologies. Communication and network security. Validation and security testing. Detection of anomalies. Attempted intrusion. Data exfiltration. Report production.

Fundamentals of Cybersecurity

Plus Icon Minus Icon

Cyber​​security challenges. Infrastructure security. Device security. Local network security. Perimeter security. Security of teleworking mode. Identification of vulnerable components. Identification of the risks involved. Proposed corrective measures to mitigate the risks. Assessment of the effectiveness of corrective measures. Fundamentals of cryptology. Identity and access management. Identity management. Authentication. Authorisation. Federation. Governance. High privilege accounts. Challenges. Development of policies, procedures or contingency plans. Software life cycle. Optimization of the efficiency, performance and quality of software and information systems.

Penetration Tests

Plus Icon Minus Icon

Recognition, scanning and exploitation of security vulnerabilities in a context of prevention. Obtaining and maintaining access. Coverage of traces. Hacking tools and techniques used in cyber-attacks. Planning of penetration tests. Personal workplaces. Traditional servers. Mobile devices. Cloud computing. Telework. Development of policies, procedures or contingency plans. Limiting the effects of a breach in computer security. Optimization of the efficiency, performance and quality of software and information systems. Production of reports.

Cyber-Attacks and Cyber Defense

Plus Icon Minus Icon

Types of attack. Phishing. Ransomware. Malware. Psychological hacking. Trojan horse. Sequence of cyber attack. Cyber ​​attack detection. False alarm. Alert requiring immediate attention. Finding information about an attack target. Use of pirate administrator kits (rootkits). Use of backdoors. Types of cyber defense of an IT infrastructure. Network architecture. Management of privileges and access. Active defense techniques. Cryptography. Impact on the confidentiality, integrity and availability of information. Management of cybersecurity alerts and incidents. Cyber ​​resilience (Response plan). Identify the incident. Analyze the incident. Containment of compromised systems. Reduce the risk of data leakage or pivoting to other platforms. Eliminate the cause of the incident. Simulation of a cyberattack.

Internal Audit and Compliance

Plus Icon Minus Icon

Planning of an information security audit mandate. Conduct of an audit mandate. Internal audit standards and reference framework. Tools for recovering files and stored data. Audit techniques. Collection of information. Validation of the data collected. Use of management tools and security controls (SIEM, RCMP, etc.). Self-assessment of controls. Continuous audit and monitoring. Standards, laws and regulations applicable to information security. Audit report (clear, comprehensive and timely produced). Follow-up of the audit report. Follow-up of recommendations on strategies. Follow up on policy and procedure recommendations. Follow-up of recommendations relating to security and service delivery.

End of Studies Project

Plus Icon Minus Icon

Putting into practice and integrating the personal and professional skills necessary for the exercise of the profession. Application of knowledge and strategies learned in the classroom in a business context. Integration into the professional environment. Adaptation to the reality of the different business sectors. Collaboration with the work team. Participation in meetings. Project management. Procurement decision making. Familiarization with operating tools. Adaptation to a corporate culture. Implementation of professional conduct in accordance with the ethics of the profession.

Stay up-to-date with the industry’s latest leading software and tools

Admission

Benefits of this program

Employment Opportunities

 

  • Secondary V diploma or its recognized equivalent
  • Secondary IV Mathematics (Technical and Scientific Option or Science Option) or Secondary V Mathematics (Cultural, Social and Technical Option)
  • Criminal Reference Check
  • Successful admission test
  • A person who has received instruction considered sufficient by the college and meets any of the following conditions may be admitted to a program of studies leading to an Attestation of College Studies:

- the person has interrupted his or her full-time studies or pursued full-time postsecondary studies for at least 2 consecutive terms or 1 school year;

- the person is covered by an agreement entered into between the college and an employer or by a government program of studies;

- the person has interrupted his or her full-time studies for one term and pursued full-time postsecondary studies for one term; or

- the person holds a Secondary School Vocational Diploma.

Ref.: art. 4 College Education Regulations

  • Program offered in French or English
  • Day or evening classes
  • Learn in an inclusive environment
  • Dedicated and passionate instructors
  • Learn industry-standard skills and technologies
  • Accelerated course times so you can graduate quickly
  • Tight-knit, supportive community with classmates, instructors, and support staff
  • Earn your Attestation of College Studies in just a few months
  • Career Services department provides assistance finding jobs and building resumes
  • Authorized by the Ministry of Higher Education. CDI College Business. Technology. Health Care (Permit 749747)
  • Cybersecurity analyst
  • Cybersecurity coach
  • Cybersecurity consultant
  • Cybersecurity expert
  • Cybersecurity integrator
  • Information security consultant
  • Information security officer

 

  • Secondary V diploma or its recognized equivalent
  • Secondary IV Mathematics (Technical and Scientific Option or Science Option) or Secondary V Mathematics (Cultural, Social and Technical Option)
  • Criminal Reference Check
  • Successful admission test
  • A person who has received instruction considered sufficient by the college and meets any of the following conditions may be admitted to a program of studies leading to an Attestation of College Studies:

- the person has interrupted his or her full-time studies or pursued full-time postsecondary studies for at least 2 consecutive terms or 1 school year;

- the person is covered by an agreement entered into between the college and an employer or by a government program of studies;

- the person has interrupted his or her full-time studies for one term and pursued full-time postsecondary studies for one term; or

- the person holds a Secondary School Vocational Diploma.

Ref.: art. 4 College Education Regulations

  • Program offered in French or English
  • Day or evening classes
  • Learn in an inclusive environment
  • Dedicated and passionate instructors
  • Learn industry-standard skills and technologies
  • Accelerated course times so you can graduate quickly
  • Tight-knit, supportive community with classmates, instructors, and support staff
  • Earn your Attestation of College Studies in just a few months
  • Career Services department provides assistance finding jobs and building resumes
  • Authorized by the Ministry of Higher Education. CDI College Business. Technology. Health Care (Permit 749747)
  • Cybersecurity analyst
  • Cybersecurity coach
  • Cybersecurity consultant
  • Cybersecurity expert
  • Cybersecurity integrator
  • Information security consultant
  • Information security officer
Video Thumbnail

Experience the CDI College Difference

Play IconPlay Video

Industry Certifications

Gain a distinct advantage by earning industry-recognized certifications that validate your expertise and skills in key areas such as digital marketing, project management, and CRM. Our program prepares you to succeed, whether you're advancing, switching careers, or starting your own business. Invest in yourself and join a community of certified professionals shaping the digital economy.

Hubspot Logo

Industry Leading Employers

Our extensive network and reputation for excellence ensure that graduates are in high demand in today's competitive job market. Prepare to excel in sought-after roles with renowned companies and unlock limitless career opportunities. Elevate your career trajectory and secure your future with our program tailored to meet the demands of industry leaders.

Request Information

Hear From Our Graduates

Double Quote Icon

“My instructor has helped a lot over the past six months of my education here at CDI College. He keeps me open to new ideas by challenging me to do more.”

Michael T.

Double Quote Icon

“I'm very proud to get an instructor that is as kind and available as mine was. He was very supportive of all of us in the classroom and really helped us make our way throughout education.”

Anthony M.

Start Your Career Journey Today

Click on the button to book an appointment and:

  • Get Start Dates
  • Learn About Your Tuition and Funding Options
  • Meet An Admissions Representative for FREE One-on-One Career Advice