Applying as a Canadian applicant
Domestic students should apply online or by phone at 1-888-892-2228.
Applying as an International applicant
Campus tours
Campus tours are one of the best ways to experience Conestoga. During this time, we are offering online guided tours to show you all Conestoga has to offer.
Book your tourVirtual tours
If you can't make an on-campus tour or attend one of our events, the virtual tour is a great way to visit us.
View our Virtual tourCourses - May 2025
Level 1
Course details
Conestoga 101
CON0101
Operating System Security Models
INFO8571
Secure Network Administration
INFO8581
Network Components and Monitoring
INFO8591
Fundamentals of Cryptography
INFO8601
Cyberlaw, Ethics and Privacy
INFO8621
Software Application Security I
PROG8271
Level 2
Course details
Web and Wireless Security
INFO8561
Information Security Management
INFO8611
Information Security Project
INFO8631
Enterprise Application Security
PROG8281
Software Application Security II
PROG8291
Malware and Hacking
PROG8301
Level 1
Course details
Conestoga 101
CON0101
Operating System Security Models
INFO8571
Secure Network Administration
INFO8581
Network Components and Monitoring
INFO8591
Fundamentals of Cryptography
INFO8601
Cyberlaw, Ethics and Privacy
INFO8621
Software Application Security I
PROG8271
Level 2
Course details
Co-op and Career Preparation
CEPR8200
Web and Wireless Security
INFO8561
Information Security Management
INFO8611
Information Security Project
INFO8631
Enterprise Application Security
PROG8281
Software Application Security II
PROG8291
Malware and Hacking
PROG8301
Level 3
Course details
Co-op Work Term (Computer Application Security)
COOP8110
Please note:
Estimated required text and/or learning resource costs are based on the most recent available data through the Conestoga Campus Store.
Program outcomes
- Remediate vulnerabilities in software applications based on security threats assessment and testing.
- Design and develop security solutions for business processes and applications in order to protect business resources.
- Develop plans to incorporate security into the software development process and integrate emerging technologies safely into new software products or computer systems
- Develop policies and procedures that protect the property and privacy of the clients, owners, employees and other stakeholders of an organization
- Evaluate the effectiveness of a security system through security audits to identify and correct security issues.
- Develop and deliver appropriate security training to ensure compliance with security policies.
- Communicate security, protocols, policies and audit results and related documentation to any level of the organization.
- Develop asset management and risk management plans to protect the physical, and intellectual properties of an organization.