Applying as a Canadian applicant
Domestic students should apply online or by phone at 1-888-892-2228.
Applying as an International applicant
Campus tours
Campus tours are one of the best ways to experience Conestoga. During this time, we are offering online guided tours to show you all Conestoga has to offer.
Book your tourVirtual tours
If you can't make an on-campus tour or attend one of our events, the virtual tour is a great way to visit us.
View our Virtual tourCourses - May 2025
Level 1
Course details
Conestoga 101
CON0101
Windows Infrastructure and Security
INFO8461
Linux Infrastructure and Security
INFO8471
IT Security Planning, Audit and Compliance
INFO8481
Network Security I
INFO8491
Fundamentals of Information Security
INFO8835
Level 2
Course details
Career Management
CDEV8132
Network Security II
INFO8501
Fundamentals of Computer Forensics
INFO8845
Virtualization and Cloud Security
INFO8855
Wireless and Mobile Security
INFO8865
Emerging Security Technologies
INFO8875
Please note:
Estimated required text and/or learning resource costs are based on the most recent available data through the Conestoga Campus Store.
Program outcomes
- Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.
- Comply with security policies, standards, and regulations typical to an organization in the design and implementation of security solutions.
- Plan, implement, and evaluate security policies and strategies using project management principles to effectively respond to the needs of the organization’s information security requirements.
- Outline the processes and procedures involved in the maintenance and deployment of security solutions.
- Assess and test networked and virtualized IT systems with respect to security threats such as theft, damage, as well as alternation and/or interruption of services.
- Install, configure and troubleshoot system and network enhancements to promote security in an organization.
- Develop security strategies and processes for business communications that respond to the needs of all stakeholders.
- Evaluate the effectiveness of a security system through security audits to identify and correct security issues.
- Develop and deliver appropriate internal security documentation and training to ensure compliance with security policies.
- Communicate security protocols, policies, and audit results and related documentation to any level of the organization.