Contact us now to learn more about our scholarships and installment plans.

Logo of Excel

Contact us now to learn more about our scholarships and installment plans.

Search for programs, news...

MENU

Cyber Security Diploma

Currently Enrolling

Cyber Security

Academic Diploma

Cyber Security Diploma

About the Program

The Cyber Security Diploma program prepares you for a career in information security and technology. Become more confident and equipped in identifying vulnerabilities, protecting networks, and managing digital threats. Students will be able to understand security protocols, apply ethical hacking techniques, and monitor systems for potential breaches. They will also learn the fundamentals of risk management and compliance.


This program has been approved by the Private Training Institutions Regulatory Unit (PTIRU) of the Ministry of Post-Secondary Education and Future Skills.


Image

Career in
high demand

Image

Network & System
Protection

Image

Threat Detection
& Response

Image

Ethical Hacking
Techniques

Career Opportunities

Cyber Security Analyst



Network Security Technician




Security Operations Centre (SOC) Analyst



IT Support Specialist



Courses



Computer Security
Technology

This course describes the key security requirements of confidentiality, integrity, and availability. Discusses the types of security threats and attacks that must be dealt with. The course provides examples of the types of threats and attacks that apply to different categories of computer and network assets. This course also summarizes the functional requirements for computer security, explains the fundamental security design principles, and discusses the principle aspects of a comprehensive security strategy. 



Computer Security
Principles

This course describes how access control fits into the broader context that includes authentication, authorization, and audit. It then discusses the use of encryption in a database system and describes the operations of viruses, worms and trojans. The course also covers the principal concepts of role-based access control, summarizes the RBAC model and the principal concepts of attribute based access control.



Intrusion and Firewall

This course describes the concept of denial of service attack and distributed denial of service attacks. Discusses the features of host based intrusion detection and network based intrusion detection. This course summarizes the purpose of honeypots and Snort. It also explains the role of firewalls and its various basing options.



Software and System
Security

This course describes the problems that occur due to incorrect handling of program input. Describes the problems that occur due to interaction between programs and operating system components. This course also explains some of the specific aspects of securing Unix, Linux and Windows systems. The course introduces the steps needed to maintain security in virtualized systems.



Security Management
Issues

This course describes the process of IT security management. Outlines the process of selecting suitable controls to address risks and provides an overview of various types of physical security threats. This course also explains the use of PIV mechanisms as part of a physical access control system, discusses the need for e-mail and Internet use policies, and provides guidelines for developing such policies.



Cryptographic
Algorithms

This course describes the basic principles of symmetric encryption. Discusses the structure and function of DES, and issues involved in key distribution. This course also summarizes the use of HMAC for message authentication. Through this course, students learn the RSA algorithm and the Diffie-Hellman algorithm. Students also understand the key considerations in implementing the logging function for security auditing and the process of audit trail analysis.



Network Security

This course describes the functionality of S/MIME and the threat it addresses. Discusses the key components of SSL and the use of HTTPS. This course introduces the basic operations of Kerberos and compares the functionality of Kerberos versions 4 and 5. Students are also exposed to unique security threats posed by the use of mobile devices with enterprise networks.



Cloud and Human
Resource Security

This course also explains the NIST cloud computing reference architecture and describes Cloud Security as a Service. Through this course, students understand the relationship between cloud computing and IoT, and the IoT Security Framework. The course describes the benefits of security awareness, training and education programs. The course also presents an overview of key issues in the area of privacy.

Admission Requirements

Students are required to be 19 years of age prior to the start of the  program or possess a high school diploma (or equivalent), and provide  evidence of one of the following English proficiency requirements: 

• Completion of grades 9-11, including English 10 with a grade of  ‘C’ or higher from a country where English is one of the principal languages, or 
• Completion of 2 years of full-time post-secondary education at  an accredited institution where English is the language of  instruction, or 
• Evidence of graduation from a language program with an  established pathway/articulation agreement allowing direct  entry (no further testing required) to a diploma or degree  program at a public institution in Canada, or 
• Provide verified results for one of the English language proficiency tests listed below. Test results must be dated no  more than two years before the start date of the program: 
• International English Language Testing System (IELTS)  Academic – Minimum overall score of 5.5 
• Test of English as a Foreign Language (TOEFL) IBT – Minimum overall score of 46 
• Canadian Academic English Language Assessment (CAEL) – Minimum overall score of 40 
• Canadian English Language Proficiency Index Program  (CELPIP)  
• Listening 6, Speaking 6, Reading 5, and Writing 5
• Duolingo English Test (DET) – Minimum overall score of  95 
• Pearson Test of English (PTE) Academic – Minimum overall score of 43 
• Cambridge English Qualifications: B2 First exam (FCE) -Minimum overall score of 160 or “C” 
• Cambridge Linguaskill – Minimum overall B2 level 
• LANGUAGECERT Academic – Minimum overall B2 level 
• The Michigan English Test (MET) – Minimum overall B2  level 
• iTEP Academic – Minimum overall score of 3.5 
• EIKEN – Minimum placement of Grade Pre-1

Tuition & Fees

ACADEMIC DIPLOMA

Domestic students

Tuition

$13,500.00

Application Fee

$250.00

Textbooks

$150.00

Total:

$13,900.00

International students

Tuition

$20,000.00

Application Fee

$500.00

Textbooks

$150.00

Total:

$20,650.00

Please review our refund policy.

Schedule

Check the start dates of the program. Please note that they are subject to change.


UPCOMING START DATES FOR 2025

Fall, Winter, Spring, and Summer

Duration
24 Weeks of Duration

Format

In-Class, Distance, Combined

480

total program
hours

24

weeks
total

5.5

months of
duration

Why Excel Career College?

Practical, hands-on diploma programs designed to guide you every step of the way. Whether you’re switching careers, upskilling, or starting fresh, we’ll help you excel.

Discover the Excel Experience

Frequently Asked Questions (FAQ)


Do I need experience in IT or Cyber Security to join?

No, you don’t need any prior experience. Our program covers everything from the basics to advanced skills, perfect for beginners.


Are there payment plans or financial aid options?

Yes, we offer payment plans for tuition fees, and there may be scholarships available. Some students may qualify for Student Aid BC Loans (domestic), as well as other funding options. Speak with our admissions team for details.

IS THIS THE RIGHT PROGRAM FOR YOU?

Meet with an Admissions Advisor to Find Out!

Book a Meeting

Stay Connected with Us

Subscribe to be a part of Excel!

Thank you for subscribing to our newsletter! Stay tuned for updates.