Location
Start Dates

  • September 02, 2025
Duration

2Terms

Course Delivery

  • Face to Face - Synchronous
  • Online - Synchronous
  • Online - Asynchronous
Tuition & Fees

Domestic: CAD $14,842
International: CAD $26,680
Estimated Book Costs: CAD $700

Program Description

The need for cybersecurity expertise is only going to increase as the technological industry continues to evolve and expand. Working professionals and recent graduates can advance their career goals by building on their previous education and experience with a Cybersecurity Post-Diploma Certificate. By focusing on operating system concepts, introductory computer forensics and network protocols, this program will prepare learners to design and implement secure computation solutions. In addition, graduates will enhance their business acumen with stronger communication, technical and problem-solving skills.

Potential graduate career opportunities

This in-demand industry is experiencing a shortage, opening the door to a range of exciting career opportunities including:

Cybersecurity analyst Data security analyst
Cyberdefense solutions sales specialist Cloud portfolio architect
IT security specialist Information security analyst
Security analyst IT security architect
Network technician Quality assurance
IT developer IT architect
Solutions architect Test analyst
Systems administrator IT security advisor
IT asset management
Course Listings Request More Information Applying FAQ
Domestic Applicants

Welcome Centre
South Campus – Main Floor
info@bowvalleycollege.ca
403-410-1402


International Learner Applicants

International Education
South Campus – Main Floor
international@bowvalleycollege.ca
403-410-3476


Admission Requirements

Completion of a post-secondary diploma or degree in information technologies, computer engineering, software development, management information systems, or equivalent.

English Proficiency Requirements

For applicants whose first language is not English, please review our English language proficiency requirements

Laptop Specifications

A laptop computer with course applicable software will be required (specifications below)

  • Intel quad core CPU (i7) or later generation
  • 16GB RAM or greater
  • 512 GB SSD or greater (Hard Drive & storage)
  • On-board integrated (Video card)
  • 15 inches or greater screen
  • Windows 10 Pro/education 64-bit (MacOS is not supported)
  • Portable hard drive (for data backup)

Domestic Applicants

Welcome Centre
South Campus – Main Floor
info@bowvalleycollege.ca
403-410-1402


International Learner Applicants

International Education
South Campus – Main Floor
international@bowvalleycollege.ca
403-410-3476

TransAlta Women Pivoting in Tech Entrance Bursary

Funded by TransAlta, this award was established to help all women entering a Diploma or Post-Diploma Technology-related Program at Bow Valley College. These bursaries are available to help cover tuition costs and help offset program related costs such as technology, childcare, and basic expenses.

Award amounts:

  • $5,000 in your first semester
  • $5,000 in your second semester

Apply today and be eligible for the TransAlta Women Pivoting in Tech Entrance Bursary.

Apply for Bursary

Course Listing


Full course outlines are available here.

Curriculum subject to change. Current students should confirm program requirements with their academic advisor.

Term 1

Required CoursesCredit

In this course, learners develop a security mission to meet an organization's requirements. Learners map the architecture of a network in anticipation of constructing security plans. Focus falls on the major components within a typical network as well as the tools and techniques fundamental to information security.

Learners address the balance between security needs and the needs of the organization while protecting organizations from intrusion. Focus is on security architecture, filing systems, authentication, password management, account management, access control, end-point protection, antivirus protection, and endpoint detection and response.

In this course, learners use the tools and techniques of cryptography. Focus is on encryption types, digital signatures, data integrity, authentication, protocols, and key management.

In this course, learners use the tools and techniques needed to safeguard organizations from threats to business activities such as network attacks, natural disasters, or unplanned disruptions to essential services. Focus is on business recovery planning as well as disaster recovery planning and how these impact cybersecurity.

In this course, learners focus on the alignment of security practices with organizational policy and business practices. Topics include security governance, continuity planning, security strategies, mitigation, and security training.

In this course, learners practice the fundamental network security tasks, such as rights and permissions, local and remote network authentication, identification, and network monitoring. Focus is on network architecture, information transmission, e-mail and web security, attack countermeasures, and hacking.

Term 2

Required CoursesCredit

Learners will take what they have learned in their previous courses and
will apply the principles of security to cloud computing. Topics will
cover an introduction to cloud computing, security challenges,
infrastructure security in the cloud, policy and governance for cloud
computing, compliance and legal considerations, identity and access
management, and data security.

Learners will be introduced to the most common and current
vulnerabilities and how to defend against them for applications. Topics
will include testing applications for vulnerabilities and testing
applications for misconfigurations, cloud applications, and scanner and
the interpretation of their output. Additionally, learners will use manual
and automated tools for both clients and servers to map, discover, exploit and secure web applications.

This course will provide learners with techniques to find, assess, and
correct vulnerabilities in information systems using industry best
practices. Upon completion of this course learners will be able to find
cyber-attack vulnerabilities, and will understand the importance of
protecting data from attack with penetration testing methodologies.

This course builds on the skills learned in ISEC3201 and advances knowledge of the security architecture used in server operating systems and mobile devices. Learners explore the tools used to control, access, and secure networks and devices to prevent cybersecurity breaches

This course expands on the skills studied in Introduction to Network
Security to include intrusion prevention and virtual private networks.
Learners will cover topics on existing security technologies, products and
solutions. They will learn firewall design, IPv6, installation and
configuration, intrusion prevention using routers, and virtual private
network implementation.

In this course, learners gain hands-on experience through a Work Integrated Learning (WIL) project that incorporates the knowledge, skills, and attitudes gained through the Cybersecurity Post Diploma. Learners apply their skills to a workplace setting while gaining valuable experience in the areas of applied research and client communication. The work completed by learners needs to be sufficient in scope and depth to address a clear majority of the program outcomes.

Your cart is currently empty.

Browse Available Courses

Close

  • If you are currently studying in a post-secondary program at BVC, please register for your courses via mybvc to ensure your enrolments and fees are processed appropriately.
  • Cart total based on domestic tuition rates. For information about International Tuition rates please see Additional Fees Apply
  • If you anticipate applying for a student loan, your payment will be refunded to you based on your loan award once your funding has been received by BVC.

We use cookies to ensure that we give you the best experience on our website. Learn more in our privacy policy