School of Technology

Cyber & Cloud Security Program

Providing you with the knowledge on how to keep cloud customers' and organizations' information secure by focusing on protecting valuable data and systems hosted in the Cloud.

Program Delivery

Online

Program Overview

The Cyber & Cloud Security program will give you the tools to keep cloud customers and organizations information secure allowing you to provide the following to an organization:

  • Support an organization to determine data requirements (i.e. credit card data for PCI DSS compliance, personally identifiable information for privacy legislation compliance, classified data, etc.)
  • Identify vulnerabilities and potential breaches in data confidentiality, system and data integrity, data and system availability
  • Provide security guidance to business users wanting to leverage cloud computing
  • Collaborate with IT business process owners to create or maintain management procedures, daily operating procedures, and standards documentation to facilitate a uniform delivery of service
  • Support businesses in understanding the data life-cycle (create, store, use, share, archive, destroy) and the related responsibilities of the data
  • Participate In the creation, implementation, and maintenance of the organization’s information/cybersecurity management program
  • Perform moderately complex technical activities using cloud platforms (such as Microsoft 365 and Azure, Amazon Web Services, Google Cloud Platform) that improve confidentiality, integrity, and availability of data and related systems
  • Validate configurations of technologies support the objectives of the organization, maintaining security while controlling costs
  • Work with cloud technology, such as software-defined networks, virtual machines, hypervisors, containers, container orchestration technologies, virtual firewalls, virtual intrusion detection systems, data loss prevention systems, file integrity monitoring systems, security information and event management systems, Windows, Linux

The program is intended to prepare students for the following certifications: 

  1. Systems Security Certified Practitioner (SSCP)
  2. Certificate of Cloud Security Knowledge (CCSK) 
  3. Microsoft Certified Azure Administrator Associated (AZ-104)
  4. AWS Certified Architect Associate (SAA-CO2)
  5. TE Cyber Defense Pro 
  6. TE Hybrid Server Pro 

 

Robertson’s Cyber and Cloud Security program was developed in consultation with the following industry experts: Privity Systems Inc. and Security Resource Group Inc. Robertson is in constant consultation with industry experts to ensure the curriculum and its delivery is relevant, timely and aligned with industry standards and best practices.

Program Delivery

Online Learning

  • Study on your own schedule with the option to attend live lectures throughout the week to connect with your instructor.
  • Remote learning doesn't mean you're doing it on your own! You will always have the support of your instructors and education team through video calls, discussion boards and more.
  • Brightspace helps you stay on track and hold you accountable while giving you flexibility.

Visit our Online Learning to learn more about this delivery format.

Program Details

Quick Facts

clock

Duration:

49 weeks (11 Months)

suitcase

Practicum:

3 Weeks
Learn More

Admission Requirements

Our admissions agents can work with you to ensure you meet the program’s criteria. This program is not currently open to International Students.

Need advice? A Student Admissions Advisor is here to support you.

Contact Admissions

Career Opportunities

  • Cyber Security Specialist
  • Information Security Analyst
  • Systems Administrator

According to Canada’s Job Bank, the employment outlook for this field (NOC-2171) is projected to be strong for the 2021 – 2023 period across Canada.  This can be attributed to contributing factors, including: employment growth and the addition of new positions being made available, retirement of current workforce and a small influx of unemployed workers with recent experiences in this occupation.

Graduates of the Cyber and Cloud Security diploma program will be able to find employment across many industries as information technology and the knowledge-based economy continues to grow both in size and importance.  

Continue your research:

 

You could be earning in less than a year
$52,000-$85,341

Lifetime Career Services

Even though you’ll leave Robertson once you graduate, we will support you throughout your career. Our team will help you with resume building, job hunting, and interview preparation and will continue to guide you as you advance in your role.

Before you graduate, you’ll be paired with a career specialist in your field who will help you find a meaningful place to start your career. As a graduate, you’ll have lifelong access to student services that are committed to your success and helping you thrive.

Learn more about Lifetime Career Services.

Next Start Dates

Online on your own time with 3 real-time optional sessions per week with your instructor. Real-time sessions are recorded so that you have the option to watch them at a later time.

February 26, 2024
Apply Today
April 29, 2024
Apply Today

New start dates are being released all the time. Contact us for more dates.

Topics of Study

Communication - 20 Hours

This course is designed to provide students with a comprehensive knowledge and understanding of effective communication skills required in both personal and professional settings. The course explores the essential elements of communication, including interpersonal communication, leadership styles & characteristics, professional networking, conflict resolution and interpersonal communication. Students will develop a strong foundation in communication theory that will help in communicating effectively and confidently in different professional and personal settings.

 

Professionalism - 20 Hours

This course will introduce students to the concept of professional practice. Students will be introduced to professional competencies, research skills, writing, and presentation skills. Students will develop an understanding of project-management skills, and the importance of ongoing professional education and certification.

Ethics - 20 Hours

This course will introduce students to the concept of professional ethics with understanding of different ethical principles and theories and how they apply cyber & cloud security roles. Students will learn why ethics matter and different ethical dilemmas in the cyber & cloud security field as well as understanding of their responsibilities and accountabilities for legal, regulatory, security, privacy, governance, and policy requirements related to information management. Students will develop a strong ethical framework that guides their decisions thereby fostering integrity and social responsibility.

Network * - 80 Hours

This course is designed to familiarize students with local area networks (LANs), wide area networks (WANs), the Internet, and the hardware and software associated with networking. Understanding the fundamentals of LANs, WANs, hardware, and software are core to the networking industry. You will gain the knowledge that you need to become certified, and the practical skills you will need to be well on your way to a job in the IT networking field. Upon completion of the course you will be prepared to sit for the CompTIA’s Network + N10-006 exam.

Security + - 80 Hours

This course is designed to introduce students to the issues associated with modern day security in the IT world. This course covers most major security topics and is designed to prepare the student to be able to take and pass the SY0-401 exam to become CompTIA Security+ certified.

Information Security Concepts - 100 Hours

This course provides students with understanding of the fundamental theories and concepts in information security with the knowledge required to protect sensitive information and mitigate risks in an enterprise environment. Students will explore different concepts of information security including identifying and implementing security objectives and control types through the application of various industry best practices and frameworks.

Technology Management Concepts - 100 Hours

This course introduces students to fundamental principles and strategies related to technology management that is required to maintain a secure computing environment. Students will be introduced to different technology management programs such as change & configuration management, encryption key management, disaster recovery/ business continuity, identity and access management, incident management, patch management, risk management, vulnerability and performance management etc. 

Data Security Foundations - 40 Hours

This course can provide students with a comprehensive understanding of the principles of data security and protection. It covers the fundamental concepts and techniques necessary to secure sensitive data, including data classification, access control, encryption, data loss prevention, and incident response. The course also explores various data security standards and regulations, such as GDPR and HIPAA, and their implications for organizations.

IT Architecture Concepts - 40 Hours

This course introduces students to IT architecture concepts required to create secure system applications. This includes reviewing formal security models (such as Bell-LaPadula, Biba, Clark-Wilson, Brewer-Nash, Graham-Denning, etc.), as well as looking at how those theoretical models get implemented on critical technology components (like computers, operating systems, applications, networks, and databases).

Business Systems Analysis Concepts - 40 Hours

This course introduces students to the importance of business systems analysis and its role in developing secure systems. This includes learning how to characterize a system based on the criticality and classification of the data, as well as how to perform various typical business analysis processes such as building use cases, conducting feasibility studies, doing requirements analysis, and modeling secure solution designs.

Secure Software Development Concepts - 20 Hours

This course introduces students to the concepts related to secure development of software required for maintenance of data confidentiality, integrity, and availability. This includes orienting students with different generations of development languages, as well as with techniques used to develop software securely (such as designing with failure in mind and secure recovery). Common security issues associated with software will be explored (such as those identified by OWASP), as well as how one goes about testing applications to confirm that they are secure (i.e. DAST/SAST, synthetic transactions, and misuse cases).

Microsoft Azure - 60 Hours

This course provides students with Azure foundations, starting with  working  within the Azure portal and being introduced to common tools used in the Azure environment. Students will learn how to manage different Azure cloud services such as storage, security, networking, and compute cloud capabilities, and get hands-on experience creating virtual machines and virtual networks. The course will also focus on subscription and resource management required for tracking and estimating service usage and related costs, as well as identity management through which students will learn how to grant appropriate access to Azure AD users, groups, and services using role-based access control (RBAC).

Amazon Web Services - 20 Hours

This course provides students with AWS Solutions Architect foundational concepts that will allow them to learn how to design available, cost-efficient, fault-tolerant, and scalable distributed systems on AWS. Students will learn how to architect and deploy secure and robust applications on AWS technologies, define solutions using architectural design principles based on customer requirements, and provide implementation guidance as necessary. The course will similarly yield an understanding of security features and tools that AWS provides and how they relate to traditional services.

Career Preparation - 40 Hours

This course provides students with an overview of searching for employment opportunities, creating professional and targeted resumes and cover letters, and preparing for an interview. Students will learn about job hunting online, the application process for job aggregators, and discover the potential benefits of networking to help secure a job in their field.

Foundations of Cyber Defense & Cloud - 100 Hours

This course prepares students to work completely to complete network defense skills and certifications.

Hybrid Computing Fundamentals - 100 Hours

This course measures a student’s ability to manage Windows Server in anon-premises, cloud, or hybrid configuration.

Practicum - 120 Hours

The practicum and practical project provide students with the skills to integrate learning across courses in a hands-on and practical manner.

How It Works

Getting Started

Our flexible start dates give you plenty of opportunities to plan for school and live your life around it.

Taking the Course

All Robertson Online courses are hosted on Brightspace, an online platform designed to give you everything you need to succeed in remote learning.

Entering the Workforce

Our programs set you up to adapt to industry changes and thrive in our modern digital workforce.

Visit the How It Works page to learn more about our online student experience. To learn more about how Brightspace gives you everything you need to succeed in your online courses, click here.

Financial Assistance & Funding

Robertson offers a variety of financial aid opportunities to ease students’ stress and allow them to focus on their studies. If you need extra support, we have flexible funding to accommodate all our students, no matter their financial situation. Our dedicated Financial Aid Officers will help you every step of the way.

Questions about tuition & financial assistance?

Contact Admissions

Practicum

The practicum is an essential part of a learner’s program. It is both a graduation requirement and an extension of in-class learning. The practicum asks you to apply the skills, theories, and concepts that you learned in your classes in an entry-level work experience situation. 

Practicum must begin and end within the dates outlined in your program schedule and enrolment contract. Practicum is a full-time, unpaid commitment, and is jointly-procured — where you work directly with our Practicum team to obtain a training-related placement.  Your active participation with our Practicum team in the search for your practicum placement will enhance your career development skills, industry networking opportunities, and professional communication skills.

Certifications

The Cyber and Cloud Security Professional program is intended to prepare students for the following six certifications:

Systems Security Certified Practitioner (SSCP)

Click here to learn more.

Certificate of Cloud Security Knowledge (CCSK)

Click here to learn more.

AWS Certified Architect Associate  (SAA-C02)

Click here to learn more.

Microsoft Certified Azure Administrator Associate (AZ-104)

Click here to learn more.

TE Cyber Defense Pro 

Click here to learn more.

TE Hybrid Server Pro 

Click here to learn more.

Students will receive vouchers for each exam listed above at no additional cost. This is a value of over $2850. 

Industry Attestations

The following includes cyber and cloud security industry attestations that have given us the permission to use their names, role and organizations on our website. They have also given us permission to use excerpts from the feedback they provided previously on our program on our website.

 

Government of Canada

“The curriculum covers all subjects and competencies very well.” 

– John Adeyefa, Cyber and Cloud Security Consultant, Government of Canada

 

SRG Security Resource Group Inc.

The Curriculum provides a broad overview of the concepts and practical applications required for an entry level cyber security analyst. I appreciate the inclusion of some of the softer skills within the program as these are critical in leading to long term success within the Cyber Security industry. I believe there are 2 type of Information security professionals – technical and the governance focused. Where most students will enter the field focused and energized by the technical aspect, as the industry matures and there is a need for those in the governance (soft skills) that will also make a tremendous impact.

 This program would prepare the graduate for entry level work, such as:

  • SOC Junior Analyst
  • Call centre Analyst
  • (junior) Security Analyst / consultant
  • and not completely within the cyber Security area:
  • Business Analyst

 

The program provides the graduate with a solid foundation and hands-on experience that are in demand in today’s global market.”

– Bjorn Gudehus, Service Delivery Manager, MSS On-Boarding and Project Services, SRG Security Resource Group Inc.

 

As the person who makes the hiring decisions for SRG and the SRG Cyber Security Division, I would hire a graduate from this program. The materials are easy to grasp and based on industry standards already in place. The curriculum provides all basics one would need (to work as a cyber security analyst). The program is designed to provide the basic principles and understanding of cyber and cloud security; it would not take more than a few months after graduating to find work.”

– Brian Zerr, Vice President, Cyber Security Services, SRG Security Resource Group Inc.

 

Program Development Partners

 

Privity Systems Inc.

Privity Systems Inc. has well over a decade of experience in the IT security field and has extensive experience working in the cloud security arena with a specific focus on regulatory compliance. As a Payment Card Industry (PCI) Qualified Security Assessor (QSA) company, Privity has been helping companies secure their IT assets and credit card processing environments in the cloud, and has been formally attesting to the accuracy of PCI Data Security Standard (PCI DSS) security audits to regulators.

Shawn Chaput, is also one of the co-founders of the Cloud Security Alliance and the author of the section on “Compliance” in their original 2008 guidance document. A participating committee member of several working groups related to information security at the Canadian Standards Association, Shawn is a recognized expert of ISO as related to ISO/IEC 27000 series best practices. In addition to more than 20 years of IT experience, Shawn has an MBA in Management of Technology and holds more than 30 certifications from different vendors and organizations, including CIA, CRMA, CISSP, CCSP, QSA and several Azure, M365, and AWS technical certifications.

Katarina Ringwood, an expert on risk management, privacy, and business strategy, is Privity’s other co-owner and co-author of a cloud compliance chapter of Springer Publishing’s 2010 book “Cloud Computing: Principles, Systems & Applications”. In addition to being a past participant of Cloud Security Alliance’s Group 2 which provided guidance for critical areas of focus in cloud computing, Katarina has been a member of various special interest groups responsible for developing supporting documentation on topics that included scoping, encryption, tokenization, and virtualization.  An Executive MBA graduate, Katarina holds several professional certifications that demonstrate her expertise and knowledge, such as Certified Information Security Manager (CISM®), Certified Information Privacy Professional Canada (CIPP/C®), and Certified in Risk and Information Systems Control (CRISC®).
 
 

SRG Security Resource Group Inc., Cyber Security Service

Tillman Hodgson serves as Operations Manager, Managed Security Services (MSS) for SRG Security Resource Group Inc., Cyber Security Service. He is an information security professional with 21 years of enterprise Unix/Linux, network and management experience with a 20 year focus on information security. Senior-level IT security professional with a proven record of cost-effective security and privacy management through accurate threat assessment, effective security controls and performance metrics, and the alignment of security posture to business objectives. Tracy is an analytical and experienced ISMS auditor who specializes in assessing administrative and technical controls for effectiveness and compliance to a variety of frameworks and legal and regulatory body requirements.

Tracy Hodgson serves as SO Certified Lead Auditor for SRG Security Resource Group Inc., Cyber Security Service. She offers 22 years of risk management experience in various industries and applies that skillset to great effect in security assessments, gap analysis, policy development, and audits. She is the holder of Certified Information Systems Security Professional (CISSP) and Certified Information Systems Auditor (CISA) refers to a designation issued by the Information Systems Audit and Control Association (ISACA).

Let's Get Started

Simply fill out the form below and one of our Student Advisors will provide any extra information you need and get your account activated as early as today.

Speak with admissions
1 (855) 333-9319
Request Info

Program Availability

This program is neither available on campus or via Robertson Online.

Select A Campus