View programs
This course prepares students to assess and then correct the vulnerabilities present within information systems. Students learn about tools and penetration testing methodologies used by ethical hackers and discusses what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types." Systems are also investigated.
Note: Clicking on any of the following links will take you to the program of studies where you can obtain more information or choose additional courses for your shopping cart.
Click here to be informed when this course becomes active
We are currently maintaining a waitlist for this course. If you would like your name added to the waitlist, please contact the Registration Call Centre at 905.721.3000.
Unfortunately, registration is no longer available for this course. Please check the upcoming semester or feel free to browse our website for other courses of interest. You may also click on the link above this course on the course detail page to be notified when a new class is added.
Course Filled to Capacity. Unfortunately, registration is no longer available for this course. Please check the upcoming intakes or feel free to browse our website for other courses of interest.