Graduate Studies Certificate Programmes

Graduate Certificate in National Security

Note: This certificate is intended to help prepare individuals for future responsibilities within a complex and ambiguous global security environment.

The topics cover basic and specialized areas of National Security across multiple disciplines.

The equivalent of 5 one-credit courses is required for completion of the certificate.

Eligible courses:

  • MPA505: Professional Internship (*exclusion of MPA507 for certificate)
  • MPA507: Advanced Professional Internship (*exclusion of MPA 505 for certificate)
  • MPA523: Defence Decision-Making
  • MPA527 Professional Ethics and Defence Management
  • MPA539: Economics of Defence
  • MPA541: Performance Audit in the National Security Sector
  • MPA549: Economics of National Security
  • MPA555: Management Information Systems for Defence Management
  • MPA591: Cyber Statecraft and National Security
  • NSP571: Canada and the Global Strategic and Security Environment
  • NSP572: Canadian Government and Decision-making in a Strategic Context
  • NSP575: Thinking, Making and Formulating Strategy in Security Contexts
  • NSP581: Strategic Leadership
  • NSP582: Institutional Strategy
  • NSP591: Strategic Command: A Canadian Context
  • NSP592; Pan-domain Operations
  • NSP597: Regional Security Studies
  • PR500: (2 credit project - topic must be approved)
  • Other courses subject to the approval of the Chair of the Master of Public Administration (MPA).

Cyber Security Certificates

Graduate Certificate in Cyber Security

Important Notice: The Universities Ontario Council on Quality Assurance considers this certificate to be graduate diploma which must receive their approval; admissions in this programme have been paused while this approval is being sought.
Note: This certificate is intended to allow individuals to gain a foundational understanding of the defence Cyber Security field.

The topics cover basic and specialized areas of Cyber Security across multiple disciplines. In addition, the certificate can be applied to the MEng, MASc, MBA, and MPA degrees, at the discretion of those programmess.

The equivalent of 5 one-credit courses is required for completion of the certificate.

Eligible Courses

  • EE547: Digital Forensics
  • EE569: Malware Analysis and Reverse Engineering
  • EE578: Introduction to Computer Systems and Network Security
  • EE580: Applied Cyber Operations
  • EE588: Topics in Cybersecurity
  • EE593: Advanced Network Traffic Analysis
  • EE595: Cyber Threat and Attack Techniques
  • EE597: Operational Technology Cybersecurity
  • EE598: Artificial Intelligence in Cybersecurity
  • MBA509: Cyber Security Policy and Management
  • MPA535: The Cyber Challenge
  • MPA591: Cyber Statecraft and National Security
 

Professional Certificate in Cyber Security Foundations

Note: This certificate is intended to allow individuals to gain a basic understanding of the defence Cyber Security field in a professional context through the completion of relevant short courses.

The topics cover basic and specialized areas of Cyber Security across multiple disciplines. These short courses are not associated with any other academic programme and are not evaluated for equivalent academic credit to regular graduate courses or undergraduate courses. While language assistance is provided for francophone students, this program is only offered in English.

The completion of five (5) courses from the eligible courses list is required for completion of the certificate.

Eligible courses:

  • AEAT: Advanced Exploitation and Analysis Techniques
  • CompFun-I: Cyber Security Computing Foundations-I
  • CompFun-II: Cyber Security Computing Foundations-II
  • CyberX: Cyber Exercise
  • DigForIT: Digital Forensics Investigation Techniques
  • ETC: Exploitation Techniques Course
  • IDEAS: Intrusion Detection and Extrusion Analysis Skills
  • MASC: Malware Analysis Short Course
  • SCCRAM: Short Course in Cybersecurity Risk Assessment Methodology
  • SCINS: Short Course in Networks and Security
  • SPOTS: Security of Platform / Operational Technology Systems
 

Cyber Security Foundations Programme Certificate

The Cyber Security Foundations Programme Certificate (CSFPC) will be awarded to the Cyber PME students who successfully complete the following ten (10) courses:

  1. AEAT: Advanced Exploitation and Analysis Techniques
  2. CompFun-I: Cyber Security Computing Foundations-I
  3. CompFun-II: Cyber Security Computing Foundations-II
  4. CyberX: Cyber Exercise
  5. DigForIT: Digital Forensics Investigation Techniques
  6. ETC: Exploitation Techniques Course
  7. IDEAS: Intrusion Detection and Extrusion Analysis Skills
  8. MASC: Malware Analysis Short Course
  9. SCINS: Short Course in Networks and Security
  10. SPOTS: Security of Platform / Operational Technology Systems
 

Professional Cyber Security Foundations Course Descriptions

AEAT: Advanced Exploitation and Analysis Techniques

  • Course length: twelve (12) days (delivered at RMC) over three (3) weeks.
  • Course format: Each week consists of four (4) days of classroom lectures (30%) and challenging hands-on lab work (70%).
  • Prerequisites: IDEAS or equivalent background.
  • Objective: The primary objectives of AEAT are to provide the students with an introduction to the exploitation of standard authentication mechanisms and perimeter defences, to analyze traffic using statistical and visualization techniques, and to introduce advanced techniques for host-based detection and analysis.

CompFun-I: Cyber Security Computing Foundations-I

  • Course length: fourteen (14) days (delivered at RMC) over three (3) weeks.
  • Course format: The course consists of a mixture of classroom instruction (40%) and hands-on exercises and lab challenges (60%).
  • Objective: The primary objectives of CompFun-I are to provide the students with an introduction to the Linux and Windows operating systems including shell scripting, basic python programming and a foundational knowledge of network servers. The course’s philosophy is to provide a high ratio of hands-on practice to class-based learning, with a heavy emphasis on computer scripting and programming. The course is designed to provide the basic computer foundation material necessary the remainder of the RMC Cyber PME courses.

CompFun-II: Cyber Security Computing Foundations-II

  • Course length: twelve (12) days (delivered at RMC) over six (6) weeks.
  • Course format: Each week consists of two (2) days of classroom instruction (50%) and hands-on exercises and lab challenges (50%).
  • Prerequisites: CompFun-I or equivalent background
  • Objective: The primary objectives of CompFun-I are to provide the students with an introduction to the Linux and Windows operating systems including shell scripting, basic python programming and a foundational knowledge of network servers. The course’s philosophy is to provide a high ratio of hands-on practice to class-based learning, with a heavy emphasis on computer scripting and programming. The course is designed to provide the basic computer foundation material necessary the remainder of the RMC Cyber PME courses.

CyberX: Cyber Excercise

  • Course length: twelve (12) days (delivered at RMC) over three (3) weeks.
  • Course format: The first two (2) weeks of the course consists of a mixture of classroom instruction, Blue Team planning and individual exercise preparation. The final week of the course consists of four (4) days of challenging live Red on Blue exercise. This course is intended as a Cyber PME program capstone event.
  • Prerequisites: Students attending this course should have completed several of the Cyber PME short courses including at least one of the more advanced courses such as MASC, ETC, AEAT or SPOTS.
  • Objective: This course will explore the application of cyber operations through the preparation for and participation in a major cyber exercise where students will design networks in support of a military operation incorporating simulated kinetic and cyber effects, build the network and operate it. Students will be required to operate in the face of a sophisticated and determined adversary whose goals are in direct opposition to those of the students, thereby generating conflict in cyberspace. In preparation for the simulated engagement, students will be required to build and deploy services such as directory, name resolution, electronic mail, web, file, etc. During the engagement, students will be required to monitor these services, perform other network maintenance tasks, carry out intrusion detection and other defensive cyber operations tasks, as well as participate in offensive cyber operations.

DigForIT: Short Course in Digital Forensics Investigation Techniques

  • Course length: eight (8) days (delivered at RMC) over two (2) weeks.
  • Course format: The course consists of a mixture of classroom instruction (30%) and challenging hands-on lab work (70%).
  • Prerequisites: SCINS or equivalent background.
  • Objective: The objective of the Short Course in Digital Forensics Investigation Techniques (DigForIT) is to provide students with a basic foundation in digital forensics theory and techniques. This course is designed for students who currently have a basic understanding of computer security and who wish to learn the fundamentals of digital forensics with practical applications.

ETC: Exploitation Techniques Course

  • Course length: fourteen (14) days (delivered at RMC) over six (6) weeks.
  • Course format: Each week consists of two (2) days of classroom instruction and supervised hands-on "ethical hacking" (70%). Weeks 1 through 4 include one-half (1/2) day of independent capture-the-flag challenges (homework).
  • Course format: (delivered in the NCR over five (5) weeks): Each week consists of two (2) days of classroom instruction (30%) and supervised hands-on “ethical hacking” (70%). Weeks 1 through 4 include one (1) day of independent capture-the-flag challenges (homework).
  • Prerequisites: MASC or equivalent background.
  • Objective: The Exploitation Techniques Course (ETC) provides a basic foundation in the concepts and application of ethical hacking and penetration testing techniques for the purpose of better understanding the context of cyber operations.

IDEAS: Intrusion Detection & Extrusion Analysis Skills

  • Course length: twelve (12) days (delivered at RMC) over six (6) weeks.
  • Course format: Each week consists of two days (2) classroom insctruction (30%) and challenging hands-on lab work (70%). The course culminates in a 2-day network traffic investigation exercise.
  • Prerequisites: SCINS or equivalent background.
  • Objective: The objective of the Intrusion Detection & Extrusion Analysis Skills (IDEAS)  is to provide students with theoretical and practical intrusion detection analysis techniques as well as network traffic analysis skills.

MASC: Malware Analysis Short Course

  • Course length: fourteen (14) days (delivered at RMC) over six (6) weeks.
  • Course format: Each week consists of two (2) days of classroom instruction (30%) and challanging hands-on practical analysis (70%). Weeks 1 through 4 also include one (1) day of independent investigation (homework completed outside the classroom).
  • Prerequisites: CompFun-1 and SCINS or equivalent background. Students with an academic background consisting of community college level Computer Programming or Computer Technology, or university level Computer Science or Computer Engineering may request attend the course without the prerequisites.
  • Objective: The Malware Analysis Short Course (MASC) provides a basic foundation in the concepts and application of static and dynamic analysis for the purpose of reverse engineering malicious software.

SCCRAM: Short Course in Cybersecurity Risk Assessment Methodology

  • Course length: five (5) days.  
  • Course format: The course consists of a mixture of classroom lectures (60%) and challenging table-top group exercises (40%).
  • Prerequisites: Students attending this course should have significant experience in at least one of the following general employment areas: Project Management, Systems Engineering and/or Life-Cycle Materiel Management.
  • Objective: The Short Course in Cybersecurity Risk Assessment Methodology (SCCRAM) introduces the student to the concepts and application of cybersecurity risk assessment of weapon systems across the entire life-cycle with a mission-centric focus.

SCINS: Short Course in Networks and Security

  • Course length: twelve (12) days (delivered at RMC) over three (3) weeks.  
  • Course format: Each week consists of four (4) days of classroom instruction (40%) and hands-on lab exercises and challenges (60%). The course culminates in a 2-day Red-on-Blue Cyber Defence Exercise.
  • Objective: The primary objective of the Short Course in Networks and Security (SCINS) is to provide the students with an introduction to computer networks and to the security issues surrounding computer networks. The philosophy throughout the course is to provide a high ratio of hands-on practice to class-based learning. The course is designed to provide the network security foundation material necessary before attending more specialized PME in Cyber security.

SPOTS: Security of Platform and Operational Technology Systems

  • Course length: eight (8) days (delivered at RMC) over two (2) weeks.
  • Course format: Each day consists of four (4) days of classroom instruction (40%) and supervised hands-on exercise and laboratory work (60%).
  • Prerequisites: SCINS and IDEAS or equivalent background
  • Objective: The Security of Platform and Operational Technology Systems (SPOTS) course provides a comprehensive introduction to cybersecurity issues unique to platform and operational technology (OT) systems. The course is engineering focused and includes advanced technical concepts within computer security.  This course prepares students to guide and/or provide advice to Weapons System Managers and (WSMs) and/or Project Management Offices (PMOs) on platform/OT cybersecurity matters such as:
    • security threat and vulnerability assessments;
    • security architecture and protection measures; and
    • support to defensive cyber operations.  
Date modified: