
Master Certificate in Cyber Security
Master Certificate in Cyber Security
Propulsez votre carrière
Propulsez votre carrière
Become a Certified Cybersecurity Professional and Defend Against Evolving Digital Threats
Master foundational and advanced cybersecurity principles, tools, and frameworks
Gain hands-on expertise in threat detection, risk management, and incident response
Learn ethical hacking, penetration testing, and AI-powered security techniques
Build secure network architectures, enforce compliance, and protect critical systems
Parlez à un conseiller
Parlez à un conseiller
Durée:
6 mois
Durée:
6 mois
Durée:
6 mois
Début : 15 oct 2025
Horaire : Lu-Mer-Ven
Début : 15 oct 2025
Horaire : Lu-Mer-Ven
Début : 15 oct 2025
Horaire : Lu-Mer-Ven
Événements :
Assistez à une
Événements
Assistez à une
<<Info session>>
Événements
Assistez à une
<<Info session>>
Aperçu du programme
Aperçu du programme
Master Certificate in Cyber Security program prepares you for CEH, CompTIA Security+, and Certified Information Systems Security Professional certifications. It offers a complete defense strategy—CEH covers ethical hacking, CompTIA covers core security, and the latter explores advanced principles and management.
Plan de cours
Plan de cours
Téléchargez le plan
CompTIA Security+ (SY-701)
Build a strong foundation in cybersecurity with CompTIA Security+, the globally recognized certification for security professionals. Learn how to secure networks, manage vulnerabilities, and ensure compliance across systems and devices.
Concepts Learned:
Networking fundamentals and secure architectures
Risk management and security controls
Cyber attack techniques and defense strategies
Vulnerability scanning, testing, and mitigation
Compliance, governance, and data privacy regulations

APTITUDES
Framer is a web builder for creative pros. Be sure to check out framer.com to learn more.
Framer is a web builder for creative pros. Be sure to check out framer.com to learn more.
APTITUDES

……………………..
CompTIA Security+ (SY-701)
Build a strong foundation in cybersecurity with CompTIA Security+, the globally recognized certification for security professionals. Learn how to secure networks, manage vulnerabilities, and ensure compliance across systems and devices.
Concepts Learned:
Networking fundamentals and secure architectures
Risk management and security controls
Cyber attack techniques and defense strategies
Vulnerability scanning, testing, and mitigation
Compliance, governance, and data privacy regulations
APTITUDES

……………………..
Framer is a web builder for creative pros. Be sure to check out framer.com to learn more.
Framer is a web builder for creative pros. Be sure to check out framer.com to learn more.
APTITUDES

……………………..
CEH v13 AI – Certified Ethical Hacker
Gain hands-on expertise in AI-powered ethical hacking with coverage of 20 security domains. This program trains you in advanced penetration testing, vulnerability assessment, and defensive strategies using AI-enhanced tools to secure networks, systems, and applications.
Concepts Covered
Fundamentals of ethical hacking, laws, and security frameworks
Reconnaissance, footprinting, scanning, and enumeration techniques
Vulnerability analysis and system exploitation methods
Malware, sniffing, social engineering, and DoS/DDoS attacks
Session hijacking, IDS/firewall evasion, and honeypot bypassing
Web server, web application, and SQL injection exploitation
Wireless, mobile, IoT, and cloud platform security challenges
Cryptography algorithms, encryption, and cryptanalysis
AI-enhanced hacking tools and automation in penetration testing
Cyber defense strategies to protect modern IT environments
APTITUDES

……………………..
Framer is a web builder for creative pros. Be sure to check out framer.com to learn more.
Framer is a web builder for creative pros. Be sure to check out framer.com to learn more.
APTITUDES

……………………..
Certified Information Systems Security Professional (CISSP) Training
This course prepares you for the CISSP 2024 certification by building expertise in designing, managing, and securing enterprise IT environments. Covering all eight CISSP domains, it equips you with the advanced skills needed to lead cybersecurity strategies and pass the exam with confidence.
Concepts Covered
Security and Risk Management – CIA triad, compliance, and governance frameworks
Asset Security – data classification, ownership, and privacy protection
Security Architecture and Engineering – cryptography, secure design, and distributed systems
Communications and Network Security – securing networks, protocols, and communication channels
Identity and Access Management (IAM) – access control models, authentication, and authorization
Security Assessment and Testing – vulnerability assessment, audits, and penetration testing methods
Security Operations – incident response, disaster recovery, and resource protection
Software Development Security – secure SDLC, application vulnerabilities, and code analysis
APTITUDES

……………………..
Certified Information Systems Security Professional (CISSP) Training
This course prepares you for the CISSP 2024 certification by building expertise in designing, managing, and securing enterprise IT environments. Covering all eight CISSP domains, it equips you with the advanced skills needed to lead cybersecurity strategies and pass the exam with confidence.
Concepts Covered
Security and Risk Management – CIA triad, compliance, and governance frameworks
Asset Security – data classification, ownership, and privacy protection
Security Architecture and Engineering – cryptography, secure design, and distributed systems
Communications and Network Security – securing networks, protocols, and communication channels
Identity and Access Management (IAM) – access control models, authentication, and authorization
Security Assessment and Testing – vulnerability assessment, audits, and penetration testing methods
Security Operations – incident response, disaster recovery, and resource protection
Software Development Security – secure SDLC, application vulnerabilities, and code analysis
APTITUDES

……………………..
Cybersecurity Fundamentals Course
This course builds a strong foundation in cybersecurity, from threat detection and cryptography to risk management and incident response. Learners gain practical, hands-on experience securing systems, networks, and applications across enterprise and cloud environments.
Concepts Covered
Cybersecurity principles, CIA triad, and security frameworks
Threats, vulnerabilities, and common attack vectors
Risk management, incident response, and disaster recovery planning
Cryptography basics and access control models
Identity and Access Management (IAM), authentication, and authorization
Network security protocols, design, and protective measures
Wireless and application security practices
Security assessments, audits, and compliance frameworks
Malware analysis, social engineering, and security tools (IDPS, firewalls)
Penetration testing, cloud security, and IoT/mobile protection
APTITUDES

……………………..
Cybersecurity Fundamentals Course
This course builds a strong foundation in cybersecurity, from threat detection and cryptography to risk management and incident response. Learners gain practical, hands-on experience securing systems, networks, and applications across enterprise and cloud environments.
Concepts Covered
Cybersecurity principles, CIA triad, and security frameworks
Threats, vulnerabilities, and common attack vectors
Risk management, incident response, and disaster recovery planning
Cryptography basics and access control models
Identity and Access Management (IAM), authentication, and authorization
Network security protocols, design, and protective measures
Wireless and application security practices
Security assessments, audits, and compliance frameworks
Malware analysis, social engineering, and security tools (IDPS, firewalls)
Penetration testing, cloud security, and IoT/mobile protection
APTITUDES

……………………..
Networking Fundamentals and Practical Implementation
This course provides a complete introduction to networking principles, technologies, and hands-on practices. Learners explore architectures, protocols, IP addressing, routing, switching, wireless, security, and automation. Through labs and real-world exercises, participants gain the expertise to design, configure, and troubleshoot modern networks.
Concepts Covered
Core networking models – OSI/TCP-IP, topologies, and devices
Protocols and standards – TCP, UDP, IP, ARP, DNS, and ICMP
IP addressing – IPv4 subnetting, CIDR, and IPv6 configuration
Switching and routing – VLANs, STP, static/dynamic routing, OSPF, RIP
Wireless networking – standards, RF fundamentals, and security protocols
Network security – firewalls, IDS/IPS, ACLs, VPNs, and encryption
Network services – DHCP, DNS, NAT, NTP, and cloud-based networking
WAN technologies – MPLS, Metro Ethernet, QoS, and SD-WAN basics
Monitoring & troubleshooting – SNMP, Syslog, CLI tools, Wireshark
Virtualization & automation – SDN, cloud networking, Ansible, Python scripting
APTITUDES

……………………..
Networking Fundamentals and Practical Implementation
This course provides a complete introduction to networking principles, technologies, and hands-on practices. Learners explore architectures, protocols, IP addressing, routing, switching, wireless, security, and automation. Through labs and real-world exercises, participants gain the expertise to design, configure, and troubleshoot modern networks.
Concepts Covered
Core networking models – OSI/TCP-IP, topologies, and devices
Protocols and standards – TCP, UDP, IP, ARP, DNS, and ICMP
IP addressing – IPv4 subnetting, CIDR, and IPv6 configuration
Switching and routing – VLANs, STP, static/dynamic routing, OSPF, RIP
Wireless networking – standards, RF fundamentals, and security protocols
Network security – firewalls, IDS/IPS, ACLs, VPNs, and encryption
Network services – DHCP, DNS, NAT, NTP, and cloud-based networking
WAN technologies – MPLS, Metro Ethernet, QoS, and SD-WAN basics
Monitoring & troubleshooting – SNMP, Syslog, CLI tools, Wireshark
Virtualization & automation – SDN, cloud networking, Ansible, Python scripting
APTITUDES

……………………..
APTITUDES

……………………..
APTITUDES

……………………..
APTITUDES

……………………..
APTITUDES

……………………..
APTITUDES

……………………..
APTITUDES

……………………..
APTITUDES

……………………..
APTITUDES

……………………..
APTITUDES

……………………..
CEH v13 AI – Certified Ethical Hacker
Gain hands-on expertise in AI-powered ethical hacking with coverage of 20 security domains. This program trains you in advanced penetration testing, vulnerability assessment, and defensive strategies using AI-enhanced tools to secure networks, systems, and applications.
Concepts Covered
Fundamentals of ethical hacking, laws, and security frameworks
Reconnaissance, footprinting, scanning, and enumeration techniques
Vulnerability analysis and system exploitation methods
Malware, sniffing, social engineering, and DoS/DDoS attacks
Session hijacking, IDS/firewall evasion, and honeypot bypassing
Web server, web application, and SQL injection exploitation
Wireless, mobile, IoT, and cloud platform security challenges
Cryptography algorithms, encryption, and cryptanalysis
AI-enhanced hacking tools and automation in penetration testing
Cyber defense strategies to protect modern IT environments

APTITUDES
Certified Information Systems Security Professional (CISSP) Training
This course prepares you for the CISSP 2024 certification by building expertise in designing, managing, and securing enterprise IT environments. Covering all eight CISSP domains, it equips you with the advanced skills needed to lead cybersecurity strategies and pass the exam with confidence.
Concepts Covered
Security and Risk Management – CIA triad, compliance, and governance frameworks
Asset Security – data classification, ownership, and privacy protection
Security Architecture and Engineering – cryptography, secure design, and distributed systems
Communications and Network Security – securing networks, protocols, and communication channels
Identity and Access Management (IAM) – access control models, authentication, and authorization
Security Assessment and Testing – vulnerability assessment, audits, and penetration testing methods
Security Operations – incident response, disaster recovery, and resource protection
Software Development Security – secure SDLC, application vulnerabilities, and code analysis

APTITUDES
Cybersecurity Fundamentals Course
This course builds a strong foundation in cybersecurity, from threat detection and cryptography to risk management and incident response. Learners gain practical, hands-on experience securing systems, networks, and applications across enterprise and cloud environments.
Concepts Covered
Cybersecurity principles, CIA triad, and security frameworks
Threats, vulnerabilities, and common attack vectors
Risk management, incident response, and disaster recovery planning
Cryptography basics and access control models
Identity and Access Management (IAM), authentication, and authorization
Network security protocols, design, and protective measures
Wireless and application security practices
Security assessments, audits, and compliance frameworks
Malware analysis, social engineering, and security tools (IDPS, firewalls)
Penetration testing, cloud security, and IoT/mobile protection

APTITUDES
Networking Fundamentals and Practical Implementation
This course provides a complete introduction to networking principles, technologies, and hands-on practices. Learners explore architectures, protocols, IP addressing, routing, switching, wireless, security, and automation. Through labs and real-world exercises, participants gain the expertise to design, configure, and troubleshoot modern networks.
Concepts Covered
Core networking models – OSI/TCP-IP, topologies, and devices
Protocols and standards – TCP, UDP, IP, ARP, DNS, and ICMP
IP addressing – IPv4 subnetting, CIDR, and IPv6 configuration
Switching and routing – VLANs, STP, static/dynamic routing, OSPF, RIP
Wireless networking – standards, RF fundamentals, and security protocols
Network security – firewalls, IDS/IPS, ACLs, VPNs, and encryption
Network services – DHCP, DNS, NAT, NTP, and cloud-based networking
WAN technologies – MPLS, Metro Ethernet, QoS, and SD-WAN basics
Monitoring & troubleshooting – SNMP, Syslog, CLI tools, Wireshark
Virtualization & automation – SDN, cloud networking, Ansible, Python scripting

APTITUDES

APTITUDES

APTITUDES

APTITUDES

APTITUDES

APTITUDES
Comment postuler
Comment postuler
Bourses
Aide financière
Aide financière
Processus
d'admission
Admissibilité
Admission
Étape 1 : Prenez rendez-vous avec un conseiller
Étape 2 : Préparez vos documents
Diplôme et relevés de notes (Secondaire, CEGEP, Collège ou Université)
Certificat de naissance (en français ou en anglais)
Preuve de statut au Canada
Preuve de compétence en français
CV à jour
Deux pièces d’identité gouvernementales avec photo
Étape 3 : Payez les frais d’admission
50 $ demande + 150 $ inscription
Étape 4 : Soumettez votre formulaire d’admission
Parlez à un conseiller
Financial Aid
Scholarships
Scholarships
Admission process
Eligibility
Our financial partners offer loans and personalized support to local entrepreneurs and internationally trained professionals.
You can also apply with the government to get financial aid through the AFE loan program (Aide financière aux études/Student financial assistance).
➔ Attend an Info Session
➔ Meet an Advisor
➔ Submit Documents
➔ Get Scholarship
➔ Begin your Career
Attend an infosession
Scholarships
Financial Aid
Scholarships
Scholarships
Admission process
Eligibility
Our financial partners offer loans and personalized support to local entrepreneurs and internationally trained professionals.
You can also apply with the government to get financial aid through the AFE loan program (Aide financière aux études/Student financial assistance).
➔ Attend an Info Session
➔ Meet an Advisor
➔ Submit Documents
➔ Get Scholarship
➔ Begin your Career
Attend an infosession
Scholarships
Contactez-nous
Contactez-nous
Meet & Greet
Schedule a meeting with our Advisors and discuss all the opportunities at MCIT.
Meet us
Meet & Greet
Schedule a meeting with our Advisors and discuss all the opportunities at MCIT.
Meet us
Planifiez une rencontre avec nos conseillers et explorez toutes les options au CTIM.
1:1 with Advisor
Rencontrez-nous
Planifiez une rencontre avec nos conseillers et explorez toutes les options au CTIM.
1:1 with Advisor
Rencontrez-nous
Info Sessions
Schedule a meeting with our Advisors and discuss all the opportunities at MCIT.
Meet us
i
Info Sessions
Schedule a meeting with our Advisors and discuss all the opportunities at MCIT.
Meet us
i
Prêt pour l'emploi
Prêt pour l'emploi

Événements de réseautage
Événements de réseautage
Aide financière
Préparation de CV
Mentorat et conseils
Préparation de portfolio
Événements de réseautage
Événements qui vous préparent à l'emploi
Au CTIM, nos programmes vont au-delà de la salle de classe. Nous créons des occasions de réseautage, de développement et d’embauche à travers divers événements axés sur la carrière :
Événements de réseautage intelligent
Des sessions ciblées pour vous connecter avec des pros du secteur et des entreprises qui recrutent.
Présentations menées par nos enseignants
Nos enseignants partagent leur propre réseau pour vous ouvrir à des opportunités concrètes.
Réseautage entre pairs
Échangez avec vos collègues et notre réseau d'anciens étudiantsd pour tisser des liens solides dans votre domaine.
Rencontrez les recruteurs
Participez à des événements exclusifs où les recruteurs viennent rencontrer, guider et embaucher les étudiants du CTIM.
Attend an infosession
Préparation de CV
Événements de réseautage

Resume Preperation
interview Preperation
Préparation de protfolio
Craft a Winning Resume & Land Your Dream Job Faster!
Your resume is your first impression on potential employers
Join our Resume Preparation Workshop to learn how to create a standout resume that highlights your skills, experience, and strengths in a way that grabs employers’ attention.
Assistez à une Info-session
Préparation de CV
Événements de réseautage

Resume Preperation
interview Preperation
Préparation de protfolio
Craft a Winning Resume & Land Your Dream Job Faster!
Your resume is your first impression on potential employers
Join our Resume Preparation Workshop to learn how to create a standout resume that highlights your skills, experience, and strengths in a way that grabs employers’ attention.
Assistez à une Info-session
À la réussite du programme, le CTIM délivre à l’étudiant une AEC (Attestation d’études collégiales)
Analyste en intelligence d’affaires et visualisation (LEA.CV) 900 h

À la réussite du programme, le CTIM délivre à l’étudiant une AEC (Attestation d’études collégiales)
Analyste en intelligence d’affaires et visualisation (LEA.CV) – 900 h –


Plein feu sur nos enseignants
Ehsan Shirazi
Coordonnateur en cybersécurité
10 + années
Ehsan, avec plus de dix ans d’expérience en TI et diplômé de l’Université McGill, enseigne des cours et soutient la croissance professionnelle des étudiants au CTIM. Il est passionné par le partage de son savoir et de son expertise pour aider les étudiants à développer les compétences nécessaires à une carrière réussie en TI.
Sami Islam
Architecte technique senior de cloud
5 + années
Sami Islam possède plus de 10 ans d'expérience dans le secteur des technologies de l'information et du conseil, se spécialisant dans des solutions Cloud complètes. Grâce à son expertise en méthodologie Agile, il a dirigé de nombreux projets de transformation Cloud, y compris la migration, l'automatisation des pipelines CI/CD et les solutions d'entreposage de données. Sami détient plusieurs certifications, y compris Architecte Cloud Professionnel Google Cloud, Associé Architecte Solutions AWS et Certifications Azure.
Germán Torres
Chef de l'autonomisation
10 + années
Germán, un leader dévoué en habilitation Frontline chez Google, apporte plus de 10 ans d'expérience précieuse à son rôle d'enseignant. En tant qu'ingénieur accompli, entrepreneur et passionné de technologie, il possède une passion inébranlable pour le travail, les sciences appliquées et le design de produits à la pointe de la technologie.
Mise en lumière de l'instructeur
Ehsan Shirazi
Coordonnateur en cybersécurité
10 + années
Ehsan, avec plus de dix ans d’expérience en TI et diplômé de l’Université McGill, enseigne des cours et soutient la croissance professionnelle des étudiants au CTIM. Il est passionné par le partage de son savoir et de son expertise pour aider les étudiants à développer les compétences nécessaires à une carrière réussie en TI.
Sami Islam
Architecte technique senior de cloud
5 + années
Sami Islam possède plus de 10 ans d'expérience dans le secteur des technologies de l'information et du conseil, se spécialisant dans des solutions Cloud complètes. Grâce à son expertise en méthodologie Agile, il a dirigé de nombreux projets de transformation Cloud, y compris la migration, l'automatisation des pipelines CI/CD et les solutions d'entreposage de données. Sami détient plusieurs certifications, y compris Architecte Cloud Professionnel Google Cloud, Associé Architecte Solutions AWS et Certifications Azure.
Germán Torres
Chef de l'autonomisation
10 + années
Germán, un leader dévoué en habilitation Frontline chez Google, apporte plus de 10 ans d'expérience précieuse à son rôle d'enseignant. En tant qu'ingénieur accompli, entrepreneur et passionné de technologie, il possède une passion inébranlable pour le travail, les sciences appliquées et le design de produits à la pointe de la technologie.
Connect to Content
Add layers or components to make infinite auto-playing slideshows.
Témoignanges d'étudiants
Témoignanges d'étudiants
Abdullah Allukazai
@dvdwinden
Après avoir terminé mon diplôme en intelligence d’affaires au CTIM, j’ai décroché mon tout premier emploi chez Bell Canada, où je travaille actuellement au sein de l’équipe Intelligence et Analytique.
Vasilis Nikitaras
À 47 ans, je travaillais dans un emploi sans perspective, dans un centre de vente au détail. À 48 ans, j’ai intégré Bestseller grâce à un diplôme obtenu au CTIM. Sans aucune expérience préalable avec les outils de réseautique, j’ai pu acquérir suffisamment de connaissances grâce à un diplôme spécialisé du CTIM, ce qui m’a propulsé directement dans un emploi en TI. Résultat : je suis revenu au CTIM pour suivre un diplôme en développement Web et Java.
Mario Armenti
ma
Montreal College has provided me with technical expertise that is critical in the technological industry. I love my progression and am thankful for my achievements due to their program and assistance. Within a year of my Diploma at MCI , I encountered over five offers from high profile companies. Despite a background in Business Management, I was able to adapt, owing to the expertise of the subject matter experts. Montreal College has provided me with technical expertise that is critical in the industry

Abdullah Allukazai
@dvdwinden
Après avoir terminé mon diplôme en intelligence d’affaires au CTIM, j’ai décroché mon tout premier emploi chez Bell Canada, où je travaille actuellement au sein de l’équipe Intelligence et Analytique.

Vasilis Nikitaras
À 47 ans, je travaillais dans un emploi sans perspective, dans un centre de vente au détail. À 48 ans, j’ai intégré Bestseller grâce à un diplôme obtenu au CTIM. Sans aucune expérience préalable avec les outils de réseautique, j’ai pu acquérir suffisamment de connaissances grâce à un diplôme spécialisé du CTIM, ce qui m’a propulsé directement dans un emploi en TI. Résultat : je suis revenu au CTIM pour suivre un diplôme en développement Web et Java.

Mario Armenti
ma
Montreal College has provided me with technical expertise that is critical in the technological industry. I love my progression and am thankful for my achievements due to their program and assistance. Within a year of my Diploma at MCI , I encountered over five offers from high profile companies. Despite a background in Business Management, I was able to adapt, owing to the expertise of the subject matter experts. Montreal College has provided me with technical expertise that is critical in the industry
Prochaines sessions et horaires
Prochaines sessions et horaires
Fall
Session d'automne
Oct 1, 2025
Register Before
Sep 3, 2025
Fall
Session d'automne
Oct 1, 2025
Register Before
Sep 3, 2025
Winter
Session d'hiver
Jan 13, 2026
Register Before
Dec 16, 2025
Winter
Session d'hiver
Jan 13, 2026
Register Before
Dec 16, 2025
Summer
Session d'été
No date
Register Before
Summer
Session d'été
No date
Register Before
FAQ
FAQ
Master Certificate in Cyber Security
Master Certificate in Cyber Security
Master Certificate in Cyber Security

Collège des technologies de l’information de Montréal
200 - 1255 Boulevard Robert-Bourassa
Montréal, Québec H3B 3B2
+1 514 312 2383


Collège des technologies de l’information de Montréal
200 - 1255 Boulevard Robert-Bourassa
Montréal, Québec H3B 3B2
+1 514 405 6874


Collège des technologies de l’information de Montréal
200 - 1255 Boulevard Robert-Bourassa
Montréal, Québec H3B 3B2
+1 514 405 6874