All Programs > Diploma Programs

Applied Cybersecurity Engineer

Master the skills to innovate in food and pharma research.

Type

Certificates

Duration

11 weeks

Start Date

October 14, 2025

Location

Hybrid and Instructor-led sessions

Admission Requirement

Details

Financial aid is available to those who qualify. Ask AAPS for more details.

Type

Diploma

Start Date

May 25, 2026

Duration

45 Weeks (Full time)

Location

Online

Admission Requirement

High School Diploma (or equivalent) or higher level of education
Financial aid is available to those who qualify. Ask AAPS for more details.

About Our
Applied Cybersecurity Engineer Diploma Program

The Applied Cybersecurity Engineer Diploma at AAPS College is designed to equip students with the foundational knowledge and practical skills required to pursue a career in cybersecurity. Developed and delivered by industry professionals, the program focuses on applying core concepts in real-world contexts. Students are introduced to key areas such as system security, networking, and risk awareness, preparing them to understand and respond to evolving digital threats. With flexible learning options and a hands-on approach, the program supports learners in building job-ready capabilities in today’s technology-driven environment.

CBS01 Linux for Information Security

Linux underpins the majority of enterprise servers, security tools, and penetration testing environments. This course builds a strong operational foundation in Linux, enabling students to navigate, configure, and secure Linux-based systems used throughout the cybersecurity field.

In this course you’ll learn how to:

  • Navigate and manage the Linux filesystem, user accounts, and permissions
  • Configure and harden Kali Linux for security operations
  • Deploy and manage security tools using shell scripting and package management

Key Skills: Linux CLI • File System Management • User & Group Administration • Kali Linux • Bash Scripting • System Hardening • CVE Awareness • Cyber Kill Chain

Effective cybersecurity begins with understanding and quantifying risk. This course introduces students to structured risk assessment methodologies and governance frameworks, enabling them to evaluate threats, communicate risk to stakeholders, and develop policies that protect organizational assets.

In this course you’ll learn how to:

  • Identify and assess organizational risks using ISO 27005 and NIST 800-37
  • Develop and document security policies aligned with governance frameworks
  • Prepare and present risk reports tailored to executive and technical audiences

Key Skills: ISO 27001 • NIST 800-37 • Risk Scoring • CIS Controls • Security Governance • Policy Development • Threat Assessment • Residual Risk Reporting

Networks are a primary target for cyberattacks, and defending them requires deep technical knowledge. This course develops students’ ability to analyze network traffic, design secure network architectures, and implement controls that defend against both internal and external threats.

In this course you’ll learn how to:

  • Capture and analyze network traffic using Wireshark to detect anomalies
  • Design and simulate secure network topologies using Cisco Packet Tracer
  • Configure firewalls, IDS/IPS systems, and VPNs to enforce security boundaries

Key Skills: Wireshark • Cisco Packet Tracer • TCP/IP • IDS/IPS • VPN Configuration • Network Segmentation • Firewall Rules • DoS Mitigation

Compromised credentials are among the leading causes of data breaches. This course equips students with the knowledge to design, deploy, and audit enterprise identity and access management systems, ensuring that only the right people access the right resources at the right time.

In this course you’ll learn how to:

  • Deploy and manage directory services including Active Directory and OpenLDAP
  • Implement Single Sign-On (SSO) and federated identity using SAML, OAuth, and OIDC
  • Conduct access reviews and automate governance workflows to reduce privilege creep

Key Skills: Active Directory • OpenLDAP • SAML • OAuth • OIDC • RBAC & ABAC • SSO • Privileged Access Management • Access Attestation

Building secure systems requires more than reactive defenses – it demands deliberate architectural planning. This course teaches students to design layered security architectures and apply industry-standard threat modeling methodologies to identify weaknesses before adversaries do.

In this course you’ll learn how to:

  • Design defense-in-depth architectures using principles of micro-segmentation and trust boundaries
  • Apply threat modeling frameworks including STRIDE, DREAD, and MITRE ATT&CK to evaluate system risk
  • Produce structured security architecture documentation for technical and business audiences

Key Skills: MITRE ATT&CK • STRIDE & DREAD • Layered Defense • Micro-Segmentation • Trust Zone Design • Resilience Planning • Security Documentation

Security professionals operate within a complex web of legal obligations, ethical responsibilities, and privacy expectations. This course explores the regulatory landscape governing data protection in Canada and internationally, and develops students’ capacity to make sound ethical decisions in high-stakes security contexts.

In this course you’ll learn how to:

  • Interpret and apply key privacy regulations including GDPR, PIPEDA, and Ontario’s privacy legislation
  • Design privacy-by-default systems and conduct Privacy Impact Assessments (PIAs)
  • Navigate ethical dilemmas in security practice including responsible disclosure and data handling

Key Skills: GDPR • PIPEDA • Privacy Impact Assessment • Breach Notification • Ethical Decision-Making • PII Management • Responsible Disclosure • Policy Drafting

Cryptography is the backbone of digital trust, securing everything from online transactions to confidential communications. This course provides hands-on experience with cryptographic algorithms, key management, and PKI infrastructure, preparing students to implement and evaluate encryption in real-world systems.

In this course you’ll learn how to:

  • Implement symmetric and asymmetric encryption algorithms including AES, RSA, and ECC using OpenSSL
  • Build and manage Public Key Infrastructure (PKI), including certificate issuance and revocation
  • Analyze and secure TLS communications and identify common cryptographic vulnerabilities

Key Skills: OpenSSL • AES • RSA • ECC • PKI • Digital Certificates • TLS • PGP • Key Management • Cryptographic Vulnerability Analysis

Understanding how attackers think and operate is essential to building effective defenses. This course guides students through the complete penetration testing lifecycle – from reconnaissance and exploitation to reporting – using the same tools and methodologies employed by professional ethical hackers.

In this course you’ll learn how to:

  • Conduct reconnaissance and vulnerability scanning using Nmap, OSINT techniques, and enumeration tools
  • Exploit identified vulnerabilities in controlled lab environments using Metasploit and manual techniques
  • Document findings and produce professional-grade penetration testing reports using PTES and CVSS scoring

Key Skills: Nmap • Metasploit • OSINT • Web Application Testing • Wireless Exploitation • PTES • CVSS Scoring • Vulnerability Reporting

Applications are among the most frequently targeted attack surfaces in modern organizations. This course trains students to identify and remediate security vulnerabilities across the software development lifecycle, embedding security into development pipelines from the ground up.

In this course you’ll learn how to:

  • Identify and remediate the OWASP Top 10 vulnerabilities in web application code and configurations
  • Integrate static and dynamic analysis tools (SAST/DAST) into CI/CD pipelines
  • Secure APIs, manage secrets, and apply secure coding practices across development environments

Key Skills: OWASP ZAP • SAST & DAST • GitLab CI/CD • API Security • Secrets Management • Secure SDLC • Input Validation • Dependency Scanning

Cybersecurity initiatives – from policy rollouts to infrastructure overhauls – must be planned, resourced, and delivered effectively. This course equips students with project management competencies tailored to IT and security contexts, using both traditional and agile frameworks.

In this course you’ll learn how to:

  • Plan and execute cybersecurity projects using PMI and Agile/Scrum methodologies
  • Manage project scope, timelines, budgets, and stakeholder expectations in security-driven environments
  • Apply risk management principles to identify and mitigate project-level threats throughout the IT project lifecycle

Key Skills: PMI • Agile & Scrum • Stakeholder Management • Budgeting & Scheduling • Risk Mitigation • IT Project Lifecycle • Security Project Governance

When a breach occurs, speed and structure are everything. This course prepares students to detect, contain, and recover from cybersecurity incidents while maintaining business continuity. Students develop incident response playbooks and practice managing crisis scenarios in realistic simulations.

In this course you’ll learn how to:

  • Develop and execute NIST-aligned incident response playbooks for a range of attack scenarios
  • Apply digital forensics techniques to investigate incidents, preserve evidence, and reconstruct attack timelines
  • Design and test disaster recovery and business continuity plans to minimize operational disruption

Key Skills: Incident Response • NIST Playbooks • Digital Forensics • Evidence Handling • DR Planning • Business Continuity • Tabletop Simulations • Root Cause Analysis

Security controls are only effective if they are continuously verified. This course trains students to build and execute assurance programs that validate security posture through automated testing, audit preparation, and collaborative red-and-blue-team exercises.

In this course you’ll learn how to:

  • Automate security validation workflows using tools such as Jenkins and Terraform
  • Prepare for and support SOC 2 Type II and ISO 27001 compliance audits
  • Design and participate in Purple Team exercises to evaluate and improve detection and response capabilities

Key Skills: Jenkins • Terraform • OSCAL • Purple Team • SOC 2 • ISO 27001 • Continuous Testing • Audit Readiness • Control Validation

Technical expertise alone does not guarantee career success in cybersecurity. This course prepares students to present themselves effectively in the job market, communicate security concepts to diverse stakeholders, and build the professional habits and networks that support long-term career growth in the field.

In this course you’ll learn how to:

  • Build a compelling cybersecurity portfolio, résumé, and LinkedIn presence tailored to target roles
  • Communicate technical security findings to both technical and non-technical audiences with clarity and confidence
  • Navigate the Canadian cybersecurity job market, including certification pathways, networking strategies, and workplace professionalism

Key Skills: Résumé & Portfolio Development • Technical Communication • Stakeholder Reporting • Interview Preparation • Certification Roadmapping • Professional Networking • Workplace Ethics • Career Planning

Career
Opportunities

Graduates of the Applied Cybersecurity Engineer Diploma can explore opportunities across a wide range of industries where digital security is critical. Organizations in healthcare, finance, government, technology, and consulting increasingly require professionals who can support and strengthen their cybersecurity frameworks.

Entry-level roles may include positions focused on monitoring systems, identifying vulnerabilities, supporting security operations, and assisting with the implementation of protective measures. As cybersecurity continues to grow in importance, this field offers strong long-term career potential and opportunities for advancement.

AAPS graduates have
been hired as:

  • Cybersecurity Analyst: Monitor systems and respond to potential security threats.
  • Information Security Analyst: Help protect organizational data and enforce security policies.
  • SOC Analyst (Security Operations Centre): Analyze alerts and support incident response activities.
  • Network Security Technician: Secure and maintain network infrastructure against vulnerabilities.
  • IT Security Specialist: Support implementation of security measures across systems and users.
  • Security Support Analyst: Assist in identifying risks and maintaining overall system security.

Organizations who have
hired AAPS Graduates

Average 

& High Wage Range

$26

Average Wage/HR**

$42

high Wage/HR**

Certifications

Graduates of the Applied Cybersecurity Engineer Program will receive a Diploma upon successfully finishing the program. This program is approved as a vocational program under the Ontario Career Colleges Act, 2005

To register for in-class sessions, please contact us by phone at 416-502-2277 or by email at info@aaps.ca

Our exclusive
happy student saying.

A Transformative Journey

The instructors are industry-experienced in a supportive learning environment. Field-related internships give students real-world experience. Students also receive ongoing job search assistance and career services from AAPS.
Sedigheh Fadaye Vatan

Sedigheh Fadaye Vatan

Pharmaceutical Quality Assurance and Regulatory Affairs Graduate

Taking the AAPS Cannabis Management, Quality & Laboratory course was the one of the best decisions for my career. They are all extremely knowledgeable in their field, with real life experiences to share.
Orenda Von Gernet

Orenda Von Gernet

Cannabis – Management, Quality and Laboratory Graduate

I enrolled in the QA/QC program and midway through the program I successfully landed a 6-month internship at Teva Pharmaceuticals. Upon completing my program part-time, I got a full-time position with PerkinElmer.
Lukman Nahle

Lukman Nahle

Pharmaceutical Quality Assurance and Quality Control Graduate

I am very happy that I chose AAPS as my next academic endeavor after graduating University. The course was very useful in teaching me the things that I will need to know when entering the Cannabis industry.
Zachary Petkov

Zachary Petkov

Cannabis – Management, Quality and Laboratory Graduate

Coming to AAPS to pursue my PG Diploma in CRDSP has been one of the best career decisions. I’ve received my offer letter to join as Project Management Associate at Axiom real-time metrics solutions, On.
Remya Pushparajan Subha

Remya Pushparajan Subha

Clinical Research Graduate

The food safety and quality program at AAPS provided me with the knowledge required for the Canadian food industry. As a newcomer to Canada, I really appreciated the welcoming vibe the college offered.
Dania Hariri

Dania Hariri

Food, Technology, Safety and Quality Graduate

I was newcomer in Canada from Nepal. I enrolled in PG Diploma in Pharmaceutical QC/QA/RA course which i think was the best. After 3 weeks of hard work into co-op days, I was offered a full-time job.
Yushma Shakya

Yushma Shakya

Pharmaceutical Quality Assurance and Quality Control Graduate

I am excited to share my employment news. I am now working as Quality Assurance Manager and I couldn’t have done it without your help and encouragement. I want to specifically thank all the AAPS instructors.
Abolfazl Darashti

Abolfazl Darashti

Food, Technology, Safety and Quality Graduate

Thank you to everyone at AAPS for helping me in my postgraduate training. I am now really excited to be working at the McKesson Corporation (Fortune Top 500 Company) as a Health Services Case Manager.
Amjad Atrash

Amjad Atrash

Clinical Research Graduate

I am happy to share that I have received a job as a Clinical Research Recruiter at BioPharma Services Inc. It was a hard and persistent job but I couldn’t have done it without the AAPS support.
Saeeda Hasan

Saeeda Hasan

Clinical Research Graduate

Financial Aid & Funding Options

We believe finances should never be a barrier to your education.
 Explore flexible options designed to support your goals.

Scholarships & 
Bursaries

Scholarships & 

Bursaries

We believe finances should never be a barrier to your education.
 Explore flexible options designed to support your goals.

Flexible
Payment Plans

Flexible

Payment Plans

Spread your tuition to manageable monthly payments to fit your budget.

Government & 
Employer Support

Government & 

Employer Support

Learn how to apply for OSAP and employer sponsorship programs.

Need personalized guidance?

Our admissions advisors can help you explore best funding situation.