Year | Name | Fees | Total |
---|---|---|---|
1st Year | Tution Fee | CAD 16000 | 16000.0 |
2nd Year | Tution Fee | CAD 16000 | 16000.0 |
Starting Date | Application Deadline | Status |
---|---|---|
2021-09-01 00:00:00.000 | 2021-09-15 00:00:00.000 | Active |
2022-01-01 00:00:00.000 | 2022-01-15 00:00:00.000 | Active |
2022-04-01 00:00:00.000 | 2022-04-15 00:00:00.000 | Active |
2022-07-01 00:00:00.000 | 2022-07-15 00:00:00.000 | Active |
For programs where the language of instruction of English, the language proficiency tests accepted are:
IELTS for Bangladesh, Bhutan, India, Pakistan, Nepal, Sri Lanka, Afghanistan: 6.0 with 1 Band 5.5
For programs where the language of instruction is French, the following standardized tests are accepted:
Under the provisions of section 4 of the College Education Regulations concerning the conditions of admission, a person who has received instruction considered sufficient by the college and meets any of the following conditions may be admitted to a program of studies leading to an Attestation of College Studies:
1. Application along with supporting documents will be processed on TEN Agent portal.
2. Non-refundable application fee of $50.00 and Admission fee of $200.00 ($250.00)($250 after offer letter (to be paid within 10-14 days)) will be charged from the student and it will be paid by credit card only.
3. Student will receive the admission offer either conditional or unconditional on his TEN Agent portal.After accepting the offer Fee invoice will be generated on student account.
4.After getting the fee invoice student can pay the fee and fee receipt can be found on TEN Portal (Ten Agents)
During this term you'll learn: Doing workplace research, tasks and responsibilities related to the IT security analyst function, analyzing and solving simple problems using basic algorithms, determining error-correcting strategies, and using debugging tools. You will also learn how to use mathematics applied to solving computer problems. To do this, you will learn to recognize and process the representations of numbers, to represent geometric figures in two dimensions through equations, to model logical reasoning, and to process quantitative data. You will also learn how to prepare and organize computers, devices, and components for different operating systems to ensure their effectiveness in carrying out the tasks required for their use in connection with computer security. Finally, you will learn how to analyze and participate in the development of network infrastructure, to evaluate and choose the hardware and software components wisely, and to produce design documents (wiring plans, diagrams, architecture, etc.).
During this term you will learn: How to produce the various elements required (plans, diagrams, tables, etc.) for writing technical quotes and reports; choosing, installing, and monitoring computer monitoring software; applying security intervention procedures and performing computer security prevention operations. You will also learn how to develop and set up interconnection structures, analyze material needs, install devices, and keep track of your work. Finally, you will learn how to provide support to users, how to write and determine documents to help users, how to build trust and help with users, and how to help them resolve their problems.
During this term you will learn: Defining the characteristics of a local network; installing, connecting, and configuring interconnection devices; connecting computers to the network; setting up shared services and testing to ensure the network works optimally. You will also learn how to determine input and output data, the nature of simple algorithm processing, and how to use programming language to encode block chain algorithms. You will also learn to test, inspect, and debug the code used for the block chain. Finally, you will learn how to analyze information security risks; apply recognized security measures; test the computer security of your solutions, and improve security measures.
During this term you will learn: Recognizing and evaluating the best IT security strategies; using error and exception control techniques and using cryptography utilities. You will also learn how to analyze network architectures in order to discover flaws; Choose and install monitoring software; finding and solving vulnerabilities; quickly recognize signs of intrusion and intervene to ensure the security of the information to be protected. You will eventually learn to recognize crimes and criminal acts in the field of computer science; to develop an ethical professional sense, and prepare for your integration into the labour market.
In this final term you will learn: To establish professional relationships with clients and users through your attitudes and behaviors, to work and integrate into an interdisciplinary team, and to understand your ethical and legal responsibilities as a professional analyst. You will have the opportunity, through a 210 internship, to integrate all the learning achieved during your program.
Internship in computer job integration - 210h
Businesses, agencies, and individuals require the services of the best experts to design solutions, perform penetration tests, and ensure the overall security of the digital infrastructure of their business operations.
Trebas Institute’s Computer Security Analyst program will train you in best practices in computer security. This will give you the tools and skills to participate in the development of models, systems, or resources to protect computer data.
For visa process, refer to this link:
https://www.canada.ca/en/immigration-refugees-citizenship/services/study-canada.html
The VISA Application should be submitted online with Documents mentioned below.
Study Permit – Checklist of Documents.
(Experience Letter, Appointment Letter, Bank account Salary Statement (last 3 months), Pay Slips (last 3 months), Job Relieving Letter if resigned (From each employer)
Any document in a language other than English must be accompanied by notary attested English translation.