Accelerated Cybersecurity Training Program
Empowering you to launch a successful career in the cybersecurity sector.
Overview
The Accelerated Cybersecurity Training Program (ACTP) is an intensive cybersecurity training and certification program designed to give women, newcomers to Canada, and displaced workers the skills they need to launch a career in the cybersecurity sector.
The seven-month program is the most rigorous cybersecurity skills training program in Canada, allowing students to earn three globally recognized cybersecurity certificates, as well as engage in career mentorship with experts and build connections with employers in the cybersecurity industry.
Rogers Cybersecure Catalyst delivers the program in partnership with SANS Institute — the world’s leading cybersecurity training and certification organization. The program is offered tuition-free, thanks to the generous support of the Government of Canada, Rogers Communications and Royal Bank of Canada.
We are no longer accepting applications for the February 2023 cohort. New program information coming soon.
Start Date:
February 11, 2023
Location:
Virtual
Program Duration:
7 months
Time Commitment:
30 – 40 hours per week
Registration fee:
$500
Certifications Gained:
GFACT, GSEC, GCIH
Application Deadline:
Applications now closed
Contact

Start Date:
February 11, 2023
Location:
Virtual
Program Duration:
7 months
Time Commitment:
30 – 40 hours/week
Certifications:
GFACT, GSEC, GCIH
Application Deadline:
Now closed
Contact

Overview
The Accelerated Cybersecurity Training Program (ACTP) is an intensive cybersecurity training and certification program designed to give women, newcomers to Canada, and displaced workers the skills they need to launch a career in the cybersecurity sector.
The seven-month program is the most rigorous cybersecurity skills training program in Canada, allowing students to earn three globally recognized cybersecurity certificates, as well as engage in career mentorship with experts and build connections with employers in the cybersecurity industry.
Rogers Cybersecure Catalyst delivers the program in partnership with the SANS Institute — the world’s leading cybersecurity training and certification organization. The program is offered tuition-free, thanks to the generous support of the Government of Canada, Rogers Communications and Royal Bank of Canada.
We are no longer accepting applications for the February 2023 cohort. New program information coming soon.
Who Can Apply?
The program is currently open to Canadian citizens, permanent residents or convention refugees aged 18 or over who qualify for one of our program streams.
Program Streams
We are currently only seeking applications from individuals who qualify for one of the following streams:

RBC Women in Cyber Stream
Open to anyone who self-identifies as a woman or non-binary person. This program stream is made possible with the support of RBC.

Rogers New Canadians in Cyber
Open to anyone who has lived in Canada for at least two years (but no more than ten years) and has been unable to secure full-time employment that aligns with their education and skills. This program stream is made possible by the support of Rogers.

RBC New Careers in Cyber
Open to anyone who has lost full-time employment and/or is currently underemployed. This program stream is made possible by the support of RBC.
Program Streams
We are currently only seeking applications from individuals who qualify for one of the following streams:
RBC Women in Cyber Stream
Open to anyone who self-identifies as a woman or non-binary person. This program stream is made possible with the support of RBC.
Rogers New Canadians in Cyber
Open to anyone who has lived in Canada for at least two years (but no more than ten years) and has been unable to secure full-time employment that aligns with their education and skills. This program stream is made possible by the support of Rogers.
RBC New Careers in Cyber
Open to anyone who has lost full-time employment and/or is currently underemployed. This program stream is made possible by the support of RBC.
Additional Program Entry Requirements
Education & Work Experience Requirements
- High school diploma
- Not currently enrolled in another program of study
- Not currently or previously employed in information security in Canada
Time Commitment
- Must attend live online classes
- Must commit to an intensive schedule (30-40 hours per week over seven months)
Technical Requirements
- Internet access
- Desktop computer or laptop (not a tablet or Chromebook)
- 64-bit operating system
- At least 8 GB RAM with 50 GB of disk space (more recommended)
- USB port
Preference will be given to applicants who can show a demonstrated interest in cybersecurity, including having engaged in prior cybersecurity learning.
Rogers Cybersecure Catalyst is committed to providing an inclusive and barrier-free environment. If you need to be accommodated to fully participate in any phase of the application process or program, please contact us at catalysttraining@torontomu.ca.
Additional Program Entry Requirements
Education & Work Experience Requirements
- High school diploma
- Not currently enrolled in another program of study
- Not currently or previously employed in information security in Canada
Time Commitment
- Must attend live online classes
- Must commit to an intensive schedule (30-40 hours per week over seven months)
Technical Requirements
- Internet access
- Desktop computer or laptop (not a tablet or Chromebook)
- 64-bit operating system
- At least 8 GB RAM with 50 GB of disk space (more recommended)
- USB port
Preference will be given to applicants who can show a demonstrated interest in cybersecurity, including having engaged in prior cybersecurity learning.
Rogers Cybersecure Catalyst is committed to providing an inclusive and barrier-free environment. If you need to be accommodated to fully participate in any phase of the application process or program, please contact us at catalysttraining@torontomu.ca.
Course Information
The program is delivered online and uses both synchronous and asynchronous learning. Training will be delivered through live instructor-led courses; students are also expected to engage in significant periods of self-study.
Certificates and Accreditation
The Catalyst has partnered with SANS Institute — a world leader in cybersecurity training and certification.
Learners will earn three internationally recognized Global Information Assurance Certification (GIAC) certifications – the highest and most rigorous assurance of cybersecurity knowledge and skills.
GIAC Foundational Cybersecurity Technologies (GFACT)
The GFACT certification validates a practitioner’s knowledge of essential foundational cybersecurity concepts.

GIAC Security Essentials Certification (GSEC)
The GIAC Security Essentials (GSEC) certification validates a practitioner’s knowledge of information security beyond simple terminology and concepts.

GIAC Certified Incident Handler (GCIH)
The GIAC Incident Handler certification validates a practitioner’s ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills.

Successful learners will also earn a Certificate of Completion from Rogers Cybersecure Catalyst.
Certificates and Accreditation
The Catalyst has partnered with SANS Institute — a world leader in cybersecurity training and certification.
Learners will earn three internationally recognized Global Information Assurance Certification (GIAC) certifications – the highest and most rigorous assurance of cybersecurity knowledge and skills.

GIAC Foundational Cybersecurity Technologies (GFACT)
The GFACT certification validates a practitioner’s knowledge of essential foundational cybersecurity concepts.

GIAC Security Essentials Certification (GSEC)
The GIAC Security Essentials (GSEC) certification validates a practitioner’s knowledge of information security beyond simple terminology and concepts.

GIAC Certified Incident Handler (GCIH)
The GIAC Incident Handler certification validates a practitioner’s ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills.
Successful learners will also earn a Certificate of Completion from Rogers Cybersecure Catalyst.
What You'll Learn
Students will develop fundamental skills and knowledge in key IT subject areas such as Computer Components & Concepts, Operating Systems, Containers, & Virtualization, Linux, Networking Fundamentals, Python and C, Windows Foundations, Advanced Computer Hardware, Encryption, Basic Security Concepts, Forensics, Reconnaissance, Exploitation, and Privilege Escalation, and Network & Computer Infiltration.
This course prepares the learner for the GFACT (GIAC Foundational Cybersecurity Technologies) exam, which is taken as part of the training program.
This course is administered through SANS and corresponds to SANS course number SEC275
This course teaches advanced cyber defense skills such as access control, incident response, network security, DNS, TCP-IP, disaster recovery, security policy, defense-in-depth, windows security, Unix/Linux security, and more. Examples of tools participants gain skills with include TCP Dump, Wireshark, John the Ripper, Nmap, Packet Analyst, Snort, Tripwire, Powershell, Process Hacker and more.
This course prepares the learner for the GSEC (GIAC Security Essentials Certification) exam, which is taken as part of the training program.
This course is administered through SANS and corresponds to SANS course number SEC401
This course teaches advanced incident handling and hacker tool techniques in areas such as incident response, reconnaissance, malware, web application security, penetration testing, and vulnerability assessment. Participants learn to understand attackers’ tactics and strategies in detail, giving them experience in identifying vulnerabilities and discovering intrusions. They learn about common attack techniques, vectors, and tools as well as defending/responding to such attacks. Examples of skill areas and tools they learn include memory analysis, Metasploit attack and detect, Nessus, SQL injection, cross-site scripting, Windows command line kung-fu, DOS attacks, Linux attack detection and more.
This course prepares the learner for the GCIH (GIAC Certified Incident Handler) exam, which is taken as part of the training program.
This course is administered through SANS and corresponds to SANS course number SEC504
Cybersecurity Professional Practice Course provides participants with a broadened understanding of the cybersecurity landscape and a recognition that cybersecurity issues go far beyond technology. Participants will recognize how cybersecurity impacts business operations, decision making, strategic planning, and assessments of overall corporate risk and governance. Participants will also learn new ways of thinking and problem-solving in team-based environments
Career Preparation supports learners with transitioning to careers in the cybersecurity sector. Learners will practice interview techniques, hone their networking skills, and develop CVs that are reflective of their unique abilities and knowledge. A dedicated employment support team will work closely with learners throughout this program and afterwards.
Key Program Dates
ACTP will run from February 2023 to October 2023. Attendance is mandatory for classes taught live — please make sure you are available to attend class on the specified dates.
Date | Schedule | Location | Session |
---|---|---|---|
Feb. 11, 2023 | Orientation | Virtual | Saturday, 10:00 a.m.–4:00 p.m., EST |
Feb. 13–Apr. 9, 2023 | Foundations – Computers, Technology, & Security | Online | 25–40 hours per week of self-study |
Apr. 10–16, 2023 | GFACT Exam Week | TBD | Choose one day for exam |
Apr. 17–23, 2023 | Break | ||
Apr. 24–30, 2023
Mandatory Attendance | Security Essentials: Network, Endpoint, and Cloud Bootcamp | Live Class | Saturday, 9:00 a.m.–5:00 p.m., EST |
May 1–June 18, 2023 | Security Essentials: Network, Endpoint, and Cloud | Online | 25–40 hours per week of self-study |
June 19–25, 2023 | GIAC Security Essentials (GSEC) Exam Week | TBD | Choose one day for exam |
June 26–July 2, 2023 | Break | ||
July 3–9, 2023 Mandatory Attendance | Hacker Techniques, Exploits & Incident Handling Bootcamp | Virtual
Live Class | Monday,
9:00 a.m.–7:00 p.m., EST
Tuesday–Saturday, 9:00 a.m.–5:00 p.m., EST |
July 10–Aug 27, 2023 | Hacker Techniques, Exploits & Incident Handling | Online | 25–40 hours per week of self-study |
Aug. 28–Sept. 3, 2023 | GIAC Certified Incident Handler (GCIH) Exam Week | TBD | Choose one day for exam |
Sept. 4–10, 2023
| Career Preparation Week 1 | Online
| N/A |
Sept 11–15, 2023 Mandatory Attendance | Cybersecurity Professional Practice Course | Virtual
Live Class | Monday–Friday,
9:00 a.m.–5:00 p.m., EST |
Sept. 18–Oct. 8, 2023
| Career Preparation Weeks 2–4
| Online
| Individual student appointments
|
Date | Schedule | Location | Session |
---|---|---|---|
Feb. 11, 2023 | Orientation | Virtual | Saturday, 10:00 a.m.–4:00 p.m., EST |
Feb. 13–Apr. 9, 2023 | Foundations – Computers, Technology, & Security | Online | 25–40 hours per week of self-study |
Apr. 10–16, 2023 | GFACT Exam Week | TBD | Choose one day for exam |
Apr. 17–23, 2023 | Break | ||
Apr. 24–30, 2023
Mandatory Attendance | Security Essentials: Network, Endpoint, and Cloud Bootcamp | Live Class | Saturday, 9:00 a.m.–5:00 p.m., EST |
May 1–June 18, 2023 | Security Essentials: Network, Endpoint, and Cloud | Online | 25–40 hours per week of self-study |
June 19–25, 2023 | GIAC Security Essentials (GSEC) Exam Week | TBD | Choose one day for exam |
June 26–July 2, 2023 | Break | ||
July 3–9, 2023 Mandatory Attendance | Hacker Techniques, Exploits & Incident Handling Bootcamp | Virtual
Live Class | Monday,
9:00 a.m.–7:00 p.m., EST
Tuesday–Saturday, 9:00 a.m.–5:00 p.m., EST |
July 10–Aug 27, 2023 | Hacker Techniques, Exploits & Incident Handling | Online | 25–40 hours per week of self-study |
Aug. 28–Sept. 3, 2023 | GIAC Certified Incident Handler (GCIH) Exam Week | TBD | Choose one day for exam |
Sept. 4–10, 2023
| Career Preparation Week 1 | Online
| N/A |
Sept 11–15, 2023 Mandatory Attendance | Cybersecurity Professional Practice Course | Virtual
Live Class | Monday–Friday,
9:00 a.m.–5:00 p.m., EST |
Sept. 18–Oct. 8, 2023
| Career Preparation Weeks 2–4
| Online
| Individual student appointments
|
How To Apply
Everything you need to know about preparing your application for the Accelerated Cybersecurity Training Program.
Application Process
Please note, applicants must complete the entire application process in order to be considered for admission; incomplete applications will not be reviewed.
Complete and submit the online application form, including an up-to-date resume.
After the initial online application has been submitted, further information including details and deadlines for subsequent steps will be provided by email.
You will be invited to take an online aptitude assessment consisting of 30 questions designed to measure skills such as logic, critical thinking, problem-solving and fundamental computer knowledge. Example questions can be found in the FAQs.
If you pass the aptitude assessment, you will be asked to submit a statement outlining your interest in the program, as well as highlighting relevant experience and future goals. You will then be invited to complete a video interview consisting of pre-recorded verbal questions, as well as written questions.
You are required to provide one academic or professional reference. You will be given a link to a fillable reference form that your referee will need to submit.
Frequently Asked Questions
Learn more about the program and read frequently asked questions from participants.
General
We offer equal opportunity for all applicants. Accommodation for applicants with disabilities will be provided at each stage of the admission process. If you require accommodation, please contact us at catalysttraining@torontomu.ca.
Please contact our recruitment team at catalysttraining@torontomu.ca.
Eligibility
Current program streams are: RBC Women in Cyber; Rogers New Canadians in Cyber; and RBC New Careers in Cyber. Please review our eligibility requirements for more details.
People who are currently working in the cybersecurity field or are currently enrolled in another program of study. Additionally, people who do not fall into one of the active admission streams may not apply for the program at this time.
Proficiency in spoken and written English is required for admission to the program. If English is your second language, we recommend a Canadian Language Benchmark (CLB) score of 7 or higher.
No, applicants may only apply to one program stream. If you are eligible for more than one, you may pick the one that best aligns with your situation. Please note applicants can only apply once per cohort, regardless of which stream they choose.
No, individuals must fall into one of the current streams in order to apply. Additional programming may become available in the future. Please check our website regularly and connect with us on social media to stay up-to-date on new programming.
Application
Official documents are not required to apply, however we reserve the right to request documents for verification at a future date.
To make changes or update to your initial application, please email catalysttraining@torontomu.ca outlining the changes you would like to make.
We will look at each individual application holistically, taking into account the SANS Aptitude Assessment, your personal Statement of Interest, your resume and reference letters, as well as the video interview.
Email is the main communication channel. Please ensure that you check your email on a regular basis.
Yes, all applicants will be contacted by email during the application process.
You may only apply once per cohort. If your application is not successful, you may reapply for a future cohort as long as you still meet the eligibility requirements.
After Applying
Approved Applicants
Confirm your intentions to study in the Accelerated Cybersecurity Training Program by the deadline date stated in your offer letter. If you do not accept your Offer of Admission by the deadline date, your Offer will expire.
The registration fee is $500 and is payable online through ePly. Instructions are listed in your offer letter.
It is your responsibility to meet the admission requirements stated in your Offer of Admission by the deadline date stated in your offer letter.
Applicants on the Wait List
Being placed on a wait list
Your application is important to us. We recognize that being placed on a waiting list is very difficult and frustrating. We also realize that this may present a challenge for you in terms of making some choices in the next few weeks and months.
Due to limited space availability and competition, we are unable to offer admission to all applicants. Only those who presented the most competitive applications were selected for admission. The wait list will remain active up until the start of the cohort you applied to. If you do not hear from us by then, it means that you will not be granted admission for that cohort.
Unfortunately, there is no way to predict what will happen. Each cohort the applicant/competition pool is different. Previous cohorts are no indication of what might happen to this cohort.
By phone or email, depending on the time frame. We will contact you if a space becomes available after which an Offer of Admission will be issued.
While we hope to accommodate some, we won’t be able to accommodate all applicants on our waiting lists. We conclude the selection process at the beginning of each cohort. Our waiting lists are valid only for the current application cycle and are not transferable to another cycle. Interested applicants are required to reapply for admission to a future cohort. The number of applications received and the level of competition changes from cohort to cohort and therefore a place on a waiting list this cohort may not be reflective of a decision in a future cohort.
Non-Approved Applicants
Common reasons for denial of admission or application cancellation
Common reasons applicants are denied admission or have their applications cancelled can be found below.
Unfortunately, we do not have space to admit all qualified and interested applicants. Our program is a “limited enrolment” program, which means we can only admit specific numbers of students
Admission is based on SANS CyberTalent Aptitude Assessment scores in conjunction with interview scores and documentation provided.
Review Admission and Eligibility Requirements for details
The number and strength of applications, varies from cohort to cohort.
Unfortunately, if you do not qualify into one of the three streams outlined, you are not eligible for the Program at this time.
If you are currently enrolled in another academic program, you are not eligible for the Program at this time
Rogers Cybersecure Catalyst does not send reminders to candidates to complete their application requirements on time. If you do not complete your SANS CyberTalent Aptitude Assessment and Kira video interview assessment on time, we are unable to give further consideration to your application
We value your interest in the Accelerated Cybersecurity Training Program and realize that a denial of admission is disappointing. The following suggestions may help you gain admission in the future.
Consider taking introductory cybersecurity training to improve on your cybersecurity skills and knowledge:
• Cyber Aces: http://www.cyberaces.org – This is a free online course that teaches the core concepts needed to assess, and protects information security systems. The course is an engaging, self-paced, easy-to-use combination of tutorials, videos, and quizzes.
• Cybrary: https://www.cybrary.it - An online training platform featuring a variety of free and low-cost courses for beginners to advanced cybersecurity professionals.
• Udacity: https://www.udacity.com - An online educational provider offering micro-credentials programs called nano degrees.
• Coursera: https://www.coursera.org - Online courses and credentials from top educators.
• Udemy: https://www.udemy.com - Provides over 100,000 online video courses with new additions published every month.
• Khan Academy: https://www.khanacademy.org – A global nonprofit with the mission to provide free, world-class education for anyone, anywhere.
• CompTIA – https://www.comptia.org/home – A global leader in IT certifications in skills ranging from IT support to networking and cybersecurity.
Finances
There is no fee to apply to the program, but applicants who are accepted will pay a non-refundable $500 registration fee.
Currently, all other fees of the program are paid by the program partners.
The Program
Over the course of the program, successful learners will earn three certifications from Global Information Assurance Certification (GIAC):
- GIAC Security Essentials Certification (GSEC)
- GIAC Certified Incident Handler (GCIH)
- GIAC Foundational Cybersecurity Technologies (GFACT)
These certifications are prominent cybersecurity accreditations that are recognized worldwide. Successful learners will also earn a Certificate of Completion from Rogers Cybersecure Catalyst.
Note: This program does not grant credits towards a degree or certificate program at Toronto Metropolitan University.
Yes, all eligible applicants will need to take the assessment as part of the application process.
Below are two examples of questions from the SANS Cybertalent Aptitude Assessment:
Sample Question 1:
Analyze the following statements. If the first two statements are true what can be said about the third statement? Use only the information provided here.
- Statement 1: Modern computers often use SSD drives.
- Statement 2: Older computers often use spinning hard drives.
- Statement 3: Most computers use flash memory.
What can be said about the third statement?
- It is correct, the statements support this.
- It is incorrect, the statements disprove this.
- It is uncertain, the statements do not correlate.
Sample Question 2:
In a computer program, valid combinations of data are 5 characters long which start with a letter and finish with a letter. In between numbers or letters may be used. Identify from the below, which block contains a violation of this pattern.
- Line 1: A123B C546D m874A P461N M938A v847F
- Line 2: x82aC D546j z834A 7421N y935B k142q
- Line 3: A123B Ca46D m474A P411N Mj38A v8b7F
- Line 4: x82aC D566j z8f4A h4x1N y93aB k122q
No, we do not release scores for the assessment.
The following online training resources can help you learn more about cybersecurity and see if a career in the sector is right for you. Please note these external links will open in a new window:
- Cyber Aces: This is a free online course that teaches the core concepts needed to assess, and protect information security systems. The course was developed by SANS, the most trusted and the largest source for information security training and security certification in the world. The course is an engaging, self-paced, easy to use combination of tutorials, videos, and quizzes. It’s available as open courseware so you can take it anytime.
- Cybrary: An online training platform featuring a variety of free and low-cost courses for beginners to advanced cybersecurity professionals.
- Udacity: An online educational provider offering micro-credentials programs called nanodegrees.
- Coursera: Online courses and credentials from top educators.
- Udemy: Provides over 100,000 online video courses with new additions published every month.
- Khan Academy: A global nonprofit with the mission to provide a free, world-class education for anyone, anywhere.
Starting in 2022, the program is now offered almost entirely online.
Yes, however this program schedule is intensive and there are significant time commitments required in order to successfully complete the program and pass the certification exams. Please refer to the Course Details page for more information.
ACTP Alumni
Since 2020, we have helped over 200 individuals from diverse personal and professional backgrounds launch meaningful careers in cybersecurity. Read some of their stories below.
Soheila – Consultant – Threat Content, Deloitte
After completing her training at the ACTP in June 2021, Soheila joined Deloitte Canada. “I love working in cybersecurity because I believe cybersecurity is an important cornerstone of modern digital life and business. I am able to provide technical support for challenging cybersecurity and data protection issues by continuing education, developing new skills and intelligence strategies.”
For as long as Soheila can remember, she has been fascinated by numbers and finding relationships between them. “Discovering differences and/or any similarities between numbers has been satisfying,” she says. “I also enjoy finding hidden artifacts and figuring out puzzles.” This interest in numbers led her on a diverse career path that has touched statistics, data analysis, design and customer service before eventually leading her to cybersecurity. “We live in an ever-increasing digital world, and I value information security and the importance of personal data.”
Soheila – Consultant – Threat Content, Deloitte
After completing her training at the ACTP in June 2021, Soheila joined Deloitte Canada. “I love working in cybersecurity because I believe cybersecurity is an important cornerstone of modern digital life and business. I am able to provide technical support for challenging cybersecurity and data protection issues by continuing education, developing new skills and intelligence strategies.”
For as long as Soheila can remember, she has been fascinated by numbers and finding relationships between them. “Discovering differences and/or any similarities between numbers has been satisfying,” she says. “I also enjoy finding hidden artifacts and figuring out puzzles.” This interest in numbers led her on a diverse career path that has touched statistics, data analysis, design and customer service before eventually leading her to cybersecurity. “We live in an ever-increasing digital world, and I value information security and the importance of personal data.”
Santosh — Manager, Cybersecurity and Compliance, Centennial College
Today, Santosh works at Centennial College in Scarborough, where his areas of expertise include cyber awareness and training, project coordination, security monitoring, incident response, and risk analysis. “As our day-to-day lives become more intertwined with the digital world, we face new security challenges. Cybersecurity as a career has given me the opportunity to build our defenses and stay ahead of threats, while sharing my learning to help people stay safe online.”
Santosh, an ATCP 2020 graduate of the RBC New Careers in Cyber stream, finds himself drawing on skills he learned from his prior career – both when learning cybersecurity skills and teaching them. “Working in Incident Management provided me a platform to see IT from a holistic point of view, which helped tremendously in quickly understanding my new environment,” he says. “The experience breaking down complex IT issues has allowed me to communicate security concepts more effectively to students and faculty who may be non-technical.”
Santosh — Manager, Cybersecurity and Compliance, Centennial College
Today, Santosh works at Centennial College in Scarborough, where his areas of expertise include cyber awareness and training, project coordination, security monitoring, incident response, and risk analysis. “As our day-to-day lives become more intertwined with the digital world, we face new security challenges. Cybersecurity as a career has given me the opportunity to build our defenses and stay ahead of threats, while sharing my learning to help people stay safe online.”
Santosh, an ATCP 2020 graduate of the RBC New Careers in Cyber stream, finds himself drawing on skills he learned from his prior career – both when learning cybersecurity skills and teaching them. “Working in Incident Management provided me a platform to see IT from a holistic point of view, which helped tremendously in quickly understanding my new environment,” he says. “The experience breaking down complex IT issues has allowed me to communicate security concepts more effectively to students and faculty who may be non-technical.”
Erik — Threat Researcher, eSentire
Erik graduated from the ACTP’s New Careers in Cyber stream in November 2020, and now works as a Threat Researcher for eSentire. No matter where he works, he’s driven by a desire to help make the world a safer place. “I decided to pursue a career in cybersecurity because of my love for technology and my deep-rooted need to protect and empower the vulnerable. I want to do everything I can to ensure nobody feels helpless in the face of new breaches surfacing.”
Erik began his career in social work as a Resident Worker, where he helped homeless populations and people struggling with addictions. While this may not sound like a traditional route to a cybersecurity career, Erik finds that his crisis management skills are transferable. “My previous experience helps me excel in cybersecurity by honing my ability to remain calm with a crystal-clear mind during a crisis,” he says. “It also taught me the value and power of communication through written reports and difficult conversations.
Erik — Threat Researcher, eSentire
Erik graduated from the ACTP’s New Careers in Cyber stream in November 2020, and now works as a Threat Researcher for eSentire. No matter where he works, he’s driven by a desire to help make the world a safer place. “I decided to pursue a career in cybersecurity because of my love for technology and my deep-rooted need to protect and empower the vulnerable. I want to do everything I can to ensure nobody feels helpless in the face of new breaches surfacing.”
Erik began his career in social work as a Resident Worker, where he helped homeless populations and people struggling with addictions. While this may not sound like a traditional route to a cybersecurity career, Erik finds that his crisis management skills are transferable. “My previous experience helps me excel in cybersecurity by honing my ability to remain calm with a crystal-clear mind during a crisis,” he says. “It also taught me the value and power of communication through written reports and difficult conversations.
Dar — Triage Security Engineer, Arctic Wolf
Since graduating from the ACTP in 2020, Dar joined Arctic Wolf – first as a Security Analyst, and now she is a Triage Security Engineer. “I quickly grew to recognize the significant need for trained professionals and saw this path as my opportunity to bring a fresh perspective and diversified skill set to help make an impact in a hands-on way. “
Dar had over 10 years of marketing experience before pursuing cybersecurity, with a digital marketing specialization that kept her focused on increased website traffic, sales leads, and brand awareness. “I have learned to resolve complex problems and achieve desired results through analysis, creative thinking, team collaboration and persistence,” she says. “I’ve also worked in an industry that is constantly evolving and have learned to be adaptable and forward-thinking.”
Dar — Triage Security Engineer, Arctic Wolf
Since graduating from the ACTP in 2020, Dar joined Arctic Wolf – first as a Security Analyst, and now she is a Triage Security Engineer. “I quickly grew to recognize the significant need for trained professionals and saw this path as my opportunity to bring a fresh perspective and diversified skill set to help make an impact in a hands-on way. “
Dar had over 10 years of marketing experience before pursuing cybersecurity, with a digital marketing specialization that kept her focused on increased website traffic, sales leads, and brand awareness. “I have learned to resolve complex problems and achieve desired results through analysis, creative thinking, team collaboration and persistence,” she says. “I’ve also worked in an industry that is constantly evolving and have learned to be adaptable and forward-thinking.”
Soheila – Consultant – Threat Content, Deloitte
After completing her training at the ACTP in June 2021, Soheila joined Deloitte Canada. “I love working in cybersecurity because I believe cybersecurity is an important cornerstone of modern digital life and business. I am able to provide technical support for challenging cybersecurity and data protection issues by continuing education, developing new skills and intelligence strategies.”
For as long as Soheila can remember, she has been fascinated by numbers and finding relationships between them. “Discovering differences and/or any similarities between numbers has been satisfying,” she says. “I also enjoy finding hidden artifacts and figuring out puzzles.” This interest in numbers led her on a diverse career path that has touched statistics, data analysis, design and customer service before eventually leading her to cybersecurity. “We live in an ever-increasing digital world, and I value information security and the importance of personal data.”
Soheila – Consultant – Threat Content, Deloitte
After completing her training at the ACTP in June 2021, Soheila joined Deloitte Canada. “I love working in cybersecurity because I believe cybersecurity is an important cornerstone of modern digital life and business. I am able to provide technical support for challenging cybersecurity and data protection issues by continuing education, developing new skills and intelligence strategies.”
For as long as Soheila can remember, she has been fascinated by numbers and finding relationships between them. “Discovering differences and/or any similarities between numbers has been satisfying,” she says. “I also enjoy finding hidden artifacts and figuring out puzzles.” This interest in numbers led her on a diverse career path that has touched statistics, data analysis, design and customer service before eventually leading her to cybersecurity. “We live in an ever-increasing digital world, and I value information security and the importance of personal data.”
Santosh — Manager, Cybersecurity and Compliance, Centennial College
Today, Santosh works at Centennial College in Scarborough, where his areas of expertise include cyber awareness and training, project coordination, security monitoring, incident response, and risk analysis. “As our day-to-day lives become more intertwined with the digital world, we face new security challenges. Cybersecurity as a career has given me the opportunity to build our defenses and stay ahead of threats, while sharing my learning to help people stay safe online.”
Santosh, an ATCP 2020 graduate of the RBC New Careers in Cyber stream, finds himself drawing on skills he learned from his prior career – both when learning cybersecurity skills and teaching them. “Working in Incident Management provided me a platform to see IT from a holistic point of view, which helped tremendously in quickly understanding my new environment,” he says. “The experience breaking down complex IT issues has allowed me to communicate security concepts more effectively to students and faculty who may be non-technical.”
Santosh — Manager, Cybersecurity and Compliance, Centennial College
Today, Santosh works at Centennial College in Scarborough, where his areas of expertise include cyber awareness and training, project coordination, security monitoring, incident response, and risk analysis. “As our day-to-day lives become more intertwined with the digital world, we face new security challenges. Cybersecurity as a career has given me the opportunity to build our defenses and stay ahead of threats, while sharing my learning to help people stay safe online.”
Santosh, an ATCP 2020 graduate of the RBC New Careers in Cyber stream, finds himself drawing on skills he learned from his prior career – both when learning cybersecurity skills and teaching them. “Working in Incident Management provided me a platform to see IT from a holistic point of view, which helped tremendously in quickly understanding my new environment,” he says. “The experience breaking down complex IT issues has allowed me to communicate security concepts more effectively to students and faculty who may be non-technical.”
Erik — Threat Researcher, eSentire
Erik graduated from the ACTP’s New Careers in Cyber stream in November 2020, and now works as a Threat Researcher for eSentire. No matter where he works, he’s driven by a desire to help make the world a safer place. “I decided to pursue a career in cybersecurity because of my love for technology and my deep-rooted need to protect and empower the vulnerable. I want to do everything I can to ensure nobody feels helpless in the face of new breaches surfacing.”
Erik began his career in social work as a Resident Worker, where he helped homeless populations and people struggling with addictions. While this may not sound like a traditional route to a cybersecurity career, Erik finds that his crisis management skills are transferable. “My previous experience helps me excel in cybersecurity by honing my ability to remain calm with a crystal-clear mind during a crisis,” he says. “It also taught me the value and power of communication through written reports and difficult conversations.
Erik — Threat Researcher, eSentire
Erik graduated from the ACTP’s New Careers in Cyber stream in November 2020, and now works as a Threat Researcher for eSentire. No matter where he works, he’s driven by a desire to help make the world a safer place. “I decided to pursue a career in cybersecurity because of my love for technology and my deep-rooted need to protect and empower the vulnerable. I want to do everything I can to ensure nobody feels helpless in the face of new breaches surfacing.”
Erik began his career in social work as a Resident Worker, where he helped homeless populations and people struggling with addictions. While this may not sound like a traditional route to a cybersecurity career, Erik finds that his crisis management skills are transferable. “My previous experience helps me excel in cybersecurity by honing my ability to remain calm with a crystal-clear mind during a crisis,” he says. “It also taught me the value and power of communication through written reports and difficult conversations.
Dar — Triage Security Engineer, Arctic Wolf
Since graduating from the ACTP in 2020, Dar joined Arctic Wolf – first as a Security Analyst, and now she is a Triage Security Engineer. “I quickly grew to recognize the significant need for trained professionals and saw this path as my opportunity to bring a fresh perspective and diversified skill set to help make an impact in a hands-on way. “
Dar had over 10 years of marketing experience before pursuing cybersecurity, with a digital marketing specialization that kept her focused on increased website traffic, sales leads, and brand awareness. “I have learned to resolve complex problems and achieve desired results through analysis, creative thinking, team collaboration and persistence,” she says. “I’ve also worked in an industry that is constantly evolving and have learned to be adaptable and forward-thinking.”
Dar — Triage Security Engineer, Arctic Wolf
Since graduating from the ACTP in 2020, Dar joined Arctic Wolf – first as a Security Analyst, and now she is a Triage Security Engineer. “I quickly grew to recognize the significant need for trained professionals and saw this path as my opportunity to bring a fresh perspective and diversified skill set to help make an impact in a hands-on way. “
Dar had over 10 years of marketing experience before pursuing cybersecurity, with a digital marketing specialization that kept her focused on increased website traffic, sales leads, and brand awareness. “I have learned to resolve complex problems and achieve desired results through analysis, creative thinking, team collaboration and persistence,” she says. “I’ve also worked in an industry that is constantly evolving and have learned to be adaptable and forward-thinking.”
Info Sessions
Join us for one of our information sessions on the Accelerated Cybersecurity Training Program.
The Catalyst invites you to join us for one of our information sessions on the Accelerated Cybersecurity Training Program.
If you are a potential student, an employer, or a recruitment agency looking to get more information, this session will provide you with specific details about our program. You will also get a chance to meet our team and ask any questions you may have.
Please visit our Eventbrite page to register for free and learn more about kick-starting your cybersecurity career.