Program Code: ITD1
Credential: Certificate of Achievement
Program Length: 15 weeks
Stay tuned to this website for updates on upcoming information sessions and program details.
Any further inquiries related to the program will be addressed via the pre-registration platform on an individual basis.
Please review the info available on the website and use the link below to pre-register.
The program is competitive; the number of applications exceeds the seat allocation for the program and we had waitlists for the previous cohorts.
Early registration is recommended.
416.675.6622 ext. 72066
Humber offers a bridging program for internationally trained immigrants with education and experience in information technology, computer science or engineering (computer, electronics or electrical). Benefit from cutting edge training that will help you gain industry-specific concepts and skills in topics, which may include: computer networking, information security, installation and configuration of server(s) in a virtualized environment with an emphasis on operating system(s).
Our graduates have secured jobs as Systems Analysts, IT/Network Administrators, and Network Analysts within 6 months of graduation.
“Even though I’ve been working on my field for more than 10 years, I was un able to get a job according to my background and my expectations. After the program finished I secured a position as Tech Lead – Call Centre Architect in one of the 3 big telecom Canadian companies. If it weren’t for the bridging program it would have taken longer for me to get the skills I needed to reach my full potential and step up my career”
Domingo Los Santos, Tech Lead - Call Centre Architect
"The good news is that I secured employment even before I graduated! I was interviewed during Humber’s bridging job fair, received a job offer, and started my employment. It happened because Humber’s job developers held an employment event for the bridging students."
Sergio Smith Gomez, Infrastructure Specialist
This course will provide students with knowledge of labour market trends, professional portfolio development, workplace culture and communication in Canada. By the end of this course learners will be able to identify effective company research techniques, create customized resumes and successfully engage in networking and career related events, in-person and on social media.
This course focuses on the theory and practical aspects of Red Hat Enterprise Linux (RHEL) operating system software. It begins with the installation of RHEL 7 in a virtual machine, and then touches upon general Linux concepts and basic commands; compression and archiving; text editor and online help; file and directory manipulation and security; processes, task scheduling, and bash shell features. The course then covers typical system administration tasks, such as administration and management of software packages; system boot and systemd; logging and kernel management; users and groups; storage partitioning and file systems; AutoFS, swap, and ACLs; basic firewall and SELinux; network interface configuration and NTP/LDAP clients; and SSH and TCP Wrappers. The entire course is filled with exercises to provide adequate hands-on practice.
This course is focused primarily on the installation, data storage, and compute functionality that is available within Windows Server 2016. The course is heavily oriented towards software defined networks, hypervisors and nano servers. Students work with Microsoft Windows Server 2016 network infrastructure and explore, design and implement network administration tools such as name resolution, IP addressing, remote access solutions, local and server storage, network performance, Hyper-V Networking and security. Finally, students learn monitoring and troubleshooting techniques that are valuable for the maintenance of a network environment.
This course introduces the architecture, structure, functions, components and models of the Internet and other computer networks, and the operations of routers and switches in a network. It teaches learners how to describe and configure a LAN switch, VLANS and ether channels. Describe various types of spanning tree protocol with operation and configuration. This course also describe how to operate, configure, and verify a IPv4 and IPv6 networks, including configuring of various IP protocols, RIP, EIGRP and OSPF, understanding BGP and redundant topologies with redistribution, troubleshooting common network issues. This course also introduce various IP and WAN services, understanding VPN and MPLS connecting technologies, IPv6 addressing and getting familiar with device management such as SNMP and syslog.
This course provides hands-on training in vSphere 6 and components. This course involves installation, configuration and management of vSphere 6, virtual machines and virtual center. Students will receive theoretical and hands-on training in designing, maintaining and troubleshooting VMware virtual environments. The course is based on ESXi 6 and vCenter Server 6.
Cloud infrastructure supports users to store data, manage resources and access one or more platforms for data processing. All the resources are acquired and managed on demand. It is built around using complex hardware infrastructure for computing, network and storage. This infrastructure supports data processing on different hardware and operating platforms, various services are offered by servers, storage support, networking and data management. This course provides the learners opportunity to simulate a real world scenario working on storage area network in virtual environment. This course also introduces the SDNs in the virtualized environment.
Students become familiar with the type of cyberattacks on the hosts and servers in businesses and also processes to prevent these attacks. They learn about the data and network security policies, compliance and operational security. This course presents different type of security holes in the applications, networks, data, storage and hosts. Different threats and vulnerabilities are introduced as part of the course and various threat mitigation methods are discussed. Security against the web site attacks, penetrating testing and security of stored data are discussed in the course.
This program is open to internationally trained professionals who:
You will need a laptop with the following specifications, or higher, for the successful completion of this program: