DOCUMENT SUBMISSION
Upload Through Your Future Student Account
If you do not have a Future Student Account or require assistance, please contact our Student Service Centre at 204-632-2327.
Internationally Educated Applicants - visit www.rrc.ca/credentials for credential assessment information.
However, if you apply within 6 weeks of the program start date, admission requirements are due within 5 days of applying.
Regular Admission Requirements
Mature Student Admission Requirements
If you are 19 years of age or older on or before September 30 in your year of registration, have been out of high school for a minimum of one year, and you do not meet the regular admission requirements, you may apply under the Mature Student admission requirements.
English Language Assessment | Minimum Scores for Certificates, Diplomas and Advanced Diplomas, and Post Graduate Certificates, Post-graduate Diplomas | Minimum Scores for Bachelor Degrees and Creative Communication (excluding Nursing) | Minimum Scores for Applicable Health Related Programs*** |
---|---|---|---|
CAEL Online or In-Person | Overall band score of 60 | Overall band score of 70 and Writing of 60 | Overall band score of 70 and Writing of 60†† |
IELTS Academic Level | Overall 6.0 and No band below 5.5 | Overall 6.5 and No band below 6.0 | Overall 7.0 and No band below 6.5 |
Password Skills | Overall 6.0 and No band below 5.5 | Overall 6.5 and No band below 6.0 | Overall 7.0 and No band below 6.5†† |
LINC Certificate | 7 | 8 | Successful completion of Communication for Health Care Professions†† |
Duolingo Language Test† | 115 and above+ with a min. of 95 in each section | 125 and above with a min. of 100 in each section | N/A†† |
New English for Academic and Professional Purposes | Successful completion of the program 5 (min 70%) | Successful completion of the program 5 (min 70%) | N/A†† |
PTE | 54 overall Min 50 in each skill |
60 overall Min 55 in each skill band |
N/A†† |
TOEFL-ibt Academic Level | 80 (20L, 20S, 19R, 21W) |
90 (22L, 22S, 22R, 24W) |
98 (24L, 23S, 24R, 27W) |
Academic English Program for University and College Entrance Program (AEPUCE) | Successful Completion | Successful Completion | N/A†† |
CELBAN | N/A | N/A | 8, 8, 8, 7†† |
†The Duolingo Language Test will no longer be an approved English proficiency test for applications to the Bachelor of Nursing and Allied Health Programs
††These English Language Assessments will not be accepted by Medical Laboratory Sciences
***Applicable Health Related Programs:
Location | Start Date | Apply Link |
---|---|---|
Manitou a bi Bii daziigae | Aug 25, 2025 | Apply Now |
Students may apply for financial assistance through the Manitoba Student Aid program. For general information on applying please call 204-945-6321 or 1-800-204-1685, or visit their website at www.manitobastudentaid.ca, which also includes an online application. For detailed information, please visit one of the RRC Polytech Student Service Centres or call 204-632-2327. Applicants requiring financial assistance should complete their student loan applications well in advance of the class start date.
Students will be provided with an understanding of the importance and purpose of security risk management, and how it is governed by various internationally recognized frameworks. Students will gain practical experience in performing Business Impact and Risk Assessments as well as IT Risk Audits. Students will acquire a practical understanding of how to establish secure baselines and utilize security controls to manage risks effectively. Emphasis will be placed on the legal, regulatory, and compliance dimensions of risk management and the necessity of cultivating a risk-aware culture within culturally varied organizations.
In the ever-changing landscape of cyber threats, it is important to create secure, holistic architectures that are reliable, scalable, and support critical business initiatives and functions. will have the opportunity to gain experience with the foundational principles, frameworks, and practices necessary to design and implement secure digital infrastructures and apply them in the workplace. Students will navigate through core security architecture concepts, security design principles, security controls, and security infrastructure technology architectures that can be applied in varying organizations.
This course guides students through delivery of essential and effective security services leveraging various project management methodologies. Students will examine the alignment of security services to meet business needs through discovery of what it takes to deliver and operate a service from inception to end-of-life. Operationalization of a service from a management perspective is a key element of this course where students will explore important components such as managing a budget and creating metrics. Students will utilize practices for managing successful projects while incorporating the People, Process, and Technology framework.
In the dynamic world of Information Technology, Information Security is paramount for safeguarding assets. Students will have the opportunity to gain a comprehensive understanding of both theoretical and practical aspects of Security Management. Students will examine the importance of building and managing an effective security program that also supports technology projects. Focusing on leadership qualities, emphasis will be placed on student skill development in security strategies for mitigating security risks and fostering a security-centric and inclusive organizational culture. Students will be better positioned as aspiring IT security managers and leaders to integrate security as a core business strategy into diverse organizations.
Students will be provided with the opportunity to participate in advanced vulnerability management and ethical hacking practices. Students will utilize tools for vulnerability management and penetration testing as well as learn the importance of vulnerability reporting and communicating the results. The legal and philosophical aspects of hacking will be explored, and students will be able to describe vulnerabilities found in industry specific vulnerability databases. Equipped with a blend of hands-on experience and theory, students will be prepared to conduct vulnerability management in various technological and physical environments.
We live in a world of increasingly interconnected global systems where resiliency planning has become a priority for many governments, businesses, and Indigenous communities. Students will explore multiple aspects of resiliency planning, including Incident response, business continuity, disaster recovery, and risk management. Students will engage in collaborative exercises that assist with resiliency and contingency planning. These stages will allow students to form a comprehensive approach to managing incidents, solving problems, ensuring business continuity, and recovering from disasters, thereby minimizing the impact on business operations and ensuring resilience.
This course covers the key areas of managing a security operations organization, from crafting and implementing strategic security policies to daily security management. Students will experience working with threat intelligence systems and services. In addition, students will cover elements of human resource management such as equity, diversity, and inclusion, and vendor management as well as security services maintenance associated with security operations. Students will assess industry trends and measure service effectiveness using capability maturity models. By blending theoretical and practical concepts students will be equipped with skills required to manage security operations.
Increased cyber threats are driving the need for security incident response and digital forensics when breaches occur in an organization. In this course, students will learn to use Incident Response plans that promote the necessary skills and knowledge to detect, respond, manage, and recover from security incidents. Students will engage in an investigative scenario where forensic tools and processes will be utilized to maintain chain of custody and gather evidence. In addition, the course will incorporate student participation in post incident reviews, as well as development of effective communications related to these concepts.
This course bridges the gap between artificial intelligence (AI) and information security, offering insights into how AI technologies can be harnessed to bolster security defenses and mitigate risks. Students will learn about AI-driven security strategies, machine learning models for threat detection, ethical considerations and bias in AI deployment. Students will gain hands-on experience through application of AI technologies for enhancing security postures, detecting and responding to threats, and automating security tasks. The combination of artificial intelligence techniques and foundational security principles will help prepare students to engage in protecting organizational digital assets.
In this course students will learn about key governance frameworks and integrate them with diverse organizational cultures and roles from the boardroom to operations. Students will develop a model to manage Governance, Risk, and Compliance which will align IT strategy with business objectives. Students will be introduced to topics such as IT risk, legal requirements, and Key Goal Indicators (KGI’s) as well as audit and compliance concepts such as preparing for security audits and navigating industry-specific regulation requirements. A blend of theory, real-world scenarios, and practical exercises will provide students with industry knowledge necessary in these fields.
In this course, students will be challenged to apply their knowledge and skills of information security in a real-world application. Working closely with an industry partner and instructor, students will identify a security risk that requires mitigation. Each project team will analyze, plan, and research a proposed security solution which will be presented to stakeholders. The team will implement and test the proposed solution. Finally, students will critically evaluate the impact of the security solution through a structured 'lesson learned' process, reflecting on areas of success and identifying opportunities for improvement.
Recognition of Prior Learning (RPL) is a process which documents and compares an individual's prior learning gained from prior education, work and life experiences and personal study to the learning outcomes in College courses/programs. For more information, please visit www.rrc.ca/rpl.