915 - English, March
915 - English, July
915 - English, August
Strengthening cyber security is everyone’s business. Whether you work for a federal government department, a provincial or municipal organization, or have a confirmed role at an organization that deals with national security and systems of importance to the Government of Canada, everyone has a responsibility to uphold safe cyber practices. Every day we connect to cyber space and with that comes risks. We may feel safe and invincible, but the reality is that threat actors, cyber criminals, and basement hackers do not take breaks.
The Cyber Centre Learning Hub is pleased to offer this Cyber Security in the GC Boot Camp to provide valuable information on the threats we face, how to mitigate risks, and how to apply best practices when we use wireless devices, connect to our network from home, and use various software programs.
This boot camp contains elements found in the following courses and grouped in a 5-day format:
- 107 – Cyber Security in the GC for non-IT Employees
- 110 – Cyber Security in the GC an Online Exposure
- 111 – Cyber Security in the GC for Home and Telework
- 345 – Cyber Security in the GC for Wireless Communications
- 410 – Cryptographic Security in the GC
This boot camp is aimed at anyone wanting to learn more about cyber security in a GC context. No prior IT experience is required but the topic of discussion is technical in nature. The course will progress from basic to more advanced cyber security concepts throughout the week. Participants will learn about hacking methodology, the Dark Web, software exploitation, attack surfaces, telecommunications vulnerabilities, wireless hacking, and multiple countermeasures. It will also introduce GC policies, cyber security terminology, basic security architecture concepts and processes through an interactive mix of lectures, discussions, examples and group activities.
Eligible participants at all levels who wish to become more familiar with the cyber security landscape and become knowledgeable on how to protect classified and sensitive information on GC networks