Start your Discover Cyber Security journey
We’ve recommended five core learning experiences in the Discover Cyber Security learning path. Consume them in the recommended order to achieve the best learning outcomes. Once you’ve completed the core products, we encourage you to look at the additional learning products to get the most out of this experience.
This learning path will take you between 2 and 12 hours to complete, based on your preferred journey.
Employ cyber security best practices to protect Government of Canada (GC) data, information, systems, and reputations.
Core and Recommended Learning
Your online accounts contain a lot of information about you. Make sure that the information stays where you want it to by keeping your accounts secure.
Learn eight ways to protect yourself and GC data.
Digital technologies have quickly become an integral part of our daily lives, with new developments and security concerns emerging every day. Learn how to recognize potential threats and how to protect yourself, your digital information and the systems you use.
Knowing the basics about cyber security is beneficial to all government employees, especially those who work with or support IT security professionals. This course for non-IT specialists provides an introduction to the basic cyber security terms, concepts and processes, as well as the government policies respecting information technology (IT) and cyber security. This course was designed by the Cyber Centre Learning Hub at the Canadian Centre for Cyber Security. The course has a cost of $500, which is payable through the Cyber Centre Learning Hub. Upon request, this course can be tailored for groups to fit specific professional, business or departmental learning objectives.
Phishing scams are on the rise, but follow these tips and you’ll be sure not to take the bait.
Being prepared for the worst-case scenario can make it a lot more manageable, so you can quickly get back to doing what you love online.
As an employee, you’re not only privy to your organization’s important and sensitive information, but you’re also responsible for protecting this information. Inadequate security practices provide cyber threat actors with an easy way to bring down your organization’s network and access your sensitive information. Read about some common employee IT security challenges.
Set aside some time now to implement what you’ve learned. Start by:
- adding multi-factor authentication to your accounts
- making your passwords (or, better yet, passphrases) unique, strong, and random
- customizing your privacy settings
Here’s a handy checklist to help you.
Building a love of learning about cyber security? We’ve recommended some additional learning experiences in the Discover Cyber Security learning path. Keep your Discover Cyber Security journey going in a format that interests you!
Keep the Learning Going
Micro-learning: Articles, blogs and videos
Phishing is one of the most common threats you can encounter online. Luckily, phishing messages can be easy to spot if you know what you’re looking for.
It goes without saying that working remotely has its pros and cons. Even those who were working from home before the start of the pandemic are finding that they continually need to adjust. For instance, have you stopped to think about your privacy and the privacy of your organization—and how to protect it? Does working from home pose a greater security risk for our organizations?
Adding an extra layer of security to your accounts can keep your information safe. Learn about multi-factor authentication.
With remote work becoming increasingly popular, we rely on numerous devices and our ability to connect to the Internet for work and personal reasons. However, cyber threat actors take advantage of our reliance on technology. Protect yourself by taking stock of all the technology you use, including your mobile and smart devices, computers, and Wi‑Fi networks.
In some ways, our workplace devices are our favourite co-workers. But if we’re not careful, they can also expose us to serious threats. Here are some tips on how you can safely use your work devices, no matter where work is.
It can seem impossible to believe that cyber criminals can get information just by asking for it – but if it were impossible, we wouldn’t be here. Cyber threat actors have many scams to get people to give them what they want. Knowing about how they work can help you protect your information online.
We store so much important data on our devices. Whether they’re sensitive documents, sentimental photos or work we don’t want to lose, backing up our data often is the easiest way to make sure we never lose the files that matter most to us.
Since 2020, working remotely has become more common than ever before. And while some Canadians have headed back to the office, many have not. For a lot of people, working from home is here to stay. To make the most of a remote working experience, it’s important to know how to secure your connection, like tightening up your home network security or using a virtual private network (VPN) when using public Wi-Fi.
Maybe you try opening files, only to be denied access. Perhaps your device is running slower. Maybe you notice other abnormal behaviour from your computer or device. There could be perfectly reasonable explanations for these issues, like you’re using old hardware, you don’t have enough RAM, or your disk is full. However, there’s a chance you may have been hacked. Be on the lookout for any of these signs of possible compromise.
Public Wi-Fi is flexible and convenient, and it can help you save on your mobile data usage. But using an unsecure public network can bring increased risks.
Bluetooth technology can make your life easier by letting you wirelessly connect your devices. But if you’re not careful, a cybercriminal can easily join the party.
Social media gives you the power to connect with others effortlessly and share information instantly. Since these services and platforms have become so integrated and integral to daily online activities, many employers allow employees to use personal social media accounts at work. However, when you use personal social media at work, you can be providing threat actors easy and obvious entry points to your organization’s networks and information. You can even be placing your online identity and that of your co-workers at risk.
Have you ever wondered what authentication is and what it means to you? Simply put, this course will help you describe authentication and identification, the bad habits associated with authentication, the risks you face, and most importantly how you can better protect your information, identity, and even money from cyber criminals through strengthened authentication. This course was designed by the Cyber Centre Learning Hub at the Canadian Centre for Cyber Security. The course has a cost of $250, which is payable through the Cyber Centre Learning Hub.
Employees working in an online environment are expected to effectively manage the risk of exposing their work or accounts to potential security threats. Learn to assess your digital footprint and identify potential privacy threats associated with your online activities. This course was designed by the Cyber Centre Learning Hub at the Canadian Centre for Cyber Security. The course has a cost of $500, which is payable through the Cyber Centre Learning Hub. Upon request, this course can be tailored for groups to fit specific professional, business or departmental learning objectives.
You have completed the Discover Cyber Security learning path. You should be able to describe what cyber security is and why it’s important, recognize the impact of poor cyber practices, and practise consistently safe cyber behaviour. After learning more about cyber security and why it matters, you have made some key changes to your own cyber behaviour.
Future learning opportunities
Subscribe to our newsletter. We’re sharing new digital courses, events, micro-learning and more straight to your inbox. Sign up to keep up with digital trends, skills, and resources for public servants like you.
Discover other learning paths
Connect with like-minded public servants
Join the Canadian Digital Gov Connections space on Slack.