Browse courses by category
IT and cloud security
- course 104 | IT security risk management: A lifecycle approach (ITSG-33)
- course 115 | Foundations of cloud security in the Government of Canada
- course 116 | Cloud computing in the GC - The Security Assessment and Authorization (SA&A) process
- course 126 | Conducting cloud service provider IT security assessment
- course 350 | Wireless security
- course 385 | Cross domain solutions - A primer
- course 508 | Harmonized Threat and Risk Assessment (HTRA) Methodology within the ITSG-33
- course 545 | Contracting and IT Security
- course 601 | Introduction to IT security management
- course 604 | Overview of IT security risk management: A lifecycle approach (ITSG-33)
- course 606 | IT security fundamentals for IT practitioners
- course 614 | Supply chain cyber security
- course 617 | Canadian Common Criteria
- course 910 | IT security risk management boot camp
Cyber security
- CYB101C | Cyber Security Fundamentals (previously course 107)
- CYB102C | Cyber Security Best Practices (previously course 108)
- course 109 | Cyber security foundations for GC information systems
- CYB103C | Cyber Security in the GC and Online Exposure (previously course 110)
- CYB104C | Cyber Security in the GC for Home and Telework (previously course 111)
- course 118 | Cyber security in the GC and the cybercrime landscape
- course 119 | Cyber security for IoT devices
- course 122 | Implementing robust authentication in the GC
- course 123 | Targeted social engineering attacks
- course 124 | Mitigating insider threats
- course 155 | Strengthening authentication
- course 335 | Cyber security in the GC for software development teams
- course 336 | Cyber security considerations for citizen developers
- course 345 | Cyber security in the GC and wireless communications
- course 410 | Cryptographic security in the GC
- course 411 | Using cryptographic tools in the GC
- course 530 | Introduction to the Government of Canada Cyber Security Event Management Plan (GC CSEMP)
- course 531 | Cyber security event management - Table top exercise
- course 612 | Cyber security considerations for election authorities and administrators
- course 615 | Cyber security considerations for consumers of managed services
- course 616 | Cyber security for political party IT decision makers and IT staff
- course 618 | Cyber security considerations for social media account management
- course 620 | Introduction to research security
- course 621 | Cyber security for researchers
- course 622 | Cyber Security Risks for Travelling University Employees
- course 623 | Introduction to Cyber Security for Educators
- course 625 | Cyber Security for Small and Medium Organizations
- course 915 | Cyber security in the GC boot camp
- course DDN235 | Discover cyber security
- course CYB117C | Cyber Security for Users of Generative Artificial Intelligence
- course APP102C | Secure Deployment of Artificial Intelligence Systems in the GC
COMSEC
- course COM201C | Government of Canada Key Management Infrastructure (GC KMI)
- course 205 | Government of Canada Electronic Key Management System (GC EKMS)
- course 206 | Distributed INFOSEC Accounting System (DIAS)
- course 210 | Eclypt encryption drives
- course 215 | Fundamentals of Emission Security (EMSEC)
- course 229 | COMSEC account management for private sector companies
- course 230 | COMSEC account management
- course 231 | Key Material Support Plan (KMSP)
- course 233 | Cryptographic key management & ordering
- course 235 | COMSEC in the GC
- course 240 | Data Transfer Device (DTD)
- course 245 | Secure DTD 2000 System (SDS)
- course 250 | Secure Terminal Equipment (STE)
- course 270 | vIPer
- course 275 | Simple Key Loader (SKL)
- course 276 | Really Simple Key Loader (RASKL)
- course 277 | Tactical Key Loader (TKL)
- course 281 | TACLANE in-line network encryptor
- course 285 | GEM One
- course 732 | Departmental COMSEC Authority essentials
- course 734 | COMSEC custodian refresher
- course 780 | Introduction to in-line network encryptors