Description
This course was designed and developed in collaboration with Innovation, Science and Economic Development Canada (ISED). It describes a series of security controls that small and medium sized organizations should implement to meaningfully improve their cyber security posture. Each module includes:
- an explanation of the importance of a particular set of security controls
- a case study, highlighting what can go wrong without proper measures in place
- knowledge checks and quizzes to test understanding
Objectives
- Define the primary components of an Incident Response Plan
- Recall the importance of automatically patching operating systems and applications
- Recall the importance of security software in safeguarding Windows and Apple operating systems
- Recall the importance of securely configuring devices to mitigate security risks
- Recognize the significance of strong user authentication
- Recognize the importance of ongoing cyber security training in promoting awareness and best practices
- Identify the best practices of data backup and encryption
- Recognize the strategies to ensure secure mobile device connectivity
- Recall how to establish perimeter defences for network security
- List the advantages and disadvantages of outsourced IT and cloud-based services
- Recognize the necessary measures to secure websites
- Recall how to implement access control and authorization
- Recall how to secure portable media
- Recognize the significance of leadership and accountability in conducting cyber security risk assessments
Target audience
Eligible participants at all levels who wish to become more familiar with the cyber security landscape and become knowledgeable on how to protect classified and sensitive information on GC networks
Modules
- Incident Response Plan
- Automatically Patch Operating Systems & Applications
- Enable Security Software
- Securely Configure Devices
- Use Strong User Authentication
- Cyber Security Training
- Backup and Encrypt Data
- Secure Mobility
- Establish Basic Perimeter Defences
- Secure Cloud and Outsourced IT Services
- Secure Websites
- Implement Access Control and Authorization
- Secure Portable Media
- Leadership Accountability Cyber Security Risk Assessment
- Computer Security Log Management