Browse courses by category
IT and cloud security
- course 104 | IT security risk management: A lifecycle approach (ITSG-33)
- course 115 | Foundations of cloud security in the Government of Canada
- course 116 | Cloud computing in the GC - The Security Assessment and Authorization (SA&A) process
- course 126 | Conducting cloud service provider IT security assessment
- course 350 | Wireless security
- course 385 | Cross domain solutions - A primer
- course 508 | Implementing the Harmonized Threat Risk Assessment (HTRA) Methodology
- course 545 | Contracting and IT Security
- course 601 | Introduction to IT security management
- course 604 | Overview of IT security risk management: A lifecycle approach (ITSG-33)
- course 606 | IT security fundamentals for IT practitioners
- course 610 | Digital forensics
- course 617 | Common criteria
- course 910 | IT security risk management boot camp
Cyber security
- course 107 | Cyber security in the GC for non-IT employees
- course 108 | Cyber security best practices
- course 109 | Cyber security foundations for GC information systems
- course 110 | Cyber security in the GC and online exposure
- course 111 | Cyber security in the GC for home and telework
- course 118 | Cyber security in the GC and the cybercrime landscape
- course 119 | Cyber security for IoT devices
- course 122 | Implementing robust authentication in the GC
- course 123 | Targeted social engineering attacks
- course 124 | Mitigating insider threats
- course 155 | Strengthening authentication
- course 335 | Cyber security in the GC for software development teams
- course 336 | Cyber security considerations for citizen developers
- course 345 | Cyber security in the GC and wireless communications
- course 410 | Cryptographic security in the GC
- course 411 | Using cryptographic tools in the GC
- course 530 | Cyber security event management
- course 531 | Cyber security event management - Table top exercise
- course 612 | Cyber security considerations for election authorities and administrators
- course 615 | Cyber security considerations for consumers of managed services
- course 616 | Cyber security for political party IT decision makers and IT staff
- course 618 | Cyber security considerations for social media account management
- course 620 | Introduction to research security
- course 621 | Cyber security for researchers
- course 915 | Cyber security in the GC boot camp
- course DDN235 | Discover cyber security
COMSEC
- course 205 | Government of Canada Electronic Key Management System (GC EKMS)
- course 206 | Distributed INFOSEC Accounting System (DIAS)
- course 210 | Eclypt encryption drives
- course 215 | Emission Security (EMSEC)
- course 229 | COMSEC account management for private sector companies
- course 230 | COMSEC account management for GC
- course 233 | Cryptographic key management & ordering
- course 235 | COMSEC in the GC
- course 240 | Data Transfer Device (DTD)
- course 245 | Secure DTD 2000 System (SDS)
- course 250 | Secure Terminal Equipment (STE)
- course 270 | vIPer
- course 275 | Simple Key Loader (SKL)
- course 276 | Really Simple Key Loader (RASKL)
- course 281 | TACLANE network encryptor
- course 285 | GEM One
- course 731 | Controlling Authority/Command Authority (ConAuth/CmdAuth)
- course 732 | Departmental COMSEC authority
- course 734 | COMSEC custodian refresher
- course 780 | Introduction to in-line network encryptors