Course 411: Using cryptographic tools in the GC

Description

This course will provide participants with practical hands-on training on protecting file confidentiality and integrity through encryption and digital signatures. This course will also enable participants to apply volume encryption to data at rest, encrypt and digitally sign email, validate the integrity of downloaded software, enhance privacy and security by using a VPN, and encrypt text, voice, and video messages. The instructor-led portion of the course addresses tools and practices in a GC context and require the use of a GC-provided computer during the training. Tools and practices that apply to personal information and infrastructure are addressed in the handbook that will be made available prior to the training.

Objectives

The objectives of this course are to ensure that upon successful completion, the participant will be able to:

  • use a password manager
  • encrypt and digitally sign data
  • encrypt and digitally sign emails
  • verify integrity of internet components

Target audience

Employees working within the Government of Canada.

Prerequisites

Participants must successfully complete course 410 – Cryptographic security in the GC prior to attending this course.

Course outline and module objectives

  • Module 1 – Applying protecting to passwords
    • Use a password manager to protect authentication credentials
    • Create and manage encrypted password vaults
  • Module 2 – Applying encryption to files
    • Encrypt files for personal use in GC PKI
    • Encrypt files with password protection
    • Encrypt files for sharing in GC PKI
  • Module 3 – Digitally signing files
    • Digitally sign files for authenticity
    • Verifying digital signatures applied to files
  • Module 4 – Email encryption and signing
    • Encrypt emails to protect confidentiality
    • Digitally sign emails to ensure authenticity
    • Implement non-GC alternatives for email encryption
  • Module 5 – Encryption for Internet communications
    • Recall how computers convert domain names to IP addresses
    • Recall how encryption over HTTP is implemented
    • Identify encryption parameters of Internet servers
    • Explain the benefits of a Virtual Private Network (VPN)
Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: