This Cyber Security for Political Party IT Decision Makers and IT Staff online course examines the specific threats to political parties to provide decision makers with information on where to start when integrating cyber security into their daily work lives. The purpose of this training is to explain the practical steps that political parties can take to protect their people, systems, and social media presence from cyber interference.
The objectives of this online course are to ensure that upon successful completion, you will be able to:
- recognize the current threat landscape
- recall how to protect your people, systems and infrastructure, and social media presence
- recall how to prepare for an incident
- list the cyber security best practices for political parties
- recall how to access relevant reference materials
This online course is composed of 8 parts. Parts 1 and 8 are written information and parts 2 to 7 are separate videos. The parts are as follows:
- Part 1 – Introduction
- Part 2 – Current threat landscape (Video)
- Part 3 – Protecting people (Video)
- Part 4 – Protecting systems and infrastructure (Video)
- Part 5 – Social media (Video)
- Part 6 – Incident response (Video)
- Part 7 – Conclusion (Video)
- Part 8 – References
The primary target audience is IT decision makers within political parties at the federal, provincial, territorial, and municipal levels. A secondary target audience is political party IT staff.
It is estimated that this course takes approximately 40 minutes to complete. Please note that you can pause and resume this course at any time.
The first time you take this course, complete the parts in sequential order. When you have completed all parts, you will be able to print or save your Certificate which is located at the bottom of this screen. You may also return to this course at any time in the future for reference purposes.