Summary of 108 - Cyber Security Best Practices

Course Description

This course will introduce various cyber security threats you may encounter at work and in your personal life. You will learn behaviours and strategies that you can implement to mitigate these risks whenever you are connected. Come prepared to learn how to protect yourself online by choosing a strong password for your accounts, spotting and handling suspicious emails, securing your personal device and social media accounts, and many more.

Course Format:

Instructor-led (virtual or classroom)



Course Duration

1 day

Target Audience

Employees of all levels

Recommended Prior Learning

It is recommended that you take the online course 602 - Discovering Cyber Security prior to attending this course. It is also beneficial to take course 107 - Cyber Security in the GC for non-IT Employees.

Course Objectives

The objectives of this workshop are to ensure that upon successful completion, you will be able to:

  • identify various cyber threats
  • recall strategies, recommendations, steps, and behaviours used to mitigate risk online
  • implement best practices in their day-to-day work and personal lives that mitigate cyber risk and improve cyber hygiene

Course Outline

  • Module 1 – Threat Context
    • Cyber security overview
    • Threat actors
    • Attack surfaces
    • Low hanging fruit
    • Summary
  • Module 2 – Social Engineering
    • Definitions ad context
    • Hacking human vulnerabilities
    • Attacks and psychology
    • Spotting and handling phishing emails (best practices)
    • Activity
    • Knowledge checks
    • Summary
  • Module 3 – Passwords and Authentication
    • Definitions and context
    • Types of attacks and effectiveness
    • Volume of breached credentials (scope)
    • Password manager
    • MFA and layered defence
    • Future of authentication
    • Strong authentication best practices
    • Knowledge checks
    • Summary
  • Module 4 – Application Settings and Devices
    • Definitions and context
    • Device and application security concerns
    • Network security concerns
    • Device and operating system hardening
    • Bluetooth best practices
    • System and application security
    • Cyber security and personal devices
    • Public spaces, travel, and Wi-Fi
    • Cyber security and telework
    • Knowledge Check
    • Summary
  • Module 5 – Privacy, Browsing, and Behaviours
    • Definitions and Context
    • What is in a digital profile or fingerprint?
    • Google Ad Exchange
    • Risks involving personal information online
    • Privacy regulations
    • Canadian Internet Registration Authority (CIRA)
    • Online browsing best practices
    • Social media best practices
    • VPN
    • Knowledge checks
    • Summary

Report a problem on this page
Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: