This is the course of a lifetime.
Cyber security awareness, cyber security training, cyber security practice, and most importantly cyber security confidence.
Approaching cyber security can seem overwhelming. But cyber security fundamentals are easy to understand and even easier to implement at home, work and even while traveling.
This is 24 hours of the most thoroughly researched and detailed security material available today with a vision of what's needed for the cyber security industry in the future.
This course has immediate application for all aspects of your life and gives you a solid foundation to pursue a cyber security career or become a cyber security champion in your organization.
Led by one of the most thought provoking and interesting people in cyber security today – Ian Thornton-Trump. His career in writing, presenting and educating on cyber security will provide you with an opportunity to learn from an industry leader.
This is the course of a lifetime if you are looking for real details about cyber criminals, malware and other cyber security topics. Seats are limited.
March 21st - March 25th
Delivered online via Zoom.
After reserving your spot, payment methods are sent via email. Choose your preferred payment and checkout to complete your registration.
Over 25 hours of live instruction spanning 5 days (Mon-Fri)
Certificate of completion
*May be eligible for Alberta Job Grants.
For more information on Alberta Job Grant eligibility, click here.
Cyber Trends is committed to doing their part in protecting both the digital world and the real world.
Working in partnership with Tree Canada, Cyber Trends will be donating 20 trees for each student enrolled in the CSCPC in an effort to help combat climate change.
What you'll learn
Course Introduction & Overview of Threat Landscape
Outlines the course progression and provides a historical background to cyber threats.
Cyber-crime is a reality of life for anyone connected to the internet. By examining the tactics,training and procedures (TTPs) of actor’s malicious actors involved in past crimes, an understanding of the goals of malicious actors can be understood.
Understanding Cyber Risk: On Professional & Personal Terms
Cyber risk is everywhere. Or is it really? An examination of cyber-criminal tactics which attack on both professional and personal levels.
This section covers the TTPs in use by modern cyber criminals and explores the full range of cyber attacks used to target both organizations and people. A strong emphasis will be placed on the range of Social Engineering attacks being used against the unaware.
The False Sense of
Provides a general understanding of cyber security compliance and the cyber security regulatory requirements found in Canada.
Compliance requirements are part of everyday business life in Canada and around the world. PCI DSS, PIPEDA, The GDPR and other provincial regulations will be discussed in depth.
Cyber Security Policy, Procedure, Process & Culture
This lecture will assist in understanding the importance of documenting Policies, Procedures and Processes to establish and enhance cyber security.
Due Diligence in Cyber Defense: Compliance & Monitoring
Due diligence is a powerful word which seeks to describe the right action taken. For organizations this means understanding why cyber security is necessary
Duty of Care, Standard of Care Foreseeability and Harm all form part of our understanding of negligence. Data protection is no different and there are a number of ways organizations and individuals can act to ensure they are working to protect customer data from cyber threats.
Proactive Cyber Security: At home, work and while traveling
Best practices are in place for a reason: they work. There are reasonable precautions and questions to ask to be safe at home, work and when traveling.
Many features and services already exist to protect you in cyber space. For the large part they are reasonable, cost effective and simple to implement. Penetration tests, vulnerability scans and more advanced Red Team engagements can help continuously improve cyber security defences.
Technical Defences Against Malware Part I: Exploits, Trojans & Payload
Dives into general examples of cybercriminal system exploitation and introduces the Lockheed Martin kill chain as a teaching aid.
Understanding how system exploitation works, what a Trojan is and what a malware payload is, are all parts of understanding how various technical controls can prevent system compromise.
Technical Defences Against Malware Part II: Exploits, Trojans & Payload
Examines the most effective defences against system exploitation and what investments to make for both home and business systems.
Now that we understand how systems get exploited, we can examine the most effective ways to combat system exploitation by malicious actors.
The Worst Just Happened: Recovering from a Cyber Attack Personally & Professionally
Steps to recover from a cyber attack and how to mitigate future attacks will be provided as well as an overview of Digital Forensics and Incident Response.
Data breach at work or from an online account is a nasty situation. There are many steps to follow to identify, contain and recover from a data breach.
Security Architecture: Business and Personal Techniques to Trap Malicious Actors
Security Architecture is the foundation to establish security layers on top of network segregation. This is a key technique to improved cyber security.
Not everyone needs access to everything. Every device doesn't need to talk to the Internet.
Data Management: Attack Surface Reduction for Business and Personal Life
Data management is a key requirement to deploy effective cyber defences. Archiving and Classification systems are useful tools to identify what's important.
Data is everywhere, and it is growing at a phenomenal rate at your organization and in your personal life.
Working For & With a Cybersecurity Team
Common values and communication skills are vital for successful cyber security teams. As the tempo of cyber security attacks increase the organizational stress levels increase.
Effective organizational cyber security can be fulfilled any number of ways. Building a team from existing resources, hiring a security resource or outsourcing to a 3rd party are all options for organizations to explore to improve cyber security posture.
The Future of Cyber Security: Market Trends
Migration to cloud services, artificial intelligence, machine learning and blockchain technologies are just several future trends which will radically alter cyber security.
Many organizations will migrate services to cloud based hosting services rapidly over the next few years. This drastically alters security training and software requirements. Combined with emerging technologies such as AI, ML and blockchain cyber security in the future will need to adapt quickly.
Special Topic: Understanding Cyber Risk in Your Organization
Evaluate system revenue, reputation, and regulation to gain insight into which systems really matter.
Understanding the critical systems in a business is key for designing a plan for incident response as well as input for future IT investment. Strategies that enable cross business communication and provide an understanding of risk are fundamental in improving cyber security posture.
A general contextual review of the ransomware epidemic and a detailed understanding of how Ransomware works.
Ransomware has become an existential threat to business and home systems. There are a number of simple and effective solutions to this favourite attack from cyber criminals.
Cyber Threat Intelligence
Cyber threat intelligence is a way of anticipating personal and organizational cyber attacks.
Knowing something bad is about to happen can give you enough time to prepare. Similar in concept to weather warnings and hurricane tracking, cyber threat intel can help an organization, or a person mitigate an attack before it even occurs.
Automated attacks by compromised computers and IoT devices are a constant internet presence. Understanding the threat and mitigation steps is an important aspect to cyber security.
Defending against automated malicious attacks is certainly an important cyber security issue. Defending devices which could be used by malicious actors to conduct attacks is even more important. Bots range in attack capabilities from DDOS to account brute forcing.
Building Effective Information Security Business Cases & Presentations
Effective Communication skill is the most important aspect to a career in information security.
Presenting complex security topics to business leaders and manager outside the information security department is fraught with peril. There needs to be an emphasis on providing the 5 W’s and H rather than resorting to technical jargon when recommending solutions.
"The subject of GDPR is complex and at times heavy on detail, Ian's passion and enthusiasm of delivery made for a thoroughly enjoyable evening. Ian knows his stuff."
Mark Kelly – CCO, Aldus.com