Learn how to secure your accounts, devices and connections to maintain strong cyber safety best practices. Your online accounts contain a lot of information about you. Make sure that the information stays where you want it to by keeping your accounts secure. Visit https://getcybersafe.ca to learn more about free resources.
Young people are growing up in an increasingly digital world, exposing them to both the opportunities and risks of the internet.
CyberFirst: How to stay secure online highlights some of the most common cyber scams and malicious activity that a pre-teen and teenage internet user might come across and empowers them to make choices to keep themselves more secure online.
Practitioners working with 11–14 year olds can use these materials to build on the subjects introduced in the video and start conversations with students about online security. The activities will help students to get an actionable understanding about how to keep themselves more secure online.
See yourself in cybersecurity. You don’t need experience — just the passion and drive to enter a demanding and rewarding field, one that opens limitless opportunities worldwide.
To help close the cybersecurity workforce gap and diversify (ISC)² is offering FREE training and certification to one million people.
ICS2 Certified Cloud Security Professional (CCSP) Flash Cards
Chapter 2 - Cloud Governance - Legal Risk, and Compliance
Chapter 3 - Cloud Data Security Domain
Chapter 4 - Cloud Platform and Infrastructure Security
Chapter 5 - Cloud Application Security
Chapter 6 - Cloud Security Operation
The Ultimate Guide for Certified Cloud Security Professional (CCSP) (pdf)Download
CCSP ISC2-Exam-Action-Plan (pdf)Download
IWCD 2022 Digital Safety for Older Adults (pdf)Download
Part 1 What is Cybersecurity - Cybersecurity For Beginners (pdf)Download
Part 2 History of Cybersecurity - Cybersecurity For Beginners (pdf)Download
Part 3 Cybersecurity Basics - Cybersecurity For Beginners (pdf)Download
Part 4 Cyber Terminology - Cybersecurity For Beginners (pdf)Download
Part 5 Privacy - Cybersecurity For Beginners (pdf)Download
Part 6 Shoulder Surfing - Cybersecurity For Beginners (pdf)Download
Introduction to Threat Hunting (pdf)Download
Mentor Monday Presentation (pdf)Download
Did you know you can check if your Anti-Malware program is working?
1) Download and save file to desktop as eicar.txt
2) Update and run your AV program
3) Your AV should detect the .txt as if working.
4) If not, reinstall AV program
How to use Wireshark for threat hunting exercises. Examine two use cases:
1) How to detect unauthorized access
2) Examine a USB for malicious activity.
Give customers a reason to do business with you.
This study is being conducted by the Women CyberSecurity Society (WCSS) which is a registered non-profit organization dedicated to providing support and resources to women in the cybersecurity industry. Our goal is to aid in the retention and recruitment of women in the cybersecurity workforce. In order to do that, we need research that records the issues, challenges, and barriers that discourages women from entering and sometimes remain in the industry.
This survey also examines demographic information as well as inherent bias, lack of diversity & inclusion, and lack of support.
The results of the survey will be posted here in the coming months once the research project has completed.
If you wish to collaborate with us in this research, please email us at email@example.com.
The Women CyberSecurity Society fosters meaningful and safe spaces for online and local events to members of the community. Please review our Code of Conduct and abide by the rules when interacting with our members, visitors and attendees during events at all times. Violations may result in being banned from events and or removal of your membership privileges.
Thank you for respecting our community!