Women in Cybersecurity Scholarship finalists will be notified by May 15, 2025.

Women CyberSecurity Society
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

  • Home
  • About
    • Announcements
    • Our Founder
  • Get Involved
    • Donate
    • Join a Chapter
    • Partnership Opportunities
    • Sponsorship Opportunities
    • Subscribe
    • Volunteer
  • Scholarships
  • Shop
  • Support Center
    • Cybersecurity FAQ's
    • Helping Women In Cyber
    • Resources
  • Contact
  • More
    • Home
    • About
      • Announcements
      • Our Founder
    • Get Involved
      • Donate
      • Join a Chapter
      • Partnership Opportunities
      • Sponsorship Opportunities
      • Subscribe
      • Volunteer
    • Scholarships
    • Shop
    • Support Center
      • Cybersecurity FAQ's
      • Helping Women In Cyber
      • Resources
    • Contact
Women CyberSecurity Society

Signed in as:

filler@godaddy.com

  • Home
  • About
    • Announcements
    • Our Founder
  • Get Involved
    • Donate
    • Join a Chapter
    • Partnership Opportunities
    • Sponsorship Opportunities
    • Subscribe
    • Volunteer
  • Scholarships
  • Shop
  • Support Center
    • Cybersecurity FAQ's
    • Helping Women In Cyber
    • Resources
  • Contact

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

How to stay & secure online (Kids 11-14 years)

Get Cyber Safe Canada

Learn how to secure your accounts, devices and connections to maintain strong cyber safety best practices. Your online accounts contain a lot of information about you. Make sure that the information stays where you want it to by keeping your accounts  secure. Visit https://www.getcybersafe.gc.ca to learn more about free resources. 

Get Cyber Safe Checkup

UK National Cyber Security Centre

Watch, participate and learn with the NCSC’s interactive video and supporting resources for 11–14 year olds.

Young people are growing up in an increasingly digital world, exposing them to both the opportunities and risks of the internet. 

CyberFirst: How to stay secure online highlights some of the most common cyber scams and malicious activity that a pre-teen and teenage internet user might come across and empowers them to make choices to keep themselves more secure online. 

Learn more

Lesson Plans, Assets and Practitioner Guidance

The videos are supported by three lesson plans together with delivery guidance and subject matter factsheet. The materials are all quality assured by the PSHE Association.

Practitioners working with 11–14 year olds can use these materials to build on the subjects introduced in the video and start conversations with students about online security. The activities will help students to get an actionable understanding about how to keep themselves more secure online.

Learn more

Cybersecurity Resources

ICS2 Certified Cloud Security Professional (CCSP) Flash Cards

Chapter 1 -  Cloud Concepts, Architecture, and Design

Chapter 2 - Cloud Governance - Legal Risk, and Compliance

Chapter 3 -  Cloud Data Security Domain

Chapter 4 -  Cloud Platform and Infrastructure Security

Chapter 5 -  Cloud Application Security

Chapter 6 -  Cloud Security Operation


The Ultimate Guide for Certified Cloud Security Professional (CCSP) (pdf)

Download

CCSP ISC2-Exam-Action-Plan (pdf)

Download

IWCD 2022 Digital Safety for Older Adults (pdf)

Download

Part 1 What is Cybersecurity - Cybersecurity For Beginners (pdf)

Download

Part 2 History of Cybersecurity - Cybersecurity For Beginners (pdf)

Download

Part 3 Cybersecurity Basics - Cybersecurity For Beginners (pdf)

Download

Part 4 Cyber Terminology - Cybersecurity For Beginners (pdf)

Download

Part 5 Privacy - Cybersecurity For Beginners (pdf)

Download

Part 6 Shoulder Surfing - Cybersecurity For Beginners (pdf)

Download

Introduction to Threat Hunting (pdf)

Download

Mentor Monday Presentation (pdf)

Download

DIVERSITY HIRING 101

5 Tips To A Successful Diversity Program

  • Buy-In From The Top
  • Develop A Policy
  • Get Everyone on Board
  • Set Measurable Goals
  • Audit Your Program

Download PDF
Canada's new Digital Charter Implementation Act also known as Bill C-11
New Privacy and AI Rules Will Impact Canadian Businesses

subscribe to receive a FREE educational E-BOOK

Canada's new Digital Charter Implementation Act, also known as Bill C-11 has significant ramifications for Canadian businesses and cybersecurity. 


The act composed of three new acts focuses on privacy, data protection and artificial intelligence. 


Subscribe to receive your full 29-page educational e-book.

Subscribe

(ISC)² Pledges One Million FREE Certified in Cybersecurity

See yourself in cybersecurity. You don’t need experience — just the passion and drive to enter a demanding and rewarding field, one that opens limitless opportunities worldwide.

To help close the cybersecurity workforce gap and diversify (ISC)² is offering FREE training and certification to one million people.

Find out more

WCS2 Career Development 3-Year Plan

WCS2 Career Development Plan Workbook v2 (xlsx)

Download

Scholarship List & Other Resources

Cybersecurity course directory

Canadian Directory of Cybersecurity Courses

Check out this excellent resource to find cybersecurity courses across Canada.

Learn more

Tips & Tools

Tips For Learning From Home (mp4)

Download

Introduction to Threat Hunting Workshop Slides (pdf)

Download

Threat Hunting - The Hunter Strikes Back (pdf)

Download

Work From Home Tools List (png)

Download

NICE Cybersecurity Workforce Framework 1-Pager (pdf)

Download

Tutorials

4 Step Tutorial

Did you know you can check if your Anti-Malware program is working?


1)  Download and save file to desktop as eicar.txt

2)  Update and run your AV program

3)  Your AV should detect the .txt as if working.

4) If not, reinstall AV program

https://www.eicar.org/download-anti-malware-testfile/…

Wireshark for threat hunting

Wireshark for Threat Hunting

How to use Wireshark for threat hunting exercises. Examine two use cases:


1) How to detect unauthorized access

2) Examine a USB for malicious activity.

The Dark Web - Privacy & Anonymity

Give customers a reason to do business with you.

Cybersecurity Research

Women in Cybersecurity Workforce Study

This study is being conducted by the Women CyberSecurity Society (WCSS) which is a registered non-profit organization dedicated to providing support and resources to women in the cybersecurity industry.  Our goal is to aid in the retention and recruitment of women in the cybersecurity workforce.  In order to do that, we need research that records the issues, challenges, and barriers that discourages women from entering and sometimes remain in the industry. 


This survey also examines demographic information as well as inherent bias, lack of diversity & inclusion, and lack of support.  

  • All personally identifiable information (PII) will be anonymized.  
  • No  PII information will be shared with third parties. 


The results of the survey will be posted here in the coming months once the research project has completed.


If you wish to collaborate with us in this research, please email us at  contact@womencybersecuritysociety.org.

Women in Cybersecurity Workforce Study

Women in Cybersecurity Workforce Study

Cybersecurity For Beginners Answer Key

Part 1 - What is Cybersecurity?

What is Cybersecurity Answer Key (png)Download

Code of Conduct

The Women CyberSecurity Society fosters meaningful and safe spaces for online and local events to members of the community.  Please review our Code of Conduct and abide by the rules when interacting with our members, visitors and attendees during events at all times.  Violations may result in being banned from events  and or removal of your membership privileges.


Thank you for respecting our community!

WCS2 Code of Conduct January 2023 (pdf)Download

Copyright © 2018-2025 Women CyberSecurity Society Inc. |  All Rights Reserved

  • Policies
  • Contact

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept