top of page

Essentials of Cyber Security (ECS)

  • Jan 4-5, 2024

  • May 8-9, 2024

  • Nov 27-28, 2024


ARC Hotel, 140 Slater Street, Ottawa, ON


$2200 + HST

COURSE SUMMARY This course is one of the essential courses required for certification and designation as a Security and Resilience Professional/Manager under the Infrastructure Resilience Research Group, IRRG, Office of the Dean, Faculty of Engineering and Design, Carleton University.

This course has been designed for employees and managers to gain and advance their understanding and knowledge to communicate and participate in discussions with IT and ICS experts to address the growing cyber security threats to organizations and digitalized infrastructure systems.

The course is divided into the following four (4) modules:

Module 1: Security in the Digital Age will discuss the cyber security threat landscape and organizational vulnerabilities, including sabotage; inside threat, etc.

Module 2: Cyber Attacker Tradecraft will discuss recent cyber incidents and their impacts on organizations, how attackers exploit small system vulnerabilities to escalate their access and steal classified/confidential information.

Module 3: Cyber Security Controls will provide information about open sources collection of intelligence techniques/cycles, social engineering types of information available to carry out personnel assessment, understanding criminal mindset, modern warfare, cyber security culture, and best practices.

Module 4: Cyber Security Terminologies and Concepts will explain in non-technical language  terms such as: network architecture, virus, ransomware, Stuxnet, cybercrime, IOT, VPN, cloud, exploits, firewall, bot/bot net, DDOS, phishing/spear phishing, etc.

At the end of the course, you will be able to:


  • Use OSINT to supplement reliability screening reviews and investigations;

  • Recognize the exposure from information publicly available to attackers;

  • Explain at a high level the steps behind a cyber attack;

  • Express and evaluate cyber risks as business risks;

  • Communicate requirements and comprehend feedback from IT personnel with regards to cybersecurity; and

  • Explain the rationale behind basic and specific IT security controls.

Who should attend:

Security professionals, from GC and Industry, who must interact with their organization’s IT, ICS control room supervisors, officials, and require basic underlining of the threats and techniques to be able to participate in discussions.

Managers responsible for addressing their organization’s cybersecurity issues.

Generalists interested in gaining awareness of the growing cybersecurity threats and concepts.

bottom of page