Essentials of Cyber Security (ECS)
Core course toward the IRRG Security & Resilience Professional/Manager designation (Carleton University).
Dates
Nov 17–18, 2025
Feb 23–24, 2026
Location
ARC Hotel
140 Slater St, Ottawa
Cost
$2,200 CAD + HST
2-day course
Course Modules
1) Cyber Security Terminologies & Concepts
To be able to participate in cyber security incidents discussions, one needs
a clear understanding of the various terms that are used. This section will
explain in non-technical concepts, such as: network architecture, virus,
ransomware, Stuxnet, cybercrime, IOT, VPN, cloud, exploits, firewall, data
breaches, malware, Trojan house, worm, bot/bot net, DDOS,
phishing/spear phishing, encryption, BYOD, clickjacking, pen-testing,
domain, software, etc.
2) Security in the Digital Age
Discusses the cyber security threat landscape and organizational
vulnerabilities, including sabotage, insider threat, the use of intelligence in
operational programs and policy analysis, impacts of AI on cybersecurity,
etc.
3) Cyber Attacker Tradecraft
Discusses recent cyber incidents and their impacts on organizations, how
attackers exploit small system vulnerabilities to escalate their access and
steal classified/confidential information.
Hands – on Demonstration
This section will also include hands – on demonstration of how hackers
gain access to files, the tools and techniques used (Linux Operating
System, Pineapple, Flipper Zero, Phyton, etc.), social media vulnerability
exposures and mitigation strategies, cloning of devices, etc.
4) Cyber Security Controls
Covers open-source collection of intelligence, techniques/cycles, social
engineering, types of information available to conduct personnel
assessments, understanding criminal mindset, modern warfare, cyber
security culture, and best practices.
Learning Outcomes
-
Use OSINT to supplement reliability screening reviews and investigations;
-
Recognize the exposure from information publicly available to attackers;
-
Explain at a high level the steps behind a cyber attack;
-
Express and evaluate cyber risks as business risks;
-
Communicate requirements and comprehend feedback from IT personnel with regards to cybersecurity; and
-
Explain the rationale behind basic and specific IT security controls.
Upon the successful completion of this training, the course participants will be issued an IRRG certificate, indicating that they have gained the required fundamental cybersecurity knowledge.
Who should attend
This course is designed for security managers and practitioners to advance
their understanding of IT/ICS security to engage in effective communication
and resolve issues with respect to information sharing and cybersecurity.
Security professionals, from Government and the Industry, who must
interact with their organization’s IT, ICS control room supervisors, officials,
and require basic underlining of the threats and techniques to be able to
participate in discussions.
Managers responsible for addressing their organization’s cybersecurity
issues.
Generalists interested in gaining awareness of the growing cybersecurity
threats and concepts.
Course Instructors
Dr. Felix Kwamena
Adjunct Research Professor, Systems & Computer Engineering
Director, Infrastructure Resilience Research Group (IRRG)
Jerry Shelest
IRRG Research Associate
Strategic Cybersecurity Analyst
Certificate: Participants receive an official IRRG certificate upon successful completion.
Last updated: September 5, 2025