{"id":2579,"date":"2025-09-18T12:32:37","date_gmt":"2025-09-18T16:32:37","guid":{"rendered":"https:\/\/carleton.ca\/irrg\/?page_id=2579"},"modified":"2025-09-25T14:41:15","modified_gmt":"2025-09-25T18:41:15","slug":"essential-of-cyber-security-ecs","status":"publish","type":"page","link":"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/","title":{"rendered":"Essentials Of Cyber Security (ECS)"},"content":{"rendered":"<section style=\"font-family: system-ui, -apple-system, 'Segoe UI', Roboto, Helvetica, Arial, sans-serif; color: #111; background: #f7f7f7; padding: 24px; border-radius: 16px; box-shadow: 0 8px 24px rgba(0,0,0,.06); max-width: 900px; margin: 0 auto;\" aria-labelledby=\"ecs-title\"><!-- Header --><\/p>\n<header style=\"text-align: center;\"><span style=\"display: inline-block; letter-spacing: .08em; font-size: 12px; font-weight: bold; text-transform: uppercase; color: #7a0007; background: #fde7ea; padding: 6px 10px; border-radius: 999px;\">ECS<\/span><\/p>\n<h1 id=\"ecs-title\" style=\"margin: .5rem 0 0; font-size: clamp(22px,3vw,32px); line-height: 1.15; font-weight: 800; color: #000;\">Essentials of Cyber Security (ECS)<\/h1>\n<div style=\"width: 72px; height: 3px; background: #C8102E; border-radius: 4px; margin: 10px auto 12px;\"><\/div>\n<p style=\"color: #333; margin: .25rem auto 1.25rem; max-width: 70ch;\">Core course toward the IRRG Security &amp; Resilience Professional\/Manager designation (Carleton University).<\/p>\n<\/header>\n<p><!-- Key Facts (compact) --><\/p>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center;\" role=\"list\" aria-label=\"Course facts\">\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Dates<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">Nov 17\u201318, 2025<\/p>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">Feb 23\u201324, 2026<\/p>\n<\/div>\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Location<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">ARC Hotel<\/p>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">140 Slater St, Ottawa<\/p>\n<\/div>\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Cost<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">$2,200 CAD + HST<\/p>\n<p style=\"margin: 0; font-size: 11px; color: #475569; line-height: 1.25;\">2-day course<\/p>\n<\/div>\n<\/div>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center; align-items: center; background: #fde7ea; border: 1px solid #f5c2c7; border-radius: 12px; padding: 12px; text-align: center; margin-top: 14px;\" role=\"region\" aria-label=\"Registration\"><a style=\"display: inline-block; background: #C8102E; color: #fff; padding: 8px 14px; border-radius: 999px; font-weight: bold; text-decoration: none; font-size: 14px;\" href=\"https:\/\/www.savoiesecurityassociates.ca\/copy-of-registration\" aria-label=\"Register for CSTEM course\">Register Now<\/a><\/div>\n<p><!-- Modules (responsive 2-column grid) --><\/p>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"ecs-modules-title\">\n<h2 id=\"ecs-modules-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Course Modules<\/h2>\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(260px, 1fr)); gap: 10px;\">\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">1) Cyber Security Terminologies &amp; Concepts<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">To be able to participate in cyber security incidents discussions, one needs<br \/>\na clear understanding of the various terms that are used. This section will<br \/>\nexplain in non-technical concepts, such as: network architecture, virus,<br \/>\nransomware, Stuxnet, cybercrime, IOT, VPN, cloud, exploits, firewall, data<br \/>\nbreaches, malware, Trojan house, worm, bot\/bot net, DDOS,<br \/>\nphishing\/spear phishing, encryption, BYOD, clickjacking, pen-testing,<br \/>\ndomain, software, etc.<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">2) Security in the Digital Age<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">Discusses the cyber security threat landscape and organizational<br \/>\nvulnerabilities, including sabotage, insider threat, the use of intelligence in<br \/>\noperational programs and policy analysis, impacts of AI on cybersecurity,<br \/>\netc.<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">3) Cyber Attacker Tradecraft<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">Discusses recent cyber incidents and their impacts on organizations, how<br \/>\nattackers exploit small system vulnerabilities to escalate their access and<br \/>\nsteal classified\/confidential information.<\/p>\n<p><\/p>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\"><strong>Hands \u2013 on Demonstration<\/strong><br \/>\n<strong>This section will also include hands \u2013 on demonstration of how hackers<\/strong><br \/>\n<strong>gain access to files, the tools and techniques used (Linux Operating<\/strong><br \/>\n<strong>System, Pineapple, Flipper Zero, Phyton, etc.), social media vulnerability<\/strong><br \/>\n<strong>exposures and mitigation strategies, cloning of devices, etc.<\/strong><\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">4) Cyber Security Controls<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">Covers open-source collection of intelligence, techniques\/cycles, social<br \/>\nengineering, types of information available to conduct personnel<br \/>\nassessments, understanding criminal mindset, modern warfare, cyber<br \/>\nsecurity culture, and best practices.<\/p>\n<\/article>\n<\/div>\n<\/section>\n<p><!-- Outcomes --><\/p>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"ecs-outcomes-title\">\n<h2 id=\"ecs-outcomes-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Learning Outcomes<\/h2>\n<ul style=\"margin: 8px 0 0 18px; color: #111; font-size: 14px;\">\n<li style=\"margin: 6px 0;\">\n<p class=\"p1\">Use OSINT to supplement reliability screening reviews and investigations;<\/p>\n<\/li>\n<li style=\"margin: 6px 0;\">\n<p class=\"p1\">Recognize the exposure from information publicly available to attackers;<\/p>\n<\/li>\n<li style=\"margin: 6px 0;\">\n<p class=\"p1\">Explain at a high level the steps behind a cyber attack;<\/p>\n<\/li>\n<li style=\"margin: 6px 0;\">\n<p class=\"p1\">Express and evaluate cyber risks as business risks;<\/p>\n<\/li>\n<li style=\"margin: 6px 0;\">\n<p class=\"p1\">Communicate requirements and comprehend feedback from IT personnel with regards to cybersecurity; and<\/p>\n<\/li>\n<li style=\"margin: 6px 0;\">\n<p class=\"p1\">Explain the rationale behind basic and specific IT security controls.<\/p>\n<\/li>\n<\/ul>\n<p>Upon the successful completion of this training, the course participants will be issued an IRRG certificate, indicating that they have gained the required fundamental cybersecurity knowledge.<\/p>\n<\/section>\n<\/section>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"ecs-outcomes-title\">\n<h2 id=\"ecs-outcomes-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Who should attend<\/h2>\n<p class=\"p1\">This course is designed for security managers and practitioners to advance<br \/>\ntheir understanding of IT\/ICS security to engage in effective communication<br \/>\nand resolve issues with respect to information sharing and cybersecurity.<\/p>\n<p class=\"p1\">Security professionals, from Government and the Industry, who must<br \/>\ninteract with their organization\u2019s IT, ICS control room supervisors, officials,<br \/>\nand require basic underlining of the threats and techniques to be able to<br \/>\nparticipate in discussions.<\/p>\n<p class=\"p1\">Managers responsible for addressing their organization\u2019s cybersecurity<br \/>\nissues.<\/p>\n<p class=\"p1\">Generalists interested in gaining awareness of the growing cybersecurity<br \/>\nthreats and concepts.<\/p>\n<\/section>\n<p><!-- Instructors --><\/p>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"ecs-instructors-title\">\n<h2 id=\"ecs-instructors-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Course Instructors<\/h2>\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(260px, 1fr)); gap: 10px;\">\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px;\">Dr. Felix Kwamena<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">Adjunct Research Professor, Systems &amp; Computer Engineering<br \/>\nDirector, Infrastructure Resilience Research Group (IRRG)<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px;\">Jerry Shelest<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">IRRG Research Associate<br \/>\nStrategic Cybersecurity Analyst<\/p>\n<\/article>\n<\/div>\n<\/section>\n<p><!-- Certificate + CTA --><\/p>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center; align-items: center; background: #fde7ea; border: 1px solid #f5c2c7; border-radius: 12px; padding: 12px; text-align: center; margin-top: 14px;\" role=\"region\" aria-label=\"Registration\">\n<p style=\"margin: 0; font-size: 14px;\"><strong>Certificate:<\/strong> Participants receive an official <abbr title=\"Infrastructure Resilience Research Group\">IRRG<\/abbr> certificate upon successful completion.<\/p>\n<p><a style=\"display: inline-block; background: #C8102E; color: #fff; padding: 8px 14px; border-radius: 999px; font-weight: bold; text-decoration: none; font-size: 14px;\" href=\"https:\/\/www.savoiesecurityassociates.ca\/copy-of-registration\" aria-label=\"Register for Essentials of Cyber Security course\">Register Now<\/a><\/p>\n<\/div>\n<p style=\"font-size: 12px; color: #475569; margin-top: 8px;\">Last updated: September 5, 2025<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ECS Essentials of Cyber Security (ECS) Core course toward the IRRG Security &amp; Resilience Professional\/Manager designation (Carleton University). Dates Nov 17\u201318, 2025 Feb 23\u201324, 2026 Location ARC Hotel 140 Slater St, Ottawa Cost $2,200 CAD + HST 2-day course Register Now Course Modules 1) Cyber Security Terminologies &amp; Concepts To be able to participate in [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":41,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Essentials Of Cyber Security (ECS) - Infrastructure Resilience Research Group<\/title>\n<meta name=\"description\" content=\"ECS Essentials of Cyber Security (ECS) Core course toward the IRRG Security &amp; Resilience Professional\/Manager designation (Carleton University). Dates\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/\",\"url\":\"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/\",\"name\":\"Essentials Of Cyber Security (ECS) - Infrastructure Resilience Research Group\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/irrg\/#website\"},\"datePublished\":\"2025-09-18T16:32:37+00:00\",\"dateModified\":\"2025-09-25T18:41:15+00:00\",\"description\":\"ECS Essentials of Cyber Security (ECS) Core course toward the IRRG Security &amp; Resilience Professional\/Manager designation (Carleton University). Dates\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/irrg\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Training and Development Courses\",\"item\":\"https:\/\/carleton.ca\/irrg\/training-2\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Essentials Of Cyber Security (ECS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/irrg\/#website\",\"url\":\"https:\/\/carleton.ca\/irrg\/\",\"name\":\"Infrastructure Resilience Research Group\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/irrg\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Essentials Of Cyber Security (ECS) - Infrastructure Resilience Research Group","description":"ECS Essentials of Cyber Security (ECS) Core course toward the IRRG Security &amp; Resilience Professional\/Manager designation (Carleton University). Dates","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/","url":"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/","name":"Essentials Of Cyber Security (ECS) - Infrastructure Resilience Research Group","isPartOf":{"@id":"https:\/\/carleton.ca\/irrg\/#website"},"datePublished":"2025-09-18T16:32:37+00:00","dateModified":"2025-09-25T18:41:15+00:00","description":"ECS Essentials of Cyber Security (ECS) Core course toward the IRRG Security &amp; Resilience Professional\/Manager designation (Carleton University). Dates","breadcrumb":{"@id":"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/irrg\/training-2\/essential-of-cyber-security-ecs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/irrg\/"},{"@type":"ListItem","position":2,"name":"Training and Development Courses","item":"https:\/\/carleton.ca\/irrg\/training-2\/"},{"@type":"ListItem","position":3,"name":"Essentials Of Cyber Security (ECS)"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/irrg\/#website","url":"https:\/\/carleton.ca\/irrg\/","name":"Infrastructure Resilience Research Group","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/irrg\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2579"}],"collection":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/comments?post=2579"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2579\/revisions"}],"predecessor-version":[{"id":2649,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2579\/revisions\/2649"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/41"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/media?parent=2579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}