{"id":2593,"date":"2025-09-18T12:26:06","date_gmt":"2025-09-18T16:26:06","guid":{"rendered":"https:\/\/carleton.ca\/irrg\/?page_id=2593"},"modified":"2025-09-25T14:23:59","modified_gmt":"2025-09-25T18:23:59","slug":"cyber-security-threat-environment-for-managers-cstem","status":"publish","type":"page","link":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/","title":{"rendered":"Cyber Security Threat Environment For Managers (CSTEM)"},"content":{"rendered":"<section style=\"font-family: system-ui, -apple-system, 'Segoe UI', Roboto, Helvetica, Arial, sans-serif; color: #111; background: #f7f7f7; padding: 24px; border-radius: 16px; box-shadow: 0 8px 24px rgba(0,0,0,.06); max-width: 900px; margin: 0 auto;\" aria-labelledby=\"cstem-title\"><!-- Header --><\/p>\n<header style=\"text-align: center;\"><span style=\"display: inline-block; letter-spacing: .08em; font-size: 12px; font-weight: bold; text-transform: uppercase; color: #7a0007; background: #fde7ea; padding: 6px 10px; border-radius: 999px;\">\u00a0CSTEM<\/span><\/p>\n<h1 id=\"cstem-title\" style=\"margin: .5rem 0 0; font-size: clamp(22px,3vw,32px); line-height: 1.15; font-weight: 800; color: #000;\">Cyber Security Threat Environment for Managers (CSTEM)<\/h1>\n<div style=\"width: 72px; height: 3px; background: #C8102E; border-radius: 4px; margin: 10px auto 12px;\"><\/div>\n<p style=\"color: #333; margin: .25rem auto 1.25rem; max-width: 70ch;\">This course is one of the essential courses required for certification and designation as a Security &amp; Resilience Professional\/Manager under the <abbr title=\"Infrastructure Resilience Research Group\">IRRG<\/abbr>, Office of the Dean, Faculty of Engineering and Design, Carleton University.<\/p>\n<\/header>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center;\" role=\"list\" aria-label=\"Course facts\">\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Dates<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">Dec 8\u20139, 2025<\/p>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">Mar 23\u201324, 2026<\/p>\n<\/div>\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Location<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">ARC Hotel<\/p>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">140 Slater Street, Ottawa, Ontario<\/p>\n<\/div>\n<div style=\"flex: 0 1 200px; background: #fff; border: 1px solid #e5e7eb; border-radius: 10px; padding: 12px; text-align: center;\" role=\"listitem\">\n<h3 style=\"font-size: 12px; text-transform: uppercase; letter-spacing: .06em; color: #475569; margin: 2px 0 4px;\">Cost<\/h3>\n<p style=\"margin: 0; font-weight: 600; line-height: 1.25;\">$2,500 CAD + HST<\/p>\n<p style=\"margin: 0; font-size: 11px; color: #475569; line-height: 1.25;\">2-day course<\/p>\n<\/div>\n<\/div>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center; align-items: center; background: #fde7ea; border: 1px solid #f5c2c7; border-radius: 12px; padding: 12px; text-align: center; margin-top: 14px;\" role=\"region\" aria-label=\"Registration\"><a style=\"display: inline-block; background: #C8102E; color: #fff; padding: 8px 14px; border-radius: 999px; font-weight: bold; text-decoration: none; font-size: 14px;\" href=\"https:\/\/www.savoiesecurityassociates.ca\/copy-of-registration\" aria-label=\"Register for CSTEM course\">Register Now<\/a><\/div>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-modules-title\">\n<h2 id=\"cstem-modules-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Course Modules<\/h2>\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(260px, 1fr)); gap: 10px;\">\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">1) Roles &amp; Responsibilities<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">Roles and responsibilities of IT, ICS, cybersecurity experts, security professionals, managers, and analysts; reporting requirements to senior managers and executives.<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">2) Threat Landscape &amp; Actionable Response<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">Recent cyber attacks, attacker tradecraft, assessment methodologies, and the impact of AI on cybersecurity.<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">3) Scenario Exercises<\/h4>\n<ul style=\"margin: 0; padding-left: 18px; color: #475569; font-size: 14px;\">\n<li>Specific cyber countermeasures<\/li>\n<li>Effective measures to prevent attacks<\/li>\n<li>How man-in-the-middle tools can intercept seemingly secure networks<\/li>\n<li>Using network devices (e.g., firewalls, IDS) to increase intelligence and the value of logs and alerts during investigations<\/li>\n<\/ul>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px; font-size: 15px;\">Hands-on Demonstration<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">Live demonstration of how hackers gain access to files; tools and techniques used (Linux OS, WiFi Pineapple, Flipper Zero, Python, etc.); social media vulnerability exposures and mitigation strategies; cloning of devices.<\/p>\n<\/article>\n<\/div>\n<\/section>\n<p><!-- Outcomes --><\/p>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-outcomes-title\">\n<h2 id=\"cstem-outcomes-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Learning Outcomes<\/h2>\n<ul style=\"margin: 8px 0 0 18px; color: #111; font-size: 14px;\">\n<li style=\"margin: 6px 0;\">Understand the roles and responsibilities of all key officials involved in addressing cyber threats to an organization.<\/li>\n<li style=\"margin: 6px 0;\">Know and use common cybersecurity terminologies.<\/li>\n<li style=\"margin: 6px 0;\">Understand concepts and processes to communicate effectively and help break down silos in the workplace.<\/li>\n<li style=\"margin: 6px 0;\">Gain a better understanding of defense methodologies and the evolving complexities of cyberattacks.<\/li>\n<\/ul>\n<p style=\"margin: 10px 0 0; color: #111; font-size: 14px;\">Upon successful completion, participants will be issued an IRRG certificate indicating they have acquired the knowledge and understanding to communicate effectively with peers, senior managers, and executives.<\/p>\n<\/section>\n<p><!-- Who should attend --><\/p>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-audience-title\">\n<h2 id=\"cstem-audience-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Who should attend<\/h2>\n<p class=\"p1\" style=\"margin: 0 0 8px;\">Professionals, managers, and generalists who have taken the Essentials of Cyber Security (ECS) training.<\/p>\n<p class=\"p1\" style=\"margin: 0;\">IT, ICS, and Control Room Supervisors who want to update their knowledge of ongoing cyber threats.<\/p>\n<\/section>\n<p><!-- Instructors --><\/p>\n<section style=\"background: #fff; border: 1px solid #e5e7eb; border-radius: 14px; padding: 16px; margin-top: 14px;\" aria-labelledby=\"cstem-instructors-title\">\n<h2 id=\"cstem-instructors-title\" style=\"font-size: 19px; font-weight: 800; color: #000; margin: 0 0 10px;\">Course Instructors<\/h2>\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(260px, 1fr)); gap: 10px;\">\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px;\">Dr. Felix Kwamena<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">Adjunct Research Professor, Systems &amp; Computer Engineering; Director, Infrastructure Resilience Research Group (IRRG)<\/p>\n<\/article>\n<article style=\"border: 1px solid #e5e7eb; border-radius: 10px; padding: 10px; min-width: 0;\">\n<h4 style=\"margin: 0 0 6px;\">Jerry Shelest<\/h4>\n<p style=\"margin: 0; color: #475569; font-size: 14px;\">IRRG Research Associate; Strategic Cybersecurity Analyst<\/p>\n<\/article>\n<\/div>\n<\/section>\n<p><!-- Certificate + CTA --><\/p>\n<div style=\"display: flex; flex-wrap: wrap; gap: 10px; justify-content: center; align-items: center; background: #fde7ea; border: 1px solid #f5c2c7; border-radius: 12px; padding: 12px; text-align: center; margin-top: 14px;\" role=\"region\" aria-label=\"Registration\">\n<p style=\"margin: 0; font-size: 12px;\"><strong>Certificate:<\/strong> Participants receive an official <abbr title=\"Infrastructure Resilience Research Group\">IRRG<\/abbr> certificate upon successful completion.<\/p>\n<p><a style=\"display: inline-block; background: #C8102E; color: #fff; padding: 8px 14px; border-radius: 999px; font-weight: bold; text-decoration: none; font-size: 14px;\" href=\"https:\/\/www.savoiesecurityassociates.ca\/copy-of-registration\" aria-label=\"Register for CSTEM course\">Register Now<\/a><\/p>\n<\/div>\n<p style=\"font-size: 12px; color: #475569; margin-top: 8px;\">Last updated: September 25, 2025<\/p>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a Security &amp; Resilience Professional\/Manager under the IRRG, Office of the Dean, Faculty of Engineering and Design, Carleton University. Dates Dec 8\u20139, 2025 Mar 23\u201324, 2026 Location ARC Hotel 140 Slater Street, Ottawa, [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":41,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Threat Environment For Managers (CSTEM) - Infrastructure Resilience Research Group<\/title>\n<meta name=\"description\" content=\"\u00a0CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/\",\"url\":\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/\",\"name\":\"Cyber Security Threat Environment For Managers (CSTEM) - Infrastructure Resilience Research Group\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/irrg\/#website\"},\"datePublished\":\"2025-09-18T16:26:06+00:00\",\"dateModified\":\"2025-09-25T18:23:59+00:00\",\"description\":\"\u00a0CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/irrg\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Training and Development Courses\",\"item\":\"https:\/\/carleton.ca\/irrg\/training-2\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security Threat Environment For Managers (CSTEM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/irrg\/#website\",\"url\":\"https:\/\/carleton.ca\/irrg\/\",\"name\":\"Infrastructure Resilience Research Group\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/irrg\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Threat Environment For Managers (CSTEM) - Infrastructure Resilience Research Group","description":"\u00a0CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/","url":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/","name":"Cyber Security Threat Environment For Managers (CSTEM) - Infrastructure Resilience Research Group","isPartOf":{"@id":"https:\/\/carleton.ca\/irrg\/#website"},"datePublished":"2025-09-18T16:26:06+00:00","dateModified":"2025-09-25T18:23:59+00:00","description":"\u00a0CSTEM Cyber Security Threat Environment for Managers (CSTEM) This course is one of the essential courses required for certification and designation as a","breadcrumb":{"@id":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/irrg\/training-2\/cyber-security-threat-environment-for-managers-cstem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/irrg\/"},{"@type":"ListItem","position":2,"name":"Training and Development Courses","item":"https:\/\/carleton.ca\/irrg\/training-2\/"},{"@type":"ListItem","position":3,"name":"Cyber Security Threat Environment For Managers (CSTEM)"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/irrg\/#website","url":"https:\/\/carleton.ca\/irrg\/","name":"Infrastructure Resilience Research Group","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/irrg\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2593"}],"collection":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/comments?post=2593"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2593\/revisions"}],"predecessor-version":[{"id":2638,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/2593\/revisions\/2638"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/pages\/41"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/irrg\/wp-json\/wp\/v2\/media?parent=2593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}