Available courses

Cybersecurity Fundamentals 103 provides a more expanded, comprehensive supplement to the essential principles of workplace information security.


This course is designed for all employees — technical and non-technical alike — to build a strong foundation in protecting digital systems, company data, and personal information against today’s most common cyber threats.

Through interactive modules, practical examples, and knowledge checks, participants will learn to identify risks, practise secure digital habits, and contribute to a resilient security culture within the organization.
The training aligns with the company’s Information Security and Acceptable Use Policies, supporting compliance with privacy standards such as PIPEDA and internal data handling procedures.

Learning Outcomes

By the end of this course, participants will be able to:

Explain the importance of expanded / enhanced cybersecurity in the workplace and their role in maintaining it.

Recognize why domain isolation is important, ex: Work / Personal

Understand what identity validation is, and why it's important

Understand browser configurations / extensions that advance privacy

Understand how to use secure email, and why

Understand why the use of firewalls and gateways are important

Understand assorted remaining information

Course Structure

Module 1: Introduction to Expanded Cybersecurity 2
Module 2: Securing Core Communication Protocols 
Module 3: Isolating domains of operation and privacy
Module 4: Identity validation
Module 5: Practical Threat Modelling for Everyday Users
Module 6: Operating System Trust and Hardening

Each module combines short readings, interactive examples, and a 10-question knowledge quiz to reinforce learning.

Assessment and Certification

Format: Multiple-choice quizzes

Passing Score: 100% minimum

Attempts Allowed: Unlimited

Certificate: Cybersecurity Fundamentals 103 Completion Badge

(valid for 12 months

Cybersecurity Fundamentals 102 provides an expanded, comprehensive supplement to the essential principles of workplace information security.
This course is designed for all employees — technical and non-technical alike — to build a strong foundation in protecting digital systems, company data, and personal information against today’s most common cyber threats.

Through interactive modules, practical examples, and knowledge checks, participants will learn to identify risks, practise secure digital habits, and contribute to a resilient security culture within the organization.
The training aligns with the company’s Information Security and Acceptable Use Policies, supporting compliance with privacy standards such as PIPEDA and internal data handling procedures.

Learning Outcomes

By the end of this course, participants will be able to:

Explain the importance of expanded / enhanced cybersecurity in the workplace and their role in maintaining it.

Recognize how software licensing can be predatory

Recognize how privacy policies can be predatory

Clauses to watch out for / question

Understand what kind of data is acceptable for a software to collect

Course Structure

Module 1: Introduction to Expanded Cybersecurity
Module 2: Understanding Software Licensing
Module 3: Understanding Privacy Policies
Module 4: Understanding Telemetry / Analytic Overreach

Each module combines short readings, interactive examples, and a knowledge quiz to reinforce learning.

Assessment and Certification

Format: Multiple-choice quizzes

Passing Score: 100% minimum

Attempts Allowed: Unlimited

Certificate: Cybersecurity Fundamentals 102 Completion Badge

(valid for 12 months

Cybersecurity Fundamentals 101 provides a comprehensive introduction to the essential principles of workplace information security.
This course is designed for all employees — technical and non-technical alike — to build a strong foundation in protecting digital systems, company data, and personal information against today’s most common cyber threats.

Through interactive modules, practical examples, and knowledge checks, participants will learn to identify risks, practise secure digital habits, and contribute to a resilient security culture within the organization.
The training aligns with the company’s Information Security and Acceptable Use Policies, supporting compliance with privacy standards such as PIPEDA and internal data handling procedures.

Learning Outcomes

By the end of this course, participants will be able to:

Explain the importance of cybersecurity in the workplace and their role in maintaining it.

Recognize and respond appropriately to common threats such as phishing, malware, ransomware, and social engineering.

Apply strong password and multifactor authentication practices.

Safely use company devices, networks, and cloud platforms in compliance with security policies.

Identify and report suspicious activities or incidents promptly and correctly.

Understand the fundamentals of data privacy, protection, and responsible handling of sensitive information.

Course Structure

Module 1: Introduction to Cybersecurity
Module 2: Common Cyber Threats
Module 3: Common Communication and Content Threats
Module 4: Safe Devices and Workstation Practices
Module 5: Social Media Awareness

Each module combines short readings, interactive examples, and a 10-question knowledge quiz to reinforce learning.

Assessment and Certification

Format: Multiple-choice quizzes

Passing Score: 100% minimum

Attempts Allowed: Unlimited

Certificate: Cybersecurity Fundamentals 101 Completion Badge

(valid for 12 months)

Completion of this course is mandatory for all personnel and serves as a prerequisite for Cybersecurity Fundamentals 102 and 103.

This course provides staff with practical, role-based knowledge of our Disaster Recovery (DR) approach for a cloud-first SaaS organization using Microsoft Azure. Learners will review DR governance, recovery targets (RTO/RPO), backup and restore expectations, technical recovery procedures, validation and testing, and communications practices. Each module includes guided reading pages and a knowledge check to confirm comprehension.

Audience

  • Technical / IT Leads (primary)

  • Engineering, Operations, Security, and Service Management (secondary)

  • Leadership stakeholders who may participate in communications or decision-making

Completion Criteria

  • Review all pages in each module

  • Pass each module quiz (recommended pass mark: 80%)

This course provides a structured, practical introduction to the organization’s Business Continuity Management System (BCMS) and what it means for day-to-day operations in a cloud-first SaaS environment. Learners will build a clear understanding of why continuity planning matters, how disruptions are managed, and what is expected of staff during incidents that impact critical services.

The course follows the BCMS document set section-by-section (BCMS-01 through BCMS-06, plus key appendices). Each section includes short learning pages that explain the intent of the BCMS requirements, the rationale behind them, and how they apply in real operational scenarios—including cloud service dependencies, third-party vendor impacts, and communications discipline. Learners then complete a knowledge check using multiple-choice and true/false questions drawn from an expanded question bank to reinforce understanding and reduce memorisation.

This course is designed for all staff, with role-relevant emphasis for managers and Technical / IT Leads. It supports consistent organisational behaviour during disruptions by clarifying escalation paths, decision authority, recovery priorities (including RTO/RPO concepts), and the importance of exercising, evidence capture, and continual improvement.

Learning Outcomes
By the end of this course, learners will be able to:

  • Explain the purpose, scope, and key commitments of the BCMS and how it supports customer and business outcomes.

  • Distinguish business continuity from disaster recovery and understand how both fit into disruption response.

  • Identify critical services and dependencies at a high level, and describe why RTO and RPO targets matter.

  • Follow expected escalation and communications practices, including the use of approved channels and a single source of truth.

  • Describe the governance and document control approach that keeps plans current and usable.

  • Explain how continuity strategies, backups/restores, and third-party planning support recovery objectives.

  • Describe the purpose and types of exercises/tests, how results are recorded, and how corrective actions are tracked to closure.

Target Audience
All staff and contractors who support operations, delivery, support, engineering, security, or communications. Content includes additional operational context relevant to managers and Technical / IT Leads.

Estimated Duration
Approximately 2–3 hours total, depending on learner pace and quiz attempts.

Assessment
A short quiz follows each section, drawing random questions from a larger bank. A passing score is required for completion.

This course provides a comprehensive overview of commonly used computer and Internet terminology, designed to help learners develop a strong foundation in digital literacy. Students will explore essential terms and concepts used in everyday computing, web browsing, networking, and data management.

Through clear explanations and practical examples, participants will learn the language of modern technology — from understanding hardware and software basics to interpreting Internet protocols, web technologies, data security, and analytics. The course demystifies technical jargon, empowering learners to communicate confidently in both personal and professional digital environments.

Topics Covered:

  • Common computing concepts and components (hardware, software, operating systems)

  • Internet and browser terminology (URLs, cookies, cache, downloads, and web standards)

  • Networking fundamentals (IP addresses, MAC addresses, DNS, and routers)

  • Cloud computing, data storage, and online collaboration tools

  • Cybersecurity basics and privacy terminology

  • Website interaction, tracking, and analytics vocabulary

  • Emerging technology terms (AI, IoT, blockchain, etc.)

Learning Outcomes:

By the end of this course, learners will be able to:

  1. Define and explain key computer and Internet terms.

  2. Recognize and describe how computing and networking components interact.

  3. Apply digital terminology accurately in communication and documentation.

  4. Navigate online environments with improved confidence and understanding.