Learning catalogue
Browse the School's full catalogue of courses, events, programs and other learning tools. For recommended learning by theme or community, view our Learning paths.
Filter by
Skip to search resultsGC Cloud for Managers and Executives Learning Path
The GC Cloud for Managers and Executives learning path was designed to give public service managers and executives the necessary foundation to support the Government of Canada’s transition to cloud computing as part of their respective organizational mandates. Modules in the learning path include core content and opportunities to apply new learning.
Information Management Awareness Quiz
This online self-paced quiz evaluates the participant's knowledge of essential information management principles and best practices. Participants will be able to assess their ability to properly manage information and data resources commonly used in their work environment.
Introduction to IT Security Management
This online self-paced course provides an overview of common IT security program activities in the Government of Canada and introduces the legal, policy, business and threat contexts for IT security. By gaining a renewed appreciation for the IT security context and program activities, participants will be better able to support IT security priorities across the Government of Canada.
IT Security Fundamentals for IT Practitioners
This online self-paced course offers an overview of information technology (IT) security policies, processes and procedures relevant to the role of IT practitioners in the federal public service. Participants will gain a foundational understanding of IT security that can be adapted to organizational contexts across the Government of Canada.
Network Security Threats and Their Impact
This online self-paced course investigates the most common types of network security threats, including how to prevent them and how to detect them if your system is breached. Participants will learn about the importance of stopping hackers from accessing vital data by addressing system weaknesses that can be exploited by potential attackers.