Online Course

Introduction to Data Security

Confidential information is all around us, and knowing how to protect it is more important than ever.

Module 1: What Is Confidential Data?

This module defines what types of workplace information are confidential and explains the difference between confidentiality and privacy. You’ll learn why protecting sensitive data is crucial and explore strategies to keep it secure in different work situations.

 

Module 2: How to Protect Confidential Information

This module teaches you to identify confidential information relevant to your role and apply best practices to safeguard it. You’ll learn how to limit access, secure storage, communicate safely, maintain device security, and stay aware through training. The module also covers common risks that lead to breaches and the steps to take if confidentiality is compromised.

 

Module 3: Passwords

This section highlights the importance of strong passwords in protecting your personal and professional information from cyber threats. You’ll discover how weak passwords raise the risk of fraud and identity theft, and receive practical tips to create strong, resilient passwords that you can implement immediately.

 

Module 4: Multifactor Authentication

Learn about multifactor authentication (MFA), a crucial security process that adds extra layers of protection beyond just a username and password. You’ll learn the different types available and why enabling it is essential.

 

Module 5: Portable Devices and Removable Media

Portable devices like smartphones and tablets, along with removable media such as USB drives and SD cards, often have weaker security protections and pose unique risks. Learn about these vulnerabilities and discover ten practical tips to keep your devices and information secure.

 

Module 6: Physical Security

Learn the essentials of physical security, focusing on protecting people, property, and information from both intentional and unintentional threats. This module covers key security measures and clarifies the shared responsibilities between organizations and individuals to maintain a safe and secure environment.

 

Module 7: Privacy Impact Assessments

This module explains what a Privacy Impact Assessment (PIA) is, when it is required, who should conduct it, and the importance of ongoing monitoring and updates to protect privacy and comply with legal requirements.

Get Started

Regular Price:
$99

EP Member Price:

25% Off
Course Length:
4 Hours
Career Stage:
All Career Stages

Not yet an EP Member?

Click here to learn more!

Reconnaissance des terres

Dans un esprit de respect, de réciprocité et de vérité, nous honorons et reconnaissons Moh’kinsstis, le territoire traditionnel du Traité 7 et les pratiques orales de la confédération des Pieds-Noirs : Siksika, Kainai, Piikani, ainsi que les nations Îyâxe Nakoda et Tsuut’ina. Nous reconnaissons que ce territoire abrite la Nation métisse de l’Alberta, la région 3 au sein de la patrie historique des Métis du Nord-Ouest. Enfin, nous reconnaissons toutes les nations qui vivent, travaillent et se divertissent sur ce territoire, et qui l’honorent et le célèbrent.

Land Acknowledgment

In the spirit of respect, reciprocity and truth, we honour and acknowledge Moh’kinsstis and the traditional Treaty 7 territory and oral practices of the Blackfoot confederacy: Siksika, Kainai, Piikani, as well as the Îyâxe Nakoda and Tsuut’ina nations. We acknowledge that this territory is home to the Métis Nation of Alberta, Region 3, within the historical Northwest Métis homeland. Finally, we recognize all Nations who live, work and play on this land and honour and celebrate this territory.