.png)
Cybersecurity 101 Workshop Course

Upcoming courses
Course Description
This intensive 8-hour workshop takes a practical, hands-on approach to cybersecurity training for business professionals. Rather than overwhelming participants with technical jargon and abstract concepts, the training focuses on building confidence through interactive exercises and real-world scenarios, based on our existing awareness of security. Participants will develop a security mindset that transforms complex cybersecurity challenges into manageable, actionable steps.
The workshop focuses on immediately applicable skills rather than theoretical knowledge. By the end of the day, participants will have created an incident response plan with clear contacts and procedures, a documented IT asset inventory, a system priority assessment, and a customized communication plan for their organization.
The facilitator guides participants through collaborative problem-solving exercises and real-world scenarios, whether participants come from IT, operations, or executive roles. The emphasis is on practical outcomes and giving participants the confidence to take their first steps in strengthening their organization's security posture.
Key Concepts
Participants will learn about essential cybersecurity foundations through practical application:
- Incident Response Planning - The 6 critical questions framework for cyber emergencies
- Asset Inventory - Mapping and protecting your digital territory
- CIA Triad Assessment - Time-based impact analysis (Confidentiality, Integrity, Availability)
- Threat Modelling - Identifying relevant cyber threat actors and attack vectors
- Emergency Communications - Building contact networks and notification procedures
Agenda
- Welcome & Cybersecurity Reality Check - "You Already Know This" security mindset
- Building Your Incident Response Plan - The 6 critical questions framework
- Know What You're Protecting - IT scope, documentation and asset inventory
- CIA Impact Assessment - Understanding what matters most with time-based prioritization
- Contacts & Communication - Emergency response networks and stakeholder management
- Cyber Detective Skills - Learning to ask the right questions and identify threats
- Resources, Next Steps & Commitment - Ongoing support and accountability partnerships
Prerequisites
- No prior cybersecurity experience required
- Basic familiarity with business computer systems (email, file storage, etc.)
- Willingness to participate in hands-on exercises and group discussions
- Authority or influence over organizational security decisions (recommended)
Who it's for
- Business owners and executives seeking practical cybersecurity knowledge
- IT managers and professionals transitioning into security roles
- Operations managers responsible for business continuity
- Anyone tasked with improving their organization's security posture
- Teams looking to build a common security language and baseline understanding
- Organizations beginning their cybersecurity transformation journey
Benefits
- Immediate Practical Value: Leave with an incident response plan structure you can implement starting day one, including IT asset inventory, stakeholder identification, system priority matrix, and timely communication plans.
- Confidence Building: Transform overwhelming cybersecurity concepts into manageable, familiar challenges by applying your existing security instincts to digital environments.
- Cost-Effective Security: Learn to prioritize security investments based on your specific risk profile, focusing resources where they'll have the greatest impact rather than expensive one-size-fits-all solutions.
- Team Alignment: Develop a shared security vocabulary and baseline understanding across departments, improving collaboration between technical and non-technical team members.
- Ongoing Support: Establish accountability partnerships with other participants and receive guidance on Canadian cybersecurity resources for continued learning and implementation.