[section bg_color=”#59b549″ padding=”0px” video_visibility=”hide-for-small” class=”fixed-page-nav” visibility=”hide-for-medium”]

[row h_align=”center”]

[col span__sm=”12″ margin=”0px 0px -30px 0px”]

[ux_stack direction__sm=”row” distribute=”center” align=”center” gap=”5″ gap__sm=”1″ gap__md=”2.5″]

[button text=”Cybereco Resources” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#cybereco”]

[button text=”Cybertalents” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#cybertalent”]

[button text=”Cyberinclusive” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#cyberinclusive”]

[button text=”Organisations” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#organisations”]

[button text=”Cybersecurity Programs” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#cybersecurity programs”]

[button text=”Certifications” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#certifications”]

[/ux_stack]

[/col]

[/row]

[/section]
[section bg_color=”#59b549″ padding=”60px” margin=”-30px” class=”over-page-nav”]

[row]

[col span__sm=”12″ margin=”0px 0px -60px 0px” align=”center”]

[ux_text text_color=”rgb(0, 55, 70)”]

Resources

[/ux_text]

[/col]

[/row]

[/section]
[section bg_color=”#003746″ padding=”0px” video_visibility=”hide-for-small” class=”over-page-nav” visibility=”hide-for-medium”]

[row h_align=”center”]

[col span=”11″ span__sm=”12″ bg_color=”#003746″ bg_radius=”100″]

[ux_stack distribute=”center” align=”center” gap=”3″]

[button text=”Cybereco Resources” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#cybereco”]

[button text=”Cybertalents” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#cybertalent”]

[button text=”Cyberinclusive” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#cyberinclusive”]

[button text=”Organisations” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#organisations”]

[button text=”Cybersecurity Programs” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#cybersecurity programs”]

[button text=”Certifications” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#certifications”]

[/ux_stack]

[/col]

[/row]

[/section]
[scroll_to title=”Cybereco” bullet=”false”]

[section bg_color=”#003746″ dark=”true” padding=”60px”]

[row]

[col span__sm=”12″]

CYBERECO RESOURCES

[accordion]

[accordion-item title=”Practical guide on the application of the Act 25″]

[row_inner]

[col_inner span=”8″ span__sm=”12″]

[ux_text font_size=”1.85″]

[/ux_text]

[/col_inner]
[col_inner span=”4″ span__sm=”12″]

[ux_text font_size=”1″ line_height=”1.05″]

Presentation of the guide at the 2022 Cyberconference;

[/ux_text]
[ux_video url=”https://youtu.be/4W4TQXnei1M”]

[/col_inner]

[/row_inner]

[/accordion-item]
[accordion-item title=”Cybereco cybersecurity survey”]

[/accordion-item]
[accordion-item title=”Guide on cyberinsurance”]

[/accordion-item]
[accordion-item title=”Guide on incident management”]

[/accordion-item]

[/accordion]

[/col]
[col span__sm=”12″ visibility=”hidden”]

[accordion]

[accordion-item title=”Guide on cyberinsurance”]

[/accordion-item]
[accordion-item title=”Guide on incident management”]

[/accordion-item]

[/accordion]

[/col]

[/row]

[/section]
[scroll_to title=”#cybertalent”]

[section]

[row]

[col span__sm=”12″]

[ux_text font_size=”1″]

Cybertalents

As part of the Cybertalent project, Cybereco presents a series of video clips to present the different careers and backgrounds of professionals in the field of cybersecurity. From ethical hackers to BISO (Business Information Security Officers), the profiles presented in these videos are varied and inspiring. They highlight the diversity of skills, backgrounds, and passions that drive the world of cybersecurity.

Each capsule offers a unique insight into a professional’s journey, the challenges they face, as well as advice for those who would like to follow a similar path. So, whether you are a curious student, a professional in retraining, or simply a technology enthusiast, these capsules are made to enlighten and inspire you.

[/ux_text]

[/col]

[/row]
[row]

[col span__sm=”12″]

[ux_slider hide_nav=”true”]

[row_inner]

[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/rFy_iaRZj0Q”]

[/col_inner]
[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/BNUKEfe_X3k”]

[/col_inner]
[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/0JTzVflb-GY”]

[/col_inner]

[/row_inner]
[row_inner]

[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/p3ua6labqgQ”]

[/col_inner]
[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/t73c5bn6Eq8″]

[/col_inner]
[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/PcfUiK5DtPs”]

[/col_inner]

[/row_inner]
[row_inner]

[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/HnTPd62TWug”]

[/col_inner]
[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/HQQSzOVGcSg”]

[/col_inner]
[col_inner span=”4″ span__sm=”12″]

[ux_video url=”https://youtu.be/F4F9oUel3mk”]

[/col_inner]

[/row_inner]

[/ux_slider]

[/col]

[/row]

[/section]
[scroll_to title=”Cyberinclusif” bullet=”false”]

[section bg_color=”#003746″ padding=”60px”]

[row]

[col span__sm=”12″]

[ux_text font_size=”1″ text_color=”rgb(255,255,255)”]

Cyberinclusive

Cybereco has started an initiative to increase the visibility of women and other communities in the field of cyber security. It has two components: attraction and awareness of talent from these groups. It includes a mentoring programme and a round table aimed at women, as well as activities aimed at other communities organised in partnership with other organisations working with the targeted communities.

[/ux_text]

[/col]

[/row]
[row]

[col span=”8″ span__sm=”12″]

[ux_text font_size=”1″ text_color=”rgb(255,255,255)”]

Mentorship Program for Women in Cyber

Launched at the Cyberconference 2022, Cybereco’s Women in Cyber Mentorship Program is an opportunity for women working in the field of cybersecurity in Quebec to develop their professional network, increase their knowledge and hone their leadership skills. The mentorship program aims to support and promote women in cybersecurity and to empower the next generation of cybersecurity professionals.

This program is open to female students (CEGEP, University) and early career professionals in cybersecurity and related fields who wish to take advantage of this opportunity to be mentored by an experienced professional in order to learn more about the field and increase their professional network.

[/ux_text]

[/col]
[col span=”4″ span__sm=”12″ padding=”80px 0px 0px 0px”]

[button text=”See the event” style=”underline” icon=”icon-angle-right” target=”_blank” visibility=”hidden”]

[button text=”For more information, contact us” size=”xsmall” radius=”81″ icon=”icon-envelop” link=”mailto:infomentorat@cybereco.ca” target=”_blank”]

[/col]

[/row]

[/section]
[scroll_to title=”Organismes” bullet=”false”]

[section]

[row]

[col span__sm=”12″]

[ux_text text_color=”#003746″]

REFERENCE ORGANISATIONS

Are you looking for reference sources in cybersecurity?

Here are some relevant organizations.

[/ux_text]

[/col]

[/row]

[/section]
[section bg_color=”rgb(255,255,255)” padding=”60px”]

[row]

[col span__sm=”12″]

[row_inner]

[col_inner span__sm=”12″]

[ux_slider infinitive=”false” draggable=”false” hide_nav=”true” nav_pos=”outside” nav_style=”simple” nav_color=”dark” bullets=”false”]

[logo img=”2882″ hover=”zoom” height=”70px” link=”https://cyber.gc.ca/fr” target=”_blank”]

[logo img=”2885″ hover=”zoom” height=”70px” link=”https://www.cisecurity.org/” target=”_blank”]

[logo img=”2888″ hover=”zoom” height=”70px” link=”https://www.isaca.org/” target=”_blank”]

[logo img=”2891″ hover=”zoom” height=”70px” link=”https://www.isc2.org/” target=”_blank”]

[logo img=”2894″ hover=”zoom” link=”https://www.nist.gov/” target=”_blank”]

[logo img=”2897″ hover=”zoom” link=”https://owasp.org/”]

[logo img=”2900″ hover=”zoom” link=”https://www.sans.org/”]

[logo img=”2903″ hover=”zoom” link=”https://www.iso.org/home.html”]

[/ux_slider]

[/col_inner]

[/row_inner]

[/col]

[/row]

[/section]
[scroll_to title=”Formations” bullet=”false”]

[section bg_color=”#003746″ dark=”true” padding=”60px”]

[row]

[col span__sm=”12″]

CYBERSECURITY PROGRAMS

Are you interested in a career in cybersecurity but don’t know where to start?

Whether you’re looking to change your career path or determine the right educational path to your dream job, you’ll find in this directory the various cybersecurity programs offered in Quebec. What they have in common is that they will allow you to develop skills that are highly sought after in the job market.

[/col]
[col span=”6″ span__sm=”12″]

[accordion title=”College Programs”]

[accordion-item title=”Gatineau”]

[ux_text font_size=”1.25″]

CÉGEP DE L’OUTAOUAIS

HERITAGE COLLEGE

[/ux_text]

[/accordion-item]
[accordion-item title=”Laval”]

[ux_text font_size=”1.25″]

COLLÈGE MONTMORENCY

[/ux_text]

[/accordion-item]
[accordion-item title=”Montreal”]

[ux_text font_size=”1.25″]

COLLÈGE AHUNSTIC

COLLÈGE CDI

COLLÈGE DE BOIS-DE-BOULOGNE

COLLÈGE DE MAISONNEUVE

COLLÈGE ROSEMONT

INSTITUT SUPÉRIEUR D’INFORMATIQUE

Collège Lasalle

KENSLEY COLLEGE

[/ux_text]

[/accordion-item]
[accordion-item title=”Québec”]

[ux_text font_size=”1.25″]

CÉGEP GARNEAU


CÉGEP LIMOILOU

[/ux_text]

[/accordion-item]
[accordion-item title=”Saint-Hyacinthe”]

[ux_text font_size=”1.25″]

CÉGEP DE SAINT-HYACINTHE

[/ux_text]

[/accordion-item]
[accordion-item title=”Sherbrooke”]

[ux_text font_size=”1.25″]

CÉGEP DE SHERBROOKE

[/ux_text]

[/accordion-item]
[accordion-item title=”Saint-Jean-Sur-Richelieu”]

[ux_text font_size=”1.25″]

CÉGEP SAINT-JEAN-SUR-RICHELIEU

[/ux_text]

[/accordion-item]
[accordion-item title=”Sainte-Thérèse”]

[ux_text font_size=”1.25″]

COLLÈGE LIONEL-GROULX

[/ux_text]

[/accordion-item]

[/accordion]

[/col]
[col span=”6″ span__sm=”12″]

[accordion title=”University programs”]

[accordion-item title=”ÉTS” class=”featured”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”Polytechnique Montréal” class=”featured”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”Université de Montréal” class=”featured”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”Université de Sherbrooke” class=”featured”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”Université du Québec à Chicoutimi” class=”featured”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”Université du Québec en Outaouais” class=”featured”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”Université Laval” class=”featured”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”McGill University” class=”featured”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”Concordia”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]
[accordion-item title=”HEC Montréal”]

[ux_text font_size=”1.5″]

[/ux_text]

[/accordion-item]

[/accordion]

[/col]
[col span__sm=”12″ align=”center”]

[button text=”Discover also all the academic programs offered in Canada identified by the Canadian Centre for Cyber Security!” size=”xsmall” radius=”99″ expand=”0″ link=”https://cyber.gc.ca/fr/orientation/annexe-b-programmes-postsecondaires-lies-la-cybersecurite” target=”_blank”]

[/col]

[/row]

[/section]
[scroll_to title=”Certifications” bullet=”false”]

[section bg_color=”rgb(255,255,255)” padding=”60px”]

[row]

[col span__sm=”12″]

CERTIFICATIONS

Are you looking to improve your skills in the field or to obtain specific competencies?

Check out the following list to find out which certifications are right for you

[/col]
[col span=”6″ span__sm=”12″]

[accordion]

[accordion-item title=”ISACA”]

[ux_text font_size=”1.25″]

[/ux_text]

[/accordion-item]
[accordion-item title=”COMPTIA”]

[ux_text font_size=”1.25″]

[/ux_text]

[/accordion-item]
[accordion-item title=”ISC2″]

[ux_text font_size=”1.25″]

[/ux_text]

[/accordion-item]
[accordion-item title=”OFFENSIVE SECURITY”]

[ux_text font_size=”1.25″]

[/ux_text]

[/accordion-item]

[/accordion]

[/col]
[col span=”6″ span__sm=”12″]

[accordion]

[accordion-item title=”ASIS INTERNATIONAL”]

[ux_text font_size=”1.25″]

[/ux_text]

[/accordion-item]
[accordion-item title=”EC-COUNCIL”]

[ux_text font_size=”1.25″]

[/ux_text]

[/accordion-item]
[accordion-item title=”SANS GIAC”]

[ux_text font_size=”1.25″]

[/ux_text]

[/accordion-item]

[/accordion]

[/col]

[/row]

[/section]

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.