[section bg_color=”#59b549″ padding=”0px” video_visibility=”hide-for-small” class=”fixed-page-nav” visibility=”hide-for-medium”]
[row h_align=”center”]
[col span__sm=”12″ margin=”0px 0px -30px 0px”]
[ux_stack direction__sm=”row” distribute=”center” align=”center” gap=”5″ gap__sm=”1″ gap__md=”2.5″]
[button text=”Cybereco Resources” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#cybereco”]
[button text=”Cybertalents” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#cybertalent”]
[button text=”Cyberinclusive” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#cyberinclusive”]
[button text=”Organisations” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#organisations”]
[button text=”Cybersecurity Programs” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#cybersecurity programs”]
[button text=”Certifications” letter_case=”lowercase” color=”secondary” style=”underline” size=”small” link=”#certifications”]
[/ux_stack]
[/col]
[/row]
[/section]
[section bg_color=”#59b549″ padding=”60px” margin=”-30px” class=”over-page-nav”]
[row]
[col span__sm=”12″ margin=”0px 0px -60px 0px” align=”center”]
[ux_text text_color=”rgb(0, 55, 70)”]
Resources
[/ux_text]
[/col]
[/row]
[/section]
[section bg_color=”#003746″ padding=”0px” video_visibility=”hide-for-small” class=”over-page-nav” visibility=”hide-for-medium”]
[row h_align=”center”]
[col span=”11″ span__sm=”12″ bg_color=”#003746″ bg_radius=”100″]
[ux_stack distribute=”center” align=”center” gap=”3″]
[button text=”Cybereco Resources” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#cybereco”]
[button text=”Cybertalents” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#cybertalent”]
[button text=”Cyberinclusive” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#cyberinclusive”]
[button text=”Organisations” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#organisations”]
[button text=”Cybersecurity Programs” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#cybersecurity programs”]
[button text=”Certifications” letter_case=”lowercase” color=”white” style=”underline” size=”small” link=”#certifications”]
[/ux_stack]
[/col]
[/row]
[/section]
[scroll_to title=”Cybereco” bullet=”false”]
[section bg_color=”#003746″ dark=”true” padding=”60px”]
[row]
[col span__sm=”12″]
CYBERECO RESOURCES
[accordion]
[accordion-item title=”Practical guide on the application of the Act 25″]
[row_inner]
[col_inner span=”8″ span__sm=”12″]
[ux_text font_size=”1.85″]
- Guide on Act 25 (PDF)
- Form for the delegation of the function of Privacy Officer
- Confidentiality incident Log
- Third-party management appendix
[/ux_text]
[/col_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_text font_size=”1″ line_height=”1.05″]
Presentation of the guide at the 2022 Cyberconference;
[/ux_text]
[ux_video url=”https://youtu.be/4W4TQXnei1M”]
[/col_inner]
[/row_inner]
[/accordion-item]
[accordion-item title=”Cybereco cybersecurity survey”]
- Cybereco cybersecurity survey (PDF – French only)
- Presentation of the survey at the Cyberconference 2022
[/accordion-item]
[accordion-item title=”Guide on cyberinsurance”]
[/accordion-item]
[accordion-item title=”Guide on incident management”]
[/accordion-item]
[/accordion]
[/col]
[col span__sm=”12″ visibility=”hidden”]
[accordion]
[accordion-item title=”Guide on cyberinsurance”]
[/accordion-item]
[accordion-item title=”Guide on incident management”]
[/accordion-item]
[/accordion]
[/col]
[/row]
[/section]
[scroll_to title=”#cybertalent”]
[section]
[row]
[col span__sm=”12″]
[ux_text font_size=”1″]
Cybertalents
As part of the Cybertalent project, Cybereco presents a series of video clips to present the different careers and backgrounds of professionals in the field of cybersecurity. From ethical hackers to BISO (Business Information Security Officers), the profiles presented in these videos are varied and inspiring. They highlight the diversity of skills, backgrounds, and passions that drive the world of cybersecurity.
Each capsule offers a unique insight into a professional’s journey, the challenges they face, as well as advice for those who would like to follow a similar path. So, whether you are a curious student, a professional in retraining, or simply a technology enthusiast, these capsules are made to enlighten and inspire you.
[/ux_text]
[/col]
[/row]
[row]
[col span__sm=”12″]
[ux_slider hide_nav=”true”]
[row_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/rFy_iaRZj0Q”]
[/col_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/BNUKEfe_X3k”]
[/col_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/0JTzVflb-GY”]
[/col_inner]
[/row_inner]
[row_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/p3ua6labqgQ”]
[/col_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/t73c5bn6Eq8″]
[/col_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/PcfUiK5DtPs”]
[/col_inner]
[/row_inner]
[row_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/HnTPd62TWug”]
[/col_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/HQQSzOVGcSg”]
[/col_inner]
[col_inner span=”4″ span__sm=”12″]
[ux_video url=”https://youtu.be/F4F9oUel3mk”]
[/col_inner]
[/row_inner]
[/ux_slider]
[/col]
[/row]
[/section]
[scroll_to title=”Cyberinclusif” bullet=”false”]
[section bg_color=”#003746″ padding=”60px”]
[row]
[col span__sm=”12″]
[ux_text font_size=”1″ text_color=”rgb(255,255,255)”]
Cyberinclusive
Cybereco has started an initiative to increase the visibility of women and other communities in the field of cyber security. It has two components: attraction and awareness of talent from these groups. It includes a mentoring programme and a round table aimed at women, as well as activities aimed at other communities organised in partnership with other organisations working with the targeted communities.
[/ux_text]
[/col]
[/row]
[row]
[col span=”8″ span__sm=”12″]
[ux_text font_size=”1″ text_color=”rgb(255,255,255)”]
Mentorship Program for Women in Cyber
Launched at the Cyberconference 2022, Cybereco’s Women in Cyber Mentorship Program is an opportunity for women working in the field of cybersecurity in Quebec to develop their professional network, increase their knowledge and hone their leadership skills. The mentorship program aims to support and promote women in cybersecurity and to empower the next generation of cybersecurity professionals.
This program is open to female students (CEGEP, University) and early career professionals in cybersecurity and related fields who wish to take advantage of this opportunity to be mentored by an experienced professional in order to learn more about the field and increase their professional network.
[/ux_text]
[/col]
[col span=”4″ span__sm=”12″ padding=”80px 0px 0px 0px”]
[button text=”See the event” style=”underline” icon=”icon-angle-right” target=”_blank” visibility=”hidden”]
[button text=”For more information, contact us” size=”xsmall” radius=”81″ icon=”icon-envelop” link=”mailto:infomentorat@cybereco.ca” target=”_blank”]
[/col]
[/row]
[/section]
[scroll_to title=”Organismes” bullet=”false”]
[section]
[row]
[col span__sm=”12″]
[ux_text text_color=”#003746″]
REFERENCE ORGANISATIONS
Are you looking for reference sources in cybersecurity?
Here are some relevant organizations.
[/ux_text]
[/col]
[/row]
[/section]
[section bg_color=”rgb(255,255,255)” padding=”60px”]
[row]
[col span__sm=”12″]
[row_inner]
[col_inner span__sm=”12″]
[ux_slider infinitive=”false” draggable=”false” hide_nav=”true” nav_pos=”outside” nav_style=”simple” nav_color=”dark” bullets=”false”]
[logo img=”2882″ hover=”zoom” height=”70px” link=”https://cyber.gc.ca/fr” target=”_blank”]
[logo img=”2885″ hover=”zoom” height=”70px” link=”https://www.cisecurity.org/” target=”_blank”]
[logo img=”2888″ hover=”zoom” height=”70px” link=”https://www.isaca.org/” target=”_blank”]
[logo img=”2891″ hover=”zoom” height=”70px” link=”https://www.isc2.org/” target=”_blank”]
[logo img=”2894″ hover=”zoom” link=”https://www.nist.gov/” target=”_blank”]
[logo img=”2897″ hover=”zoom” link=”https://owasp.org/”]
[logo img=”2900″ hover=”zoom” link=”https://www.sans.org/”]
[logo img=”2903″ hover=”zoom” link=”https://www.iso.org/home.html”]
[/ux_slider]
[/col_inner]
[/row_inner]
[/col]
[/row]
[/section]
[scroll_to title=”Formations” bullet=”false”]
[section bg_color=”#003746″ dark=”true” padding=”60px”]
[row]
[col span__sm=”12″]
CYBERSECURITY PROGRAMS
Are you interested in a career in cybersecurity but don’t know where to start?
Whether you’re looking to change your career path or determine the right educational path to your dream job, you’ll find in this directory the various cybersecurity programs offered in Quebec. What they have in common is that they will allow you to develop skills that are highly sought after in the job market.
[/col]
[col span=”6″ span__sm=”12″]
[accordion title=”College Programs”]
[accordion-item title=”Gatineau”]
[ux_text font_size=”1.25″]
CÉGEP DE L’OUTAOUAIS
- Techniques de l’informatique – PROGRAMMATION ET SÉCURITÉ (DEC technique)
- Techniques de l’informatique – RÉSEAUX ET CYBERSÉCURITÉ (DEC technique)
HERITAGE COLLEGE
[/ux_text]
[/accordion-item]
[accordion-item title=”Laval”]
[ux_text font_size=”1.25″]
COLLÈGE MONTMORENCY
- Techniques de l’informatique – Spécialisation : Réseaux et sécurité informatiques (DEC technique)
- Prévention et intervention en cybersécurité (AEC)
- Cybersécurité : Protection et Défense – LEA.EE (AEC)
[/ux_text]
[/accordion-item]
[accordion-item title=”Montreal”]
[ux_text font_size=”1.25″]
COLLÈGE AHUNSTIC
- Réseautique et sécurité informatique (AEC)
- Techniques de l’informatique – Profil réseaux et sécurité (DEC technique)
COLLÈGE CDI
COLLÈGE DE BOIS-DE-BOULOGNE
- Infrastructure informatique et cybersécurité (Formation continue)
- Techniques de l’informatique – Profil Infrastructures et sécurité (DEC technique)
COLLÈGE DE MAISONNEUVE
- Gestion de réseaux et sécurité des systèmes (AEC)
- Techniques de l’informatique – Infrastructure et sécurité des réseaux (DEC technique)
COLLÈGE ROSEMONT
- Microprogramme de perfectionnement en sécurité des réseaux (AEC)
- Techniques de l’informatique – Profil réseautique : sécurité et virtualisation (DEC technique)
INSTITUT SUPÉRIEUR D’INFORMATIQUE
- Réseaux Informatiques et Sécurité (DEC technique)
Collège Lasalle
KENSLEY COLLEGE
[/ux_text]
[/accordion-item]
[accordion-item title=”Québec”]
[ux_text font_size=”1.25″]
CÉGEP GARNEAU
- Cyberenquête (AEC)
- Cybsersécurité (Certification collégiale)
CÉGEP LIMOILOU
- Techniques de l’informatique – Gestion des réseaux (DEC technique)
[/ux_text]
[/accordion-item]
[accordion-item title=”Saint-Hyacinthe”]
[ux_text font_size=”1.25″]
CÉGEP DE SAINT-HYACINTHE
- Techniques de l’informatique – Réseaux et cybersécurité (DEC technique)
[/ux_text]
[/accordion-item]
[accordion-item title=”Sherbrooke”]
[ux_text font_size=”1.25″]
CÉGEP DE SHERBROOKE
[/ux_text]
[/accordion-item]
[accordion-item title=”Saint-Jean-Sur-Richelieu”]
[ux_text font_size=”1.25″]
CÉGEP SAINT-JEAN-SUR-RICHELIEU
[/ux_text]
[/accordion-item]
[accordion-item title=”Sainte-Thérèse”]
[ux_text font_size=”1.25″]
COLLÈGE LIONEL-GROULX
[/ux_text]
[/accordion-item]
[/accordion]
[/col]
[col span=”6″ span__sm=”12″]
[accordion title=”University programs”]
[accordion-item title=”ÉTS” class=”featured”]
[ux_text font_size=”1.5″]
- Baccalauréat en génie logiciel
- Baccalauréat en génie des technologies de l’information
- Maîtrise en technologies de l’information
- Maîtrise en génie logiciel
- DESS en technologies de l’information
- DESS en génie logiciel
- Programme court en technologies de l’information
[/ux_text]
[/accordion-item]
[accordion-item title=”Polytechnique Montréal” class=”featured”]
[ux_text font_size=”1.5″]
- Génie informatique – Option Cybersécurité (Maîtrise professionnelle)
- Cyberenquête (Certificat)
- Cyberfraude (Certificat)
- Cybersécurité des réseaux informatiques (Certificat)
- Cyberinvestigation (Microprogramme)
- Réseautique et sécurité (Microprogramme)
[/ux_text]
[/accordion-item]
[accordion-item title=”Université de Montréal” class=”featured”]
[ux_text font_size=”1.5″]
[/ux_text]
[/accordion-item]
[accordion-item title=”Université de Sherbrooke” class=”featured”]
[ux_text font_size=”1.5″]
- Maitrise en informatique – Cheminement en cybersécurité (Maitrise)
- Gouvernance, audit et sécurité des technologies de l’information (DESS)
- DESS de 2e cycle en sécurité informatique (DESS)
- Gouvernance, audit et sécurité des technologies de l’information (Microprogramme)
- Microprogramme de 2e cycle en sécurité informatique – volet prévention (Microprogramme)
- Microprogramme de 2e cycle en sécurité informatique – volet réaction (Microprogramme)
- École d’été en Cybersécurité
[/ux_text]
[/accordion-item]
[accordion-item title=”Université du Québec à Chicoutimi” class=”featured”]
[ux_text font_size=”1.5″]
- Maîtrise en informatique (cybersécurité) (Maîtrise)
- Mineure en cybersécurité défensive (Baccalauréat)
- Certificat en cybersécurité défensive (Certificat)
[/ux_text]
[/accordion-item]
[accordion-item title=”Université du Québec en Outaouais” class=”featured”]
[ux_text font_size=”1.5″]
-
Programme court en cybersécurité (Deuxième cycle)
-
Certificat en gouvernance et cybersécurité (Certificat)
-
Certificat en réseaux informatiques et cybersécurité (Certificat)
[/ux_text]
[/accordion-item]
[accordion-item title=”Université Laval” class=”featured”]
[ux_text font_size=”1.5″]
-
Microprogramme en administration des affaires – gouvernance de la sécurité de l’information (Deuxième Cycle)
-
Diplôme d’études supérieures spécialisées en audit des systèmes d’information (Deuxième Cycle)
[/ux_text]
[/accordion-item]
[accordion-item title=”McGill University” class=”featured”]
[ux_text font_size=”1.5″]
[/ux_text]
[/accordion-item]
[accordion-item title=”Concordia”]
[ux_text font_size=”1.5″]
- Information Systems Security (MASc) (Maîtrise)
- Information Systems Security (MEng) (Maîtrise)
- Cyber Resilience Diploma (Microprogramme)
[/ux_text]
[/accordion-item]
[accordion-item title=”HEC Montréal”]
[ux_text font_size=”1.5″]
[/ux_text]
[/accordion-item]
[/accordion]
[/col]
[col span__sm=”12″ align=”center”]
[button text=”Discover also all the academic programs offered in Canada identified by the Canadian Centre for Cyber Security!” size=”xsmall” radius=”99″ expand=”0″ link=”https://cyber.gc.ca/fr/orientation/annexe-b-programmes-postsecondaires-lies-la-cybersecurite” target=”_blank”]
[/col]
[/row]
[/section]
[scroll_to title=”Certifications” bullet=”false”]
[section bg_color=”rgb(255,255,255)” padding=”60px”]
[row]
[col span__sm=”12″]
CERTIFICATIONS
Are you looking to improve your skills in the field or to obtain specific competencies?
Check out the following list to find out which certifications are right for you
[/col]
[col span=”6″ span__sm=”12″]
[accordion]
[accordion-item title=”ISACA”]
[ux_text font_size=”1.25″]
- CISA – Certified Information Systems Auditor
- CISM – Certified Information Security Manager
- CRISC – Certified in Risk and Information Systems Control
- CGEIT – Certified in the Governance of Enterprise IT
[/ux_text]
[/accordion-item]
[accordion-item title=”COMPTIA”]
[ux_text font_size=”1.25″]
- Security+ – Security+
- CySA+ – CompTIA Cybersecurity Analyst
- CASP+ – CompTIA Advanced Security Practitioner
- PenTest+ –CompTIA PenTest+
[/ux_text]
[/accordion-item]
[accordion-item title=”ISC2″]
[ux_text font_size=”1.25″]
- CISSP – Certified Information Systems Security Professional
- SSCP – Systems Security Certified Practitioner
- CCSP – Certified Cloud Security Professional
[/ux_text]
[/accordion-item]
[accordion-item title=”OFFENSIVE SECURITY”]
[ux_text font_size=”1.25″]
[/ux_text]
[/accordion-item]
[/accordion]
[/col]
[col span=”6″ span__sm=”12″]
[accordion]
[accordion-item title=”ASIS INTERNATIONAL”]
[ux_text font_size=”1.25″]
[/ux_text]
[/accordion-item]
[accordion-item title=”EC-COUNCIL”]
[ux_text font_size=”1.25″]
- CND – Certified Network Defender
- CEH – Certified Ethical Hacker
- CTIA – Certified Threat Intelligence Analyst
- ECSA – EC-Council Certified Security Analyst
- ECIH – Certified Incident Handler
- CCISO – Certified Chief Information Security Officer
- CNDA – Certified Network Defense Architect
- ECES – Certified Encryption Specialist
- CSCU – Certified Secure Computer User
- CASE- Java – Certified Application Security Engineer – Java
- CASE- .Net – Certified Application Security Engineer – .Net
- ECSS – Certified Security Specialist
[/ux_text]
[/accordion-item]
[accordion-item title=”SANS GIAC”]
[ux_text font_size=”1.25″]
[/ux_text]
[/accordion-item]
[/accordion]
[/col]
[/row]
[/section]