Compliance with Bill 25
- Protection of personal information
- Consent
- Confidentiality incidents
Protecting your online identity
- Password management
- Online shopping
- Creating accounts and subscriptions
Maintaining your workstation
- Cookies and cache
- IP address and VPN
- Reboot, updates and antivirus
Secure Internet access
- WI-FI and public use
- Understanding the cloud
- Social engineering
Secure data exchange
- Types of cyber attacks
- E-mail attacks
- Text message attacks
Acting ethically
- Personal and professional ethics
- Social media
- Safety policies