{"id":20696,"date":"2023-12-13T16:36:26","date_gmt":"2023-12-13T21:36:26","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=20696"},"modified":"2024-07-29T15:08:10","modified_gmt":"2024-07-29T19:08:10","slug":"youth-community-groups-new-cybersafety-curriculum","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/fr\/youth-community-groups-new-cybersafety-curriculum\/","title":{"rendered":"Groupes communautaires de jeunes - Nouveau programme d'\u00e9tudes sur la cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Empower your youth community group with digital skills!<\/h3>\n\n\n\n<p>With a focus on personal cybersafety skills, youth will learn fundamental aspects of the cybersecurity industry from data protection to social engineering awareness, and everything in between. Participants will be introduced to unique topics in each module and discover how each topic is applicable to real-world cybersecurity professions. This groundbreaking curriculum is specifically designed for youth community groups, offering an unparalleled opportunity for these organizations to equip their participants with crucial cybersafety knowledge. By integrating this curriculum into their programs, youth community groups can play a pivotal role in fostering a safer digital future for Canadian youth. <\/p>\n\n\n\n<p>This is the FIRST cybersecurity course of its kind available in Canada, and we\u2019re thrilled to help Canadian youth community groups advance their digital skills through this innovative educational journey.<\/p>\n\n\n<style>.kb-image20696_78ebfe-fb .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image20696_78ebfe-fb size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"540\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-1-1-1.png\" alt=\"youth community group page.\" class=\"kb-img wp-image-20728\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-1-1-1.png 870w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-1-1-1-600x372.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-1-1-1-768x477.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-1-1-1-18x12.png 18w\" sizes=\"auto, (max-width: 870px) 100vw, 870px\" \/><\/figure>\n\n\n\n<p>We are thrilled to announce the launch of our <a href=\"https:\/\/knowledgeflow.org\/initiative\/charting-your-couse-a-map-from-cybersafety-to-cybersecurity\/\">early access group<\/a>, where several youth community groups will have the opportunity to experience our course before anyone else and provide feedback on the project. This early access group has limited spots available, so register as soon as possible to guarantee your organization a spot! <\/p>\n\n\n\n<p>Our goal is to demystify the path to a career in cybersecurity, showcasing its accessibility to students from all backgrounds and locations. Our course uniquely highlights the four key domains of the Canadian Cyber Security Skills Framework: Securely Provision, Operate and Maintain, Oversee and Govern, and Protect and Defend. By aligning industry certifications and educational pathways with these domains, we provide a clear, structured roadmap for students. Youth community groups can explore various pathways to success in cybersecurity, particularly through online education and certification programs. <\/p>\n\n\n\n<p>This approach gains significance in light of a recent <a href=\"https:\/\/www.isc2.org\/Insights\/2023\/10\/ISC2-Reveals-Workforce-Growth-But-Record-Breaking-Gap-4-Million-Cybersecurity-Professionals\" target=\"_blank\" rel=\"noopener\">ISC2 study<\/a>, revealing that 67% of organizations are now investing in certification programs for their staff, addressing the critical shortage of certified professionals in the market. Our course not only educates but also guides students through these domains, illustrating how each certification and educational choice can lead to rewarding career opportunities in cybersecurity.<\/p>\n\n\n<style>.kb-image20696_02d909-58 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image20696_02d909-58\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"333\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-2-1.png\" alt=\"\" class=\"kb-img wp-image-20725\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-2-1.png 870w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-2-1-600x230.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-2-1-768x294.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Blog-image-2-1-18x7.png 18w\" sizes=\"auto, (max-width: 870px) 100vw, 870px\" \/><\/figure><\/div>\n\n\n\n<p>Digital media literacy is not just important; it&#8217;s essential. Starting early to develop these skills is critical for students to effectively navigate and thrive in the future digital landscape. While this course is an introductory step and not designed to create cybersecurity experts overnight, it serves as an excellent foundation. The demand for skilled cybersecurity professionals is soaring globally, with organizations facing challenges in filling vital positions. The stark reality of this shortage is highlighted in <a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/reports\/2023-cybersecurity-skills-gap-report.pdf\" target=\"_blank\" rel=\"noopener\">Fortinet\u2019s 2023 cybersecurity skills gap report<\/a>, revealing a concerning 50% increase in organizations experiencing five or more data breaches from 2021 to 2022. <\/p>\n\n\n\n<p>By providing Canadian youth community groups with the necessary tools to cultivate their cybersecurity knowledge and skills, we&#8217;re not just educating them; we&#8217;re proactively shaping a competent and prepared cybersecurity workforce for the future.<\/p>\n\n\n<style>.kb-image20696_153ceb-39.kb-image-is-ratio-size, .kb-image20696_153ceb-39 .kb-image-is-ratio-size{max-width:-349px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image20696_153ceb-39.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image20696_153ceb-39 .kb-image-is-ratio-size{align-self:unset;}.kb-image20696_153ceb-39 figure{max-width:-349px;}.kb-image20696_153ceb-39 .image-is-svg, .kb-image20696_153ceb-39 .image-is-svg img{width:100%;}.kb-image20696_153ceb-39 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image20696_153ceb-39\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"483\" height=\"484\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Revolutionary-New-Cybersafety-Curriculum-for-Youth-Community-Groups.png\" alt=\"\" class=\"kb-img wp-image-20735\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Revolutionary-New-Cybersafety-Curriculum-for-Youth-Community-Groups.png 483w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Revolutionary-New-Cybersafety-Curriculum-for-Youth-Community-Groups-300x300.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Revolutionary-New-Cybersafety-Curriculum-for-Youth-Community-Groups-100x100.png 100w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Revolutionary-New-Cybersafety-Curriculum-for-Youth-Community-Groups-12x12.png 12w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/figure><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading20696_216cf2-a0, .wp-block-kadence-advancedheading.kt-adv-heading20696_216cf2-a0[data-kb-block=\"kb-adv-heading20696_216cf2-a0\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading20696_216cf2-a0 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading20696_216cf2-a0[data-kb-block=\"kb-adv-heading20696_216cf2-a0\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading20696_216cf2-a0 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading20696_216cf2-a0[data-kb-block=\"kb-adv-heading20696_216cf2-a0\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading20696_216cf2-a0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading20696_216cf2-a0\">The world needs 3.4 million more cybersecurity professionals to support today\u2019s global economy. However, today\u2019s education systems aren\u2019t equipped to fulfil the skill shortage this industry is facing. A <a href=\"https:\/\/uwaterloo.ca\/cybersecurity-privacy-institute\/technology-and-need-integration-public-education\" target=\"_blank\" rel=\"noopener\">report from ICTC and the University of Waterloo<\/a> explains \u201cCurrent students of the K-12 education system have stated school only taught \u201cvery basic computing skills and didn\u2019t prepare them with the technology skills they needed for their planned careers.\u201d<\/p>\n\n\n\n<p> The source of this problem is clear when considering that \u201cPresently only New Brunswick, Nova Scotia, Ontario, and British Columbia offer curriculum guidelines for cybersecurity, computer programming, and digital literacy. The remaining provinces do not address these skills in their curriculum guidelines.\u201d\u00a0 While the public school system in Canada lags, students must have access to this information through other means. This is the exact problem we\u2019re working to solve with our brand-new course: Charting your Course to Cybersecurity.<\/p>\n\n\n\n<p>Our aim is to craft an unparalleled learning experience for our participants, and we highly value your input to achieve this mission. After months of dedicated development tailored specifically for Canadian students, we&#8217;re proud to present this course. The funding of this project through <a href=\"https:\/\/www.cira.ca\/en\/resources\/news\/net-good\" target=\"_blank\" rel=\"noopener\">NetGood by CIRA <\/a>enables us to offer this comprehensive cybersecurity curriculum completely free of charge to youth community groups. Your feedback plays a crucial role in refining and enhancing the course, ensuring that we not only meet but exceed educational expectations. Together, we can make a significant impact in advancing cybersecurity education for young Canadians.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns20696_69187f-26{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:center;align-items:center;}.kt-btns20696_69187f-26 .kt-button{font-weight:normal;font-style:normal;}.kt-btns20696_69187f-26 .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns20696_69187f-26 .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns20696_69187f-26 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns20696_69187f-26 .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns20696_69187f-26 .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns20696_69187f-26 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns20696_69187f-26 .kt-btn-wrap-0 .kt-button:focus{background:#444444;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns20696_69187f-26\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn20696_4352d5-62.kb-button{width:initial;}<\/style><span class=\"kb-button kt-button button kb-btn20696_4352d5-62 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-kadence-singlebtn\"><span class=\"kt-btn-inner-text\"><strong>Chart Your Course<\/strong><\/span><\/span><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"630\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Groups-Blog-1.png\" alt=\"Revolutionary New Cybersafety Curriculum for Youth Community Groups\" class=\"wp-image-20737\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Groups-Blog-1.png 1200w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Groups-Blog-1-600x315.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Groups-Blog-1-768x403.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Groups-Blog-1-18x9.png 18w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>En mettant l'accent sur les comp\u00e9tences personnelles en mati\u00e8re de cybers\u00e9curit\u00e9, les jeunes apprendront les aspects fondamentaux du secteur de la cybers\u00e9curit\u00e9, de la protection des donn\u00e9es \u00e0 la sensibilisation \u00e0 l'ing\u00e9nierie sociale, et tout ce qui se trouve entre les deux.<\/p>","protected":false},"author":8,"featured_media":20742,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-20696","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/12\/Groups-Blog-1-1-1.png",1024,576,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/fr\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/20696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/comments?post=20696"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/20696\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media\/20742"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media?parent=20696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/categories?post=20696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/tags?post=20696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}