Browse the School's full catalogue of courses, events, programs and other learning tools. For recommended learning by theme or community, view our learning paths or learning series.
This online self-paced course introduces the key information management concepts and provides tips and best practices for their proper application. Participants will gain practical knowledge that will help them understand how to manage information effectively in their day-to-day work.
This online self-paced course prompts learners to apply what they have learned in the six preceding courses about GCdocs16 through an online assessment. Participants will be asked about the use of GCdocs in the workplace, its features and navigation tools, and the ways in which documents can be tracked, organized and accessed using the GCdocs system.
This video encourages managers and executives to learn from cloud leaders and to make informed decisions about designing cloud-based programs and services that are at the centre of their digital transformation strategies.
This video shares a proof of concept from Agriculture and Agri-Food Canada that uses the cloud to improve the speed of analysis and the processing of data.
This online self-paced course provides an overview of common IT security program activities in the Government of Canada and introduces the legal, policy, business and threat contexts for IT security. By gaining a renewed appreciation for the IT security context and program activities, participants will be better able to support IT security priorities across the Government of Canada.
This online self-paced course offers an overview of information technology (IT) security policies, processes and procedures relevant to the role of IT practitioners in the federal public service. Participants will gain a foundational understanding of IT security that can be adapted to organizational contexts across the Government of Canada.
This short online self-paced course recommends best practices for maintaining data security when using both public and home Wi-Fi networks. Participants will learn how to distinguish between safe and risky Wi-Fi networks to help maintain data security when using public internet connections.
This article explores large language models like ChatGPT and important considerations for the adoption of this kind of technology in the federal public service.
This article presents and explains enterprise architecture, a process that helps decision-makers understand where their organization is today, where they want it to go in the future, and the steps needed to get there.
This article explores quantum computing, how it differs from traditional computing, its opportunities, and the efforts underway to address potential risks and challenges.
This job aid serves as a guide to composing point-of-view (POV) problem statements to better frame a problem from the perspective of the stakeholders involved.
Contact us through our chatbot, general inquiries form, or call us at 819-953-5400 (NCR), 1-833-622-1310 (toll free). Our team can help you with your questions and accessibility needs.