Canadian Forces Network Operations Centre badge

Become a Legendary
Cyber Operator

Training for future and current CFNOC Members

Defending Canada in the 5th Warfighting Domain!
Learn valuable cyber skills that you can use right now in your current role. Be at the forefront of CFNOC's cyber capability.

Start learning

What's included?

IT Fundamentals
Network Fundamentals
Linux Fundamentals
OSINT Introduction
Cyber Security Analyst
Red Team Essentials
Work opportunities to support CFNOC Operations

Start here

Sign up for instructor-led and self-paced Data Proficiency and Data Analytics training to upskill you in your current role. Build the Data Capability in your unit and CFNOC.

1-2

Bootcamps every month

50+

Trained every month

4.5/5

Instructor rating

90%

Would recommend it

Cyber Operator training opportunity

The self-pace training provides you foundational knowledge and skills to become a Cyber Operator in the 5th Warfighting Domain.

IT fundamentals

Know your kit. Learn the equipment that you will operate with. This course provides a concise overview of Information Technology and some of the key concepts.

Network fundamentals

Know your “battlespace”. The Network is where the 5th Warfighting Domain resides. This is the fundamental course for the Cyber Operator Pathway. This provides the baseline of education for IT Networking.

Linux fundamentals

Linux powers the majority of the applications on the networks in the world today. That include the “tradecraft” – the software “weapons” you and your adversaries deploy for operations in the 5th Warfighting Domain.

OSINT introduction

“Know they enemy, know thyself.” – Sun Tzu. Keep an eye on your adversaries. An introductory course to OSINT (open-source intelligence). This course is designed to educate students on the impact publicly available information can have on individuals and organizations.

Cyber Security Analyst

The Cyber Security Analyst course is the final step in the Cyber Operator Pathway. Here you will learn a variety of skills relevant to the Cyber Security Analyst, relevant to understanding and implementing both the technical and business requirements for the defensive Cyber protection.

Red Team Essentials (optional)

“Train as you fight; fight as you train.” Know how to attack in order to know how to defend.” Design, plan, and execute a penetration test using a provided standard testing methodology; Research and investigate attack techniques and describe mitigations for them; and Provide a detailed report on your penetration testing activities conducted within the capstone project which highlights your activities, results, issues encountered, and the residual risk.

CFNOC man at PC

Be part of CFNOC's future cyber workforce!

DND has long recognized the potential of cyber operations as a force multiplier to gain advantage over potential adversaries. - LCol N.B. Marshall

Start learning

Harness the power of Cyber Operations

Become a Cyber Operator at CFNOC

Access world-class cyber training with practical data projects to give you the skills to support your unit and CFNOC.

Yes I'm interested
Army comms person

Your journey starts here

Become future ready

Access world-class self paced Cyber Operator training. Join hundreds of CAF members who are enrolled in training and preparing for the future of CFNOC.
4.5 Instructor rating
Start learning
"Investing in your employees to upskill is the way of future. This creates synergy in teams and creates a more efficient team.”
Student at CFINTCOM
“Having a skilled person to enable the chain of command is always important. Once established, automation will provide ease of access and collation of information, yet the data analyst is required, to interpret that data and present it to command.”
Student at Royal Canadian Navy
"Well and simply presented. Opportunity to stage course throughout working day. Ability to revisit and confirm points good."
Student at CFINTCOM
"Excellent that the course takes you from no knowledge to a decent level, or at least the knowhow to take skills further. I found sometimes the gap between the practise ad the assessments was very steep, though I cant tell if this is just my own experience being someone without a 'data oriented' way of thinking"
Canadian Armed Force Member
"Extremely practical, concisely delivered, assessments challenged what was taught but were clearly based off the lesson, allowing quick reference to the lesson if something was forgotten."
Student at CFINTCOM
"I found the course explained the basic functions of excel well, the exercises were easy to follow and applicable."
Student at Royal Canadian Navy
"Extremely practical, concisely delivered, assessments challenged what was taught but were clearly based off the lesson, allowing quick reference to the lesson if something was forgotten."
Student at Canadian Army
"Fantastic course. Very easy to follow and quite user friendly for someone who is not familiar with excel. Caters for the lowest common denominator."
Student at Royal Canadian Navy

Start learning

Frequently asked questions

Do I need approval from my chain of command?

Yes – chain of command approval is required because this training requires a time commitment. It will ensure that you have the approval that you need from your workplace to enable you to attend the instructor-led sessions because once you commence your bootcamp, it is important that you attend all sessions, just as you would any other course so that you can meet the training outcomes.

For the self-paced learning option, you don’t need chain of command approval to complete your training, but it certainly helps so that you can secure time to maintain a consistent study schedule.

What is my time commitment?

The online course is about 140 hours of content which typically takes 2-3 months part time to complete.

I am interested in learning cyber skills but don’t want to become a full CFNOC cyber analyst.

That’s absolutely ok, there are three different levels of training offered through this opportunity:
  • Data proficient: you will just go through the Data Foundations component of the data analytics pathway. This is a very useful course if you use Microsoft Excel daily and it will give you valuable skills and awareness in the basics of using data. It is an introduction into the foundations of data analysis and if you stop here, you will still be armed with skills to optimize your potential and increase your productivity and efficiency in the workplace.
  • Data Analyst: After Data Foundations, you will progress through the Data Analysis and Data Visualisation courses based on tools that are available on the DWAN: Microsoft Excel and Microsoft Power BI. At the end, you will be able to use data to solve problems and generate insights. The Data Analysis course will teach you how to transform unprocessed data into insights and the Data Visualisation course will enable you to create visualisations that enable faster and more accurate decision-making.
  • Data Analyst Advanced: At the conclusion of the Data Visualisations training there are plenty of options to continue your data analytics training on the WYWM Potential platform including visualisations in Tableau, SQL Integration training and working with Azure. If you're passionate about data analysis and interested in continuing your journey you're encouraged to complete this advanced training.

Where can I use my cyber skills?

The Cyber Defender Pathway provides in demand Cyber Security skills for those looking to get into one of the largest and fastest growing industries within tech. The courses are designed to take those who wish to transfer their skills into the digital world of Cyber Security, whether they come from a technical or non-technical background.

What other training opportunities is CFNOC offering?

As CFNOC continues to strive toward becoming Future Ready, it will need a range of different digital-based skillsets, regardless of rank or trade, to drive a culture of digital product innovation. We encourage you to explore our different course offerings such as New to IT, Data Analytics, Digital Project Management, Linux, Robotics Process Automation, Service Desk and Software Development that can be unlocked for any student who completes the Cyber Pathway.