This workshop explores various concise and useful constructs for working with bash shell. The goal is to improve your shell skills. Attending this class requires some basic GNU/Linux command line experience.
Format: Virtual
This workshop explores various concise and useful constructs for working with bash shell. The goal is to improve your shell skills. Attending this class requires some basic GNU/Linux command line experience.
Format: Virtual
Did you know the Linux operating system has built-in tools to control which specific users and groups can access which files and directories? In this session, you will learn what these Linux permissions are, how to use the available tools to control access and sharing, and how to avoid common security pitfalls.
This workshop explores various concise and useful constructs for working with bash shell. The goal is to improve your shell skills. Attending this class requires some basic GNU/Linux command line experience.
Format: Virtual
Time: 1:00 pm - 4:00 pm EST
Container computing is gradually changing the way researchers are developing, sharing, and running software applications. Apptainer (formerly called Singularity) is gaining popularity in HPC for its performance, ease of use, portability, and security. In this course, we will explore: what is a container, why use a container, and how to use and create one.
Format: Virtual
Did you know the Linux operating system has built-in tools to control which specific users and groups can access which files and directories? In this session, you will learn what these Linux permissions are, how to use the available tools to control access and sharing, and how to avoid common security pitfalls.
Container computing is gradually changing the way researchers are developing, sharing, and running software applications. Apptainer (formerly called Singularity) is gaining popularity in HPC for its performance, ease of use, portability, and security. In this course, we will explore: what is a container, why use a container, and how to use and create one.
Format: Virtual
This workshop explores various concise and useful constructs for working with bash shell. The goal is to improve your shell skills. Attending this class requires some basic GNU/Linux command line experience.
Format: In-person and On-line (zoom)
Location: SciNet Teaching Room, 11th floor on the MaRS West tower, 661 University Ave., Suite 1140, Toronto, ON M5G 1M1
Time: 1:00 pm - 4:00 pm EST
Container computing is gradually changing the way researchers are developing, sharing, and running software applications. Apptainer (formerly called Singularity) is gaining popularity in HPC for its performance, ease of use, portability, and security. In this course, we will explore: what is a container, why use a container, and how to use and create one.
Format: On-line (Zoom).
In three sessions over the course of one week, we will cover different aspects of cybersecurity to help you enable your research! We will explore cybersecurity concepts, cyberattack models, as well as best practices to protect your research. We will talk about cryptography and apply the concept to a real life scenario via SSH keys. Finally, we will approach cybersecurity in the context of the Research Ethics Board. This session will be a mix of theory and practical exercises. We hope you will learn something new and, most importantly, enjoy the sessions!
The format is virtual, but for the second session there is the option to attend in person in the SciNet Boardroom to get in-person help with setting up ssh key authentication.
Learn how to protect your research using cybersecurity techniques. During the three days of this workshop, we will cover various aspects of cybersecurity to help you protect your research! Cybersecurity concepts, cyberattack models, as well as best practices to protect your research will be reviewed. We will talk about cryptography and you will get to apply the concepts to a real life scenario using SSH keys. Finally, we will discuss cybersecurity in the context of human research data and the Research Ethics Board. The workshop will be a mix of theory and practical exercises. We hope you will learn something new and, more importantly, enjoy the sessions!
Sessions will be delivered in English, but we will have the ability to respond to questions in French. The lesson material will be available in English. A French version of this workshop will take place at a later date.
This workshop is part of the National Training series of the Compute Canada Federation. Registration is handled at
During the three days, we will cover different aspects of cybersecurity to help you enable your research! We will explore cybersecurity concepts, cyberattack models, as well as best practices to protect your research. We will talk about cryptography and apply the concept to a real life scenario via SSH keys. Finally, we will approach cybersecurity in the context of the Research Ethics Board. This session will be a mix of theory and practical exercises. We hope you will learn something new and, most importantly, enjoy this session!
At your own pace, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
THIS EVENT HAS BEEN CANCELED.
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 60 to 90 minutes, you will learn how to use the SciNet systems. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Virtual
In about 90 minutes, learn how to use the SciNet systems Niagara and Mist, from securely logging in to running computations on the supercomputer. Experienced users may still pick up some valuable pointers.
Format: Broadcast via Zoom and recorded.