Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Detailed schedule and contents" with value "**AGENDA DAY 1** 15:00-17:00: Welcome, Housekeeping and Objectives** Introduction Program and objectives Training methodology Expectations Shared agreements (Discussion and agreement) Security guidelines __________________________________________________________________________________________ **AGENDA DAY 2** 09:30-11:15: Digital Security risk Assessment** Participants will learn basic methods for assessing common digital and physical risks to data in the work environment. The group exercise begin with all participants filling a document (information map) about the data they produce/manage and they assess: 1)How sensitive are those data (from a work/activist/privacy perspective? Do they imply personal data about third parties?) + Have you lost sensitive information? How did that happen? Discussion: 2) As a human rights activist, identify potential risks to your equipment and data in the office/area/place you work in? Vs What kinds of risks are present in public spaces? (Do you see similar issues in public Internet cafes, libraries, airports for instance?) + What kinds of precautions they could take to protect their physical and digital safety or the safety of your work and your network? 3) How do you build trust in your work/activist environment? What are the processes or tools you use to check out integrity, verification, authenticity of data you manage and people you work with? 11:15-11:30: BREAK** 11:30-13:00: How to protect your computer from malware and intruders; PART 1** Participants will get better understanding of what malware is, how the devices become exposed with malware. How our online behavior can influence our security regarding malware. Common methods of attacks with Malware. Demonstration through activity a phishing example. 13:00-14:30: LUNCH** 14:30-15:30: How to protect your computer from malware and intruders; PART 2** Demonstration on how to detect fake mails as wall as removing malware from the computer. Tips on prevention infections on the computer. Installation and demonstration on Avast. Mention on Spybot and alternatives. 15:30-15:45: BREAK** 15:45-17:00: How to create and maintain secure passwords** Participants will learn how passwords are commonly compromised. Which are the common myths and misconceptions about passwords and the features of stronger passwords. Demonstration of the need for using password manager. Hands on Keepass/KeepassX 17:00-17:30: Summary and Evaluation** __________________________________________________________________________________________ **AGENDA DAY 3** 09:00-09:30: Review of Day 2 by the participants** 09:30-10:30: Practice Keepass/KeepassX** 10:30-10:45: BREAK** 10:45-13:00: How to protect sensitive data on your computer; PART 1** Participants will discuss if they have lost already sensitive data, how did that happen and what kind of impact did it have on their lives and work. The objective is to identify the sensitive information the human rights activists have. Demonstration, installation and hands-on how to protect sensitive and important information with Truecrypt 7.1a. 13:00-14:30: LUNCH** 14:30-15:30: How to protect sensitive data on your computer; PART 2** Participants will learn how to back up sensitive and important information with Duplicati. Hands on session. 15:30-15:45: BREAK** 15:45-17:00: How to keep your Internet communication private; PART1** Participants will learn how the internet works, through an activity showing the chain of agents that can control/access aka compromise our privacy and security. They will learn the difference between secure and insecure internet connection and have hands-on : HTTPS EVERYWHERE, NOSCRIPT and ADDBLOCK 17:00-17:30: Summary and Evaluation** __________________________________________________________________________________________ ** AGENDA DAY 4** 09:00-09:30: Review of Day 3** 09:30-10:30: How to keep your Internet communication private; PART 1** Introduction and demonstration of VPN, proxy and Tor. Mentioning of TAILS. 10:30-10:45: BREAK** 10:45-13:00: How to keep your Internet communication private; PART 1** Participants will learn about the double step verification on Google, about alternative cloud services and alternative email secure services. Opening accounts on riseup.net 13:00-14:30: LUNCH** 14:30-17:30: How to keep your internet communication private; PART 2** How encryption works. Demonstration of the keys and mail sending through objects and letter. Demonstration Pidgin and Meet.jitsi. Hands-on email encryption. Includes installation of Thunderbird, enigmail and PGP. Generating key pairs, revocation, exchanging keys authenticating them, uploading keys. Web of trust 17:30-18:00: Wrap-up and Final Evaluation**". Since there have been only a few results, also nearby values are displayed.

Showing below up to 2 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

    • Digital security training for women activists from the Balkans, Turkey  + (**AGENDA DAY 1** 15:00-17:00: Welcome, Ho
      **AGENDA DAY 1** 15:00-17:00: Welcome, Housekeeping and Objectives** Introduction Program and objectives Training methodology Expectations Shared agreements (Discussion and agreement) Security guidelines __________________________________________________________________________________________ **AGENDA DAY 2** 09:30-11:15: Digital Security risk Assessment** Participants will learn basic methods for assessing common digital and physical risks to data in the work environment. The group exercise begin with all participants filling a document (information map) about the data they produce/manage and they assess: 1)How sensitive are those data (from a work/activist/privacy perspective? Do they imply personal data about third parties?) + Have you lost sensitive information? How did that happen? Discussion: 2) As a human rights activist, identify potential risks to your equipment and data in the office/area/place you work in? Vs What kinds of risks are present in public spaces? (Do you see similar issues in public Internet cafes, libraries, airports for instance?) + What kinds of precautions they could take to protect their physical and digital safety or the safety of your work and your network? 3) How do you build trust in your work/activist environment? What are the processes or tools you use to check out integrity, verification, authenticity of data you manage and people you work with? 11:15-11:30: BREAK** 11:30-13:00: How to protect your computer from malware and intruders; PART 1** Participants will get better understanding of what malware is, how the devices become exposed with malware. How our online behavior can influence our security regarding malware. Common methods of attacks with Malware. Demonstration through activity a phishing example. 13:00-14:30: LUNCH** 14:30-15:30: How to protect your computer from malware and intruders; PART 2** Demonstration on how to detect fake mails as wall as removing malware from the computer. Tips on prevention infections on the computer. Installation and demonstration on Avast. Mention on Spybot and alternatives. 15:30-15:45: BREAK** 15:45-17:00: How to create and maintain secure passwords** Participants will learn how passwords are commonly compromised. Which are the common myths and misconceptions about passwords and the features of stronger passwords. Demonstration of the need for using password manager. Hands on Keepass/KeepassX 17:00-17:30: Summary and Evaluation** __________________________________________________________________________________________ **AGENDA DAY 3** 09:00-09:30: Review of Day 2 by the participants** 09:30-10:30: Practice Keepass/KeepassX** 10:30-10:45: BREAK** 10:45-13:00: How to protect sensitive data on your computer; PART 1** Participants will discuss if they have lost already sensitive data, how did that happen and what kind of impact did it have on their lives and work. The objective is to identify the sensitive information the human rights activists have. Demonstration, installation and hands-on how to protect sensitive and important information with Truecrypt 7.1a. 13:00-14:30: LUNCH** 14:30-15:30: How to protect sensitive data on your computer; PART 2** Participants will learn how to back up sensitive and important information with Duplicati. Hands on session. 15:30-15:45: BREAK** 15:45-17:00: How to keep your Internet communication private; PART1** Participants will learn how the internet works, through an activity showing the chain of agents that can control/access aka compromise our privacy and security. They will learn the difference between secure and insecure internet connection and have hands-on : HTTPS EVERYWHERE, NOSCRIPT and ADDBLOCK 17:00-17:30: Summary and Evaluation** __________________________________________________________________________________________ ** AGENDA DAY 4** 09:00-09:30: Review of Day 3** 09:30-10:30: How to keep your Internet communication private; PART 1** Introduction and demonstration of VPN, proxy and Tor. Mentioning of TAILS. 10:30-10:45: BREAK** 10:45-13:00: How to keep your Internet communication private; PART 1** Participants will learn about the double step verification on Google, about alternative cloud services and alternative email secure services. Opening accounts on riseup.net 13:00-14:30: LUNCH** 14:30-17:30: How to keep your internet communication private; PART 2** How encryption works. Demonstration of the keys and mail sending through objects and letter. Demonstration Pidgin and Meet.jitsi. Hands-on email encryption. Includes installation of Thunderbird, enigmail and PGP. Generating key pairs, revocation, exchanging keys authenticating them, uploading keys. Web of trust 17:30-18:00: Wrap-up and Final Evaluation**
      7:30-18:00: Wrap-up and Final Evaluation**)