Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Existing toolkits and resources" with value "http://prezi.com/fhzemgxjcgvd". Since there have been only a few results, also nearby values are displayed.

Showing below up to 19 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • FemH3ck - How the internet works for WHRD, Mexico  + (Security in a box. Dominemos las TIC site.)
  • Gender and Technology Institute, Berlin  + (See tutorials sectionː https://gendersec.tacticaltech.org/wiki/index.php/Category:Tutorials)
  • FemH3ck - Feminist Caravan 1200 km, Mexico  + (Seguridad en una caja Tails Tor Bitmask gstream gpg)
  • Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka  + (Tactical Tech's previous GTI curricula.)
  • II Festival Ciberfeminista, Tejiendo circuitos, Guatemala  + (Tanto metodología como recursos utilizados
    Tanto metodología como recursos utilizados en las actividades fueron tomados de colectivas feministas que se han dado a la tarea de desarrollar currículos y recursos desde una perspectiva de género y feminista para la enseñanza-aprendizaje de la seguridad digital. Algunas de los contenidos se encuentran en: https://gendersec.tacticaltech.org/wiki/index.php/Main_Page https://securityinabox.org/en/ https://myshadow.org/materials https://ciberseguras.org https://gendersec.train.tacticaltech.org/ https://cyber-women.com/en/
    ticaltech.org/ https://cyber-women.com/en/)
  • International Journalism Festival - Perugia  + (The GTI report)
  • Digital security for the Association of Media Women, Kenya  + (The Kenya ICT Network (KICTANET) 2013 rep
    The Kenya ICT Network (KICTANET) 2013 report on Women and Cyber Crime in Kenya, tactical tech online tool kits , Google tips, Maji Data, UN Data,World Bank Data, Kenya Open data, infogram, Google fusion tables. Other presentations developed for the training can be viewed hereː On digital security basicsː https://gendersec.tacticaltech.org/wiki/images/e/e1/DIGITAL_SECURITY-1.pptx_Yvonne_Oluoch.pptx On digital security toolsː https://gendersec.tacticaltech.org/wiki/images/c/cd/AMWIK_training-1.pptx_Yvonne_Oluoch.pptx On policies on Violence Against Womenː https://gendersec.tacticaltech.org/wiki/images/c/c0/Advocacy.pptx_Mary_Kiio.pptx
    i/images/c/c0/Advocacy.pptx_Mary_Kiio.pptx)
  • Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia  + (The regional networks session intended to
    The regional networks session intended to brainstorm between international experiences of solidarity, support and counselling networks that are tackling gender based violence. We could go in-depth in the analysis of four cases studies: Network of WHRD on Oaxaca dealing with urgent situations (Mexico); Black lives matters! (USA); Aware girls, young women organization working for women's empowerment (Pakistan); and a network promoting self care among feminist activists (Brasil).
    lf care among feminist activists (Brasil).)
  • FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya  + (The toolkits and resources involved: Powerpoint presentations on privacy advocacy and digital security. Myshadow.org website for tools)
  • FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya  + (The toolkits and resources involved: Powerpoint presentations on privacy advocacy and digital security: Myshadow.org website)
  • FemH3ck - Round table Privacy and security in the Open IT Space, Serbia  + (The toolkits and resurces used in the educ
    The toolkits and resurces used in the educational process are as follows: Power point presentation: Privacy and security in an open IT space, Valentina Aleksandrovic Power point presentation: Internet Safety, Msc. Milos Peric, IT Center Nis Power point presentation: Sophisticated tools for violation of data integrity of the wireless network, Aleksandar Petrovic, Higher Technical School of Professional Studies Nis
    chnical School of Professional Studies Nis)
  • Formacion Ciberactivismo, Santa Elena, Ecuador  + (Utilice las memorias y lo aprendido en el IGT- Ecuador, las guías y material de Karisma, Colombia y Security in the box. Y el video de RedparaTodos "Gobernanza en Internet": https://www.youtube.com/watch?v=HU2Vbo_SxIs&t=182s)
  • Formacion Ciberactivismo, Cuenca, Ecuador  + (Utilice las memorias y lo aprendido en el IGT- Ecuador, las guías y material de Karisma, Colombia y Security in the box. Y el video de RedparaTodos "Gobernanza en Internet": https://www.youtube.com/watch?v=HU2Vbo_SxIs&t=182s)
  • Acompañamiento, Organización de Mujeres Defensoras, Mexico  + (Vean el lindo manual acerca de "Herramientas basicas para la proteccion integral de las defensoras de DDHH de Oaxaca", esta disponible en la imagen un poco mas arriba)
  • Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador  + (Video Ella https://vimeo.com/109258771 Vid
    Video Ella https://vimeo.com/109258771 Video “Mujeres y Extractivismo” La periodica https://laperiodica.net Metadatos: https://ssd.eff.org/es/module/por-qu%C3%A9-los-metadatos-son-importantes Contraseñas https://gendersec.tacticaltech.org/wiki/index.php/Contrase%C3%B1as_seguras Telefonía Móvil https://gendersec.tacticaltech.org/wiki/index.php/M%C3%B3vil_1:_Funccionamiento https://gendersec.tacticaltech.org/wiki/index.php/M%C3%B3vil_3:_Alternativas
    /wiki/index.php/M%C3%B3vil_3:_Alternativas)
  • Campaign Zero Trollerance, Internet  + (Videos of the six step programː http://zer
    Videos of the six step programː http://zerotrollerance.guru/step-1.php http://zerotrollerance.guru/step-2.php http://zerotrollerance.guru/step-3.php http://zerotrollerance.guru/step-4.php http://zerotrollerance.guru/step-5.php http://zerotrollerance.guru/step-6.php
    php http://zerotrollerance.guru/step-6.php)
  • Holistic Security, Train Of Trainers, Germany  + (Workbook on secuirty for human rights defe
    Workbook on secuirty for human rights defenders: https://www.frontlinedefenders.org/files/workbook_eng.pdf Integrated Secuirty Manual: http://integratedsecuritymanual.org protection manual for human rights defenders http://protectioninternational.org/publication/new-protection-manual-for-human-rights-defenders-3rd-edition/ pbi mexico: programa de asesorias en seguridad y protección - guía de facilitacion: http://www.pbi-mexico.org/fileadmin/user_files/projects/mexico/images/News/Reducido_GuiaFacilitacion.pdf
    /images/News/Reducido_GuiaFacilitacion.pdf)
  • Coming Back to Tech, IFF, Spain  + (Zen Manual Holistic Security Take Back the Tech Rapid Responders Network)