DSE: Digital Security Essentials


The Digital Security Essentials course will teach you how to guard against the most common digital threats and demonstrate your commitment to cyber security. You will also learn valuable security principals and how to develop compliant policies.

The convenience of digital technology offers a wide array of benefits and risks. As the importance of digital life grows, so too does the risk of having personal data breached, mismanaged or stolen; and indeed the authorities tracking and prosecuting journalists and human rights activists. Users of web based and mobile digital tools should  understand both the positive and negative potential of digital devices in order to take full advantage of the technology. For example, storing important information (e.g. phone numbers, health information, etc) in a way that allows you to access it at any time provides convenience but will also put users at risk if confidential information is accessed at the wrong time, by the wrong people, or if the device is misplaced. GPS or social media conversation done without minding security can put journalists and their sources at risk. There are ways to protect the safety, security, and privacy of information and offering greater controls and transparency around personal information to foster trust in both the digital and physical world.

Journalists and Civil society practitioners must keep current on the security needs for technology.

After the course, students will be able to implement proper procedures for data confidentiality and availability and will also have developed critical thinking and problem-solving skills using real equipment and software (free and premium).

Objectives of course

As the demand for security professionals continues to grow many people need to develop an understanding of digital security, overcoming vulnerabilities, security principles, technologies, and procedures used to defend one against cyber-attacks and harassment. Specifically:

  • Empower journalists and civil society to know the dangers found in cyber space and mobile digital gadgets they carry and use on day to day basis.
  • To train participants in securing digital devices and understand digital security sensitive practices in online and mobile communications.
  • To train participants in securing their important data and to communicate it securely to their intended targets over the internet or else.
  • Give participants knowledge and skills of Backing up data and easy encryption

Course Curriculum

Digital Security Essentials course outline
DES: Test:-How secure are you with your digital gadgetsFREE 01:00:00
This unit will enable you test your digital security level
DES: Safe expressions, tactics and practicesFREE 01:30:00
This unit discusses the best ways to safeguard against the Digital threats.
This unit describes the process, advantages, challenges and solutions to data encryption.
DES: DATA ENCRYPTION Assignment150:02
DES: Personal devices protectionFREE 02:00:00
This unit provides information about the problems faced by and how to care for personal devices.
DES: Logging and log analysisFREE 04:30:00
This unit looks at how computers gather and record data and information.
DES: Antivirus and SpywareFREE 03:00:00
We discuss two areas of concern for Internet users: viruses and spyware. We look at how to keep these types of vermin from infecting your computer and how to minimize the overall risk to your system.
DES: Filtering, patching, and firewallsFREE 04:30:00
This unit is about firewalls, patches and filters, how to them setup and their advantages towards digital security
DES: Documentation of systemsFREE 03:00:00
After reading this article you will learn about: 1. Features of Effective System Documentation 2. Purpose of System Documentation 3. Contents of System Documentation 4. Levels of System Documentation.
DES: Appropriate user accessFREE 06:00:00
This unit explores administrative user access: persons with supreme rights of accessing a given site.
DES: Crisis preparation and emergency protectionFREE 04:00:00
Digital Crisis Preparation: You Think You're Ready, But Are You Really?
DES: Data encryption and secure online and mobile communicationsFREE 04:00:00
WHAT YOU CAN LEARN FROM THIS GUIDE What information is vulnerable when communicating digitally Why many webmail and instant messaging services are not secure What steps you can take to protect your digital communication What to look for when choosing tools and services for digital communication What to do if you think someone might be accessing one of your online services, such as your email account
DSE: Operational Best PracticesFREE 03:30:00
This unit will introduce you to the best operational practices for digital safety.
DSE: The digital security mindsetFREE 03:00:00
This unit will help you achieve a positive attitude towards Digital media and New media trends.
DSE: Network and IT Infrastructure SecurityFREE 02:00:00
This unit explores how to protect Network and IT Infrastructure
DSE: Most Common Web Security VulnerabilitiesFREE 04:00:00
This unit covers the Most Common Web Security Vulnerabilities and how to mitigate them
DSE: Vulnerability and Threat ManagementFREE 04:30:00
This unit looks at Digital threats, safeguarding against digital threats and precautions and measures to ensure safety online
DSE: Application SecurityFREE 03:30:00
This unit explores how you can protect your applications from digital threats.
DSE: Cloud SecurityFREE 04:00:00
This unit looks at the meaning of cloud security and how it can help in digital safety.
DSE: Mobile SecurityFREE 03:00:00
How to deal with the risks that come from making sensitive data extremely portable Why mobile voice communication and text messaging are particularly vulnerable to surveillance Steps you can take to improve your security when using your smartphone to communicate, store data, take photos and visit webpages, among other activities How to improve your chances of remaining anonymous, if necessary, while using a mobile phone
DES: Planning for the Worst CaseFREE 02:00:00
This unit is about the best measures to put in place so as to mitigate worst scenarios of cyber crime and other digital threats.

Course Reviews


  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.


WhatsApp chat