The School, University or venue where you study from
In a paragraph, describe yourself in relation to your learning or teaching
Click to select more than one option (multiple times)
The Digital Security Essentials course will teach you how to guard against the most common digital threats and demonstrate your commitment to cyber security. You will also learn valuable security principals and how to develop compliant policies.
The convenience of digital technology offers a wide array of benefits and risks. As the importance of digital life grows, so too does the risk of having personal data breached, mismanaged or stolen; and indeed the authorities tracking and prosecuting journalists and human rights activists. Users of web based and mobile digital tools should understand both the positive and negative potential of digital devices in order to take full advantage of the technology. For example, storing important information (e.g. phone numbers, health information, etc) in a way that allows you to access it at any time provides convenience but will also put users at risk if confidential information is accessed at the wrong time, by the wrong people, or if the device is misplaced. GPS or social media conversation done without minding security can put journalists and their sources at risk. There are ways to protect the safety, security, and privacy of information and offering greater controls and transparency around personal information to foster trust in both the digital and physical world.
Journalists and Civil society practitioners must keep current on the security needs for technology.
After the course, students will be able to implement proper procedures for data confidentiality and availability and will also have developed critical thinking and problem-solving skills using real equipment and software (free and premium).
Objectives of course
As the demand for security professionals continues to grow many people need to develop an understanding of digital security, overcoming vulnerabilities, security principles, technologies, and procedures used to defend one against cyber-attacks and harassment. Specifically:
No Reviews found for this course.
Enter the destination URL
Or link to existing content