• No products in the cart.

21

Digital Security Essentials The Digital Security Essentials course will teach you how to guard against the most common digital threats …

UGX 500,000 per 365 days

Digital Security Essentials

The Digital Security Essentials course will teach you how to guard against the most common digital threats and demonstrate your commitment to cyber security. You will also learn valuable security principals and how to develop compliant policies. The convenience of digital technology offers a wide array of benefits and risks. As the importance of digital life grows, so too does the risk of having personal data breached, mismanaged or stolen; and indeed the authorities tracking and prosecuting journalists and human rights activists. Users of web based and mobile digital tools should  understand both the positive and negative potential of digital devices in order to take full advantage of the technology. For example, storing important information (e.g. phone numbers, health information, etc) in a way that allows you to access it at any time provides convenience but will also put users at risk if confidential information is accessed at the wrong time, by the wrong people, or if the device is misplaced. GPS or social media conversation done without minding security can put journalists and their sources at risk. There are ways to protect the safety, security, and privacy of information and offering greater controls and transparency around personal information to foster trust in both the digital and physical world. Journalists and Civil society practitioners must keep current on the security needs for technology. After the course, students will be able to implement proper procedures for data confidentiality and availability and will also have developed critical thinking and problem-solving skills using real equipment and software (free and premium). Objectives of course As the demand for security professionals continues to grow many people need to develop an understanding of digital security, overcoming vulnerabilities, security principles, technologies, and procedures used to defend one against cyber-attacks and harassment. Specifically:
  • Empower journalists and civil society to know the dangers found in cyber space and mobile digital gadgets they carry and use on day to day basis.
  • To train participants in securing digital devices and understand digital security sensitive practices in online and mobile communications.
  • To train participants in securing their important data and to communicate it securely to their intended targets over the internet or else.
  • Give participants knowledge and skills of Backing up data and easy encryption

Course Currilcum

  • COURSE OUTLINE 00:00:00
  • Digital Security Essentials course outline
  • DES: Test:-How secure are you with your digital gadgets FREE 01:00:00
  • This unit will enable you test your digital security level
  • DES: Safe expressions, tactics and practices FREE 01:30:00
  • This unit discusses the best ways to safeguard against the Digital threats.
  • DES: DATA ENCRYPTION Unlimited
  • This unit describes the process, advantages, challenges and solutions to data encryption.
  • DES: DATA ENCRYPTION Assignment 150:02
  • DES: Personal devices protection Unlimited
  • This unit provides information about the problems faced by and how to care for personal devices.
  • DES: Logging and log analysis Unlimited
  • This unit looks at how computers gather and record data and information.
  • DES: Antivirus and Spyware Unlimited
  • We discuss two areas of concern for Internet users: viruses and spyware. We look at how to keep these types of vermin from infecting your computer and how to minimize the overall risk to your system.
  • DES: Filtering, patching, and firewalls Unlimited
  • This unit is about firewalls, patches and filters, how to them setup and their advantages towards digital security
  • DES: Documentation of systems Unlimited
  • After reading this article you will learn about: 1. Features of Effective System Documentation 2. Purpose of System Documentation 3. Contents of System Documentation 4. Levels of System Documentation.
  • DES: Appropriate user access Unlimited
  • This unit explores administrative user access: persons with supreme rights of accessing a given site.
  • DES: Crisis preparation and emergency protection Unlimited
  • Digital Crisis Preparation: You Think You're Ready, But Are You Really?
  • DES: Data encryption and secure online and mobile communications Unlimited
  • WHAT YOU CAN LEARN FROM THIS GUIDE What information is vulnerable when communicating digitally Why many webmail and instant messaging services are not secure What steps you can take to protect your digital communication What to look for when choosing tools and services for digital communication What to do if you think someone might be accessing one of your online services, such as your email account
  • DSE: Operational Best Practices Unlimited
  • This unit will introduce you to the best operational practices for digital safety.
  • DSE: The digital security mindset Unlimited
  • This unit will help you achieve a positive attitude towards Digital media and New media trends.
  • DSE: Network and IT Infrastructure Security Unlimited
  • This unit explores how to protect Network and IT Infrastructure
  • DSE: Most Common Web Security Vulnerabilities Unlimited
  • This unit covers the Most Common Web Security Vulnerabilities and how to mitigate them
  • DSE: Vulnerability and Threat Management Unlimited
  • This unit looks at Digital threats, safeguarding against digital threats and precautions and measures to ensure safety online
  • DSE: Application Security Unlimited
  • This unit explores how you can protect your applications from digital threats.
  • DSE: Cloud Security Unlimited
  • This unit looks at the meaning of cloud security and how it can help in digital safety.
  • DSE: Mobile Security Unlimited
  • How to deal with the risks that come from making sensitive data extremely portable Why mobile voice communication and text messaging are particularly vulnerable to surveillance Steps you can take to improve your security when using your smartphone to communicate, store data, take photos and visit webpages, among other activities How to improve your chances of remaining anonymous, if necessary, while using a mobile phone
  • DES: Planning for the Worst Case Unlimited
  • This unit is about the best measures to put in place so as to mitigate worst scenarios of cyber crime and other digital threats.
banner