DSE: Digital Security Essentials
The Digital Security Essentials course will teach you how to guard against the most common digital threats and demonstrate your commitment to cyber security. You will also learn valuable security principals and how to develop compliant policies.
The convenience of digital technology offers a wide array of benefits and risks. As the importance of digital life grows, so too does the risk of having personal data breached, mismanaged or stolen; and indeed the authorities tracking and prosecuting journalists and human rights activists. Users of web based and mobile digital tools should understand both the positive and negative potential of digital devices in order to take full advantage of the technology. For example, storing important information (e.g. phone numbers, health information, etc) in a way that allows you to access it at any time provides convenience but will also put users at risk if confidential information is accessed at the wrong time, by the wrong people, or if the device is misplaced. GPS or social media conversation done without minding security can put journalists and their sources at risk. There are ways to protect the safety, security, and privacy of information and offering greater controls and transparency around personal information to foster trust in both the digital and physical world.
Journalists and Civil society practitioners must keep current on the security needs for technology.
After the course, students will be able to implement proper procedures for data confidentiality and availability and will also have developed critical thinking and problem-solving skills using real equipment and software (free and premium).
Objectives of course
As the demand for security professionals continues to grow many people need to develop an understanding of digital security, overcoming vulnerabilities, security principles, technologies, and procedures used to defend one against cyber-attacks and harassment. Specifically:
- Empower journalists and civil society to know the dangers found in cyber space and mobile digital gadgets they carry and use on day to day basis.
- To train participants in securing digital devices and understand digital security sensitive practices in online and mobile communications.
- To train participants in securing their important data and to communicate it securely to their intended targets over the internet or else.
- Give participants knowledge and skills of Backing up data and easy encryption
|DSE: Understanding Data Backup||FREE||03:00:00|
|DES: DATA ENCRYPTION||FREE||05:20:00|
|DES: Logging and log analysis||FREE||04:30:00|
|DES: Antivirus and Spyware||FREE||03:00:00|
|We discuss two areas of concern for Internet users: viruses and spyware. We look at how to keep these types of vermin from infecting your computer and how to minimize the overall risk to your system.|
|DES: Documentation of systems||FREE||03:00:00|
|After reading this article you will learn about: 1. Features of Effective System Documentation 2. Purpose of System Documentation 3. Contents of System Documentation 4. Levels of System Documentation.|
|DES: Appropriate user access||FREE||06:00:00|
|DES: Crisis preparation and emergency protection||FREE||04:00:00|
|Digital Crisis Preparation: You Think You're Ready, But Are You Really?|
|DES: Data encryption and secure online and mobile communications||FREE||04:00:00|
|WHAT YOU CAN LEARN FROM THIS GUIDE What information is vulnerable when communicating digitally Why many webmail and instant messaging services are not secure What steps you can take to protect your digital communication What to look for when choosing tools and services for digital communication What to do if you think someone might be accessing one of your online services, such as your email account|
|DSE: Operational Best Practices||FREE||03:30:00|
|DSE: The digital security mindset||FREE||03:00:00|
|DSE: Network and IT Infrastructure Security||FREE||02:00:00|
|DSE: Most Common Web Security Vulnerabilities||FREE||04:00:00|
|DSE: Vulnerability and Threat Management||FREE||04:30:00|
|DSE: Application Security||FREE||03:30:00|
|DSE: Cloud Security||FREE||04:00:00|
|DSE: Mobile Security||FREE||03:00:00|
|ow to deal with the risks that come from making sensitive data extremely portable Why mobile voice communication and text messaging are particularly vulnerable to surveillance Steps you can take to improve your security when using your smartphone to communicate, store data, take photos and visit webpages, among other activities How to improve your chances of remaining anonymous, if necessary, while using a mobile phone|
No Reviews found for this course.