DSE: Digital Security Essentials


The Digital Security Essentials course will teach you how to guard against the most common digital threats and demonstrate your commitment to cyber security. You will also learn valuable security principals and how to develop compliant policies.


The convenience of digital technology offers a wide array of benefits and risks. As the importance of digital life grows, so too does the risk of having personal data breached, mismanaged or stolen; and indeed the authorities tracking and prosecuting journalists and human rights activists. Users of web based and mobile digital tools should  understand both the positive and negative potential of digital devices in order to take full advantage of the technology. For example, storing important information (e.g. phone numbers, health information, etc) in a way that allows you to access it at any time provides convenience but will also put users at risk if confidential information is accessed at the wrong time, by the wrong people, or if the device is misplaced. GPS or social media conversation done without minding security can put journalists and their sources at risk. There are ways to protect the safety, security, and privacy of information and offering greater controls and transparency around personal information to foster trust in both the digital and physical world.

Journalists and Civil society practitioners must keep current on the security needs for technology.

After the course, students will be able to implement proper procedures for data confidentiality and availability and will also have developed critical thinking and problem-solving skills using real equipment and software (free and premium).

Objectives of course

As the demand for security professionals continues to grow many people need to develop an understanding of digital security, overcoming vulnerabilities, security principles, technologies, and procedures used to defend one against cyber-attacks and harassment. Specifically:

  • Empower journalists and civil society to know the dangers found in cyber space and mobile digital gadgets they carry and use on day to day basis.
  • To train participants in securing digital devices and understand digital security sensitive practices in online and mobile communications.
  • To train participants in securing their important data and to communicate it securely to their intended targets over the internet or else.
  • Give participants knowledge and skills of Backing up data and easy encryption

Course Curriculum

DSE: Understanding Data BackupFREE 03:00:00
DES: Logging and log analysisFREE 04:30:00
DES: Antivirus and SpywareFREE 03:00:00
We discuss two areas of concern for Internet users: viruses and spyware. We look at how to keep these types of vermin from infecting your computer and how to minimize the overall risk to your system.
DES: FirewallsFREE 04:30:00
DES: Documentation of systemsFREE 03:00:00
After reading this article you will learn about: 1. Features of Effective System Documentation 2. Purpose of System Documentation 3. Contents of System Documentation 4. Levels of System Documentation.
DES: Appropriate user accessFREE 06:00:00
DES: Crisis preparation and emergency protectionFREE 04:00:00
Digital Crisis Preparation: You Think You're Ready, But Are You Really?
DES: Data encryption and secure online and mobile communicationsFREE 04:00:00
WHAT YOU CAN LEARN FROM THIS GUIDE What information is vulnerable when communicating digitally Why many webmail and instant messaging services are not secure What steps you can take to protect your digital communication What to look for when choosing tools and services for digital communication What to do if you think someone might be accessing one of your online services, such as your email account
DSE: Operational Best PracticesFREE 03:30:00
DSE: The digital security mindsetFREE 03:00:00
DSE: Network and IT Infrastructure SecurityFREE 02:00:00
DSE: Most Common Web Security VulnerabilitiesFREE 04:00:00
DSE: Vulnerability and Threat ManagementFREE 04:30:00
DSE: Application SecurityFREE 03:30:00
DSE: Cloud SecurityFREE 04:00:00
DSE: Mobile SecurityFREE 03:00:00
ow to deal with the risks that come from making sensitive data extremely portable Why mobile voice communication and text messaging are particularly vulnerable to surveillance Steps you can take to improve your security when using your smartphone to communicate, store data, take photos and visit webpages, among other activities How to improve your chances of remaining anonymous, if necessary, while using a mobile phone

Course Reviews


  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.