This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Digital Security for Journalists and Human RIghts Defenders
Welcome
Welcome (0:50)
Module 1 - Passwords, the first line of defense.
Module Introduction (1:02)
1.1 How to create a secure password
1.1.1 - Anatomy of a strong password
1.1.2 - Passphrases
1.1.3 - Password best practices
1.2 - Two-factor authentication
1.3 Password Management
1.3.1 - How password managers work
1.3.2 - Choosing the best password manager
1.3.3 - How To Setup And Configure 'KeePassXC Password Manager (2:46)
Takeaways and links of interest
Quiz
Module 2 - Protecting data stored on your computer and mobile devices
Module 2 - Intro (0:53)
2.1 - Device unlock
2.1.1 - Passwords or Passphrases and PINs
2.1.2 - Biometrics (Face, Iris, and fingerprint recognition)
2.2 - Keeping apps, OS and Antivirus up to date
2.2.1 - OS and security patches
2.2.2 - Zero-day attacks
2.3 - Disk encryption
2.3.1 - Disk encryption for Windows and macOS
2.3.2 - Disk encryption for mobile devices
2.4 - Backups
2.4.1 - Local backups
2.4.2 - Cloud backups
Takeaways and links of interest
Module 2 - Quiz
Module 3 - Secure and private communications
Module 3 - Intro (0:27)
3.1 - Using secure websites (HTTPS)
3.2 - Improving security settings for Instant Messaging apps
3.2.1 - Locking messages
3.2.2 - Two-step verification
3.2.3 - WhatsApp end-to-end encrypted backups
3.2.4 - Signal encrypted local backups
3.3 - VPN & TOR
3.3.1 - Using VPN to create a private connection over a public network
3.3.2 - Using TOR to anonymize your web traffic
3.4 - PGP Encryption
3.4.1 - Email services with built-in end-to-end encryption
3.4.2 - Add end-to-end encryption to an existing email address
Takeaways and links of interest
Module 3 - Quiz
Module 4 - Digital Security while covering high-risk events
Module 4 - Intro (0:21)
4.1. Surveillance cameras
4.2.1 - Data Security
4.2.2 - Communication Security
4.2.3 - Device Safety
Takeaways and links of interest
Module 4 - Quiz
Module 5 - Fighting back against online abuse and harassment
Module 5 - Intro (0:19)
5.1.1 - Managing social media privacy settings
5.1.2 - Taking a break from the internet
5.1.3 - Searching the internet for sensitive personal data
5.2 - Dealing with account impersonation
5.2.1 - Take action against impersonating accounts
5.3 - How keeping personal and professional data separate minimizes the attack surface
5.3.1 - The importance of not using personal email accounts for work purposes
5.3.2 - Keeping your personal and work data separate from each other on a single device
Takeaways and links of interest
Module 5 - Quiz
The end
The end
3.2.1 - Locking messages
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock