Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Digital Security Training Series
Digital Security Overview
Digital security overview (62:24)
Some of the best sources of news and resources for digital activism, security, and counter-surveillance
Intro to digital security and threat actors
01 - Intro and slides (2:37)
02 - Why this training, what to expect (5:47)
03 - What is Digital Security (2:37)
04 - Threat modelling (3:20)
05 - Government as threat actor (4:46)
06 - Hackers as threat actors, and phishing (DNC example) (6:22)
07 - Corporate Investigators (4:13)
08 - DDOS attacks such as on Black Lives Matter website (2:56)
09 - Political history of surveillance in the U.S. (4:35)
10 - Protecting your data from threats where to start with a few easy tools and practices (12:28)
Creating a Secure Workflow
01 - Overview of digital security process (1:50)
02 - Data, metadata, geolocation data (2:32)
03 - Compartmentalization (9:10)
04 - Encryption (4:17)
05 - Open source tools (1:53)
06 - Why not use common tools (4:16)
07 - Email (4:18)
08 - Passwords (5:59)
09 - Backup (2:51)
10 - Website security (1:35)
11 - Secure tools for web browsing, video, phone, cloud storage, VPNs (6:54)
12 - Hardware how to make your devices more secure (3:43)
13 - Putting it all together - One secure workflow (14:53)
Other Digital Security Issues
01 - Creating and implementing your organization’s digital security protocol (8:26)
02 - Staff transitions (1:30)
03 - Staying up to date - reliable sources of guidance (4:06)
04 - Preventing and dealing with internet harassment (6:40)
05 - Preparing for actions (5:45)
06 - Security issues for networks and coalitions (5:20)
07 - Case study Make the Road, NY (10:37)
08 - The digital security eco-system (14:51)
09 - Working with contractors (8:49)
10 - Case study Palestine Legal (6:21)
11 - Q and A for series (63:29)
12 - Additional Resources
Additional resources and partners
Blueprints for Change "Digital Security Basics for Campaigners"
Train the Trainer Guides on Digital Security (Stronger NYC Communities/Mozilla)
Extinction Rebellion Rebel Security Guide June 2020
06 - Hackers as threat actors, and phishing (DNC example)
Lesson contents locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock