en:protectionnumerique:nosateliers

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:protectionnumerique:nosateliers [2018/02/09 17:34] barbayellowen:protectionnumerique:nosateliers [2019/10/13 14:15] (current) – external edit 127.0.0.1
Line 1: Line 1:
 ====== Training and workshops ====== ====== Training and workshops ======
  
-Nothing2Hide provides trainings related to digital security  and online investigation. Our [[https://nothing2hide.org/slides/|training material]] are available online (in French at the moment, translation ongoing) and published under creative commons license. Feel free to use it !+Nothing2Hide provides trainings related to digital security  and online investigation. Our [[https://nothing2hide.org/slides/|training material]] are available online (in French at the moment, English translation ongoing) and published under creative commons license. Feel free to use it !
  
 ====== Online investigation ====== ====== Online investigation ======
Line 13: Line 13:
   * Technically determine the origin or first publication date of a picture or a video   * Technically determine the origin or first publication date of a picture or a video
   * Technical validation of a picture or video authenticity   * Technical validation of a picture or video authenticity
-  * +
 ===== Advanced online search ===== ===== Advanced online search =====
  
Line 33: Line 33:
  
   * Digital safety : the basics   * Digital safety : the basics
-  * Protect your online accounts +  * Protect your on line accounts 
-  * Learn about online surveillance and how to get rid of it +  * Learn about on line surveillance and how to get rid of it - hacking live demo 
-  * Smart phones, spy phones and dumb phones+  * Smart phones, spy phones and dumb phones - hacking live demo
  
 ===== Digital safety : the basics ===== ===== Digital safety : the basics =====
Line 59: Line 59:
 //Length : 2h.//\\ //Length : 2h.//\\
  
-  * Protect your online accounts+  * Protect your on line accounts
   * Who should you open your publications to   * Who should you open your publications to
-  * Lear about compartmentalisation+  * Learn about compartmentalisation
  
 ===== Smartphones  ===== ===== Smartphones  =====
Line 73: Line 73:
   *   Data encryption   *   Data encryption
   *   Communication encryption   *   Communication encryption
-  *   Store your data without Google drive or iCloud : pros and cons +  *   Data backup with Google drive or iCloud : pros and cons 
-  +
 ===== Manage your data ===== ===== Manage your data =====
    
-//Atelier8 à 10 personnes maximum//\\ +//Workshopup to 10 trainees//\\ 
-//Durée 1/2 journée.//\\ +//Length 4h.//\\ 
-// Ordinateur ou smartphone obligatoire pour les participants.//+// Smart phone or computer needed for the trainees//
  
-   Les méta données (ou comment ne pas laisser traîner des infos sensibles dans des documents ou photos+  Metadata: what is it and how to handle it (or how not to leave any sensitive information in your documents, videos and pictures
-   Effacement sécurisé de données +  Secure data erasing 
-  *   Où sauvegarder ses données Cloud, local, Gafam, //à la maison// Avantages et inconvénients +  * Where to save your dataLocallywith the Gafam, on a personal  cloud, at homePros and cons 
-  *   Chiffrer ses données dans le cloud+  * Data encryption
  
 ===== "Crypto for dummies" ===== ===== "Crypto for dummies" =====
  
-//Atelier8 à 10 personnes maximum//\\ +//Workshopup to 10 trainees//\\ 
-//Durée 1/2 journée.//\\ +//Length 4h.//\\ 
-// Ordinateur ou smartphone obligatoire pour les participants.//+// Smart phone or computer needed for the trainees//
  
-  *     Différence entre cryptographie et anonymat +  *     Difference between encryption and anonymity 
-  *     Communiquer de façon anonyme +  *     How to communication anonymously 
-  *     Communiquer de manière chiffrée+  *     How to encrypt your communications
  
 ===== Advanced cryptography ===== ===== Advanced cryptography =====
  
-//Atelier8 à 10 personnes maximum//\\ +//Workshopup to 10 trainees//\\ 
-//Durée : 1 journée.//\\ +//Length : 1 day //\\ 
-// Ordinateur ou smartphone obligatoire pour les participants.//+// Smart phone or computer needed for the trainees//
  
-  * Chiffrement symétrique et asymétrique +  * Symmetric and asymmetric cryptography 
-  * PGP à quoi ça sert +  * PGP what for? How to use it? 
-  * L'authentification +  * Authentication 
-  * Discuter "Off The Reccord+  * "Off The Recordchat 
-  * Tails, le couteau suisse de la sécurité+  * understand and use the most secured live OS: Tails
  
 ===== Threat modeling ===== ===== Threat modeling =====
  
-//En plénière, 10 à 30 personnes//\\ +//Workshop //\\ 
-//Durée 2heures. //\\+//Length 2h //\\
  
-  * Le modèle de menaces en cinq questions +  * Threat modeling in 5 questions 
-  * Analyse de contexte et mise en place de stratégies adaptées+  * Context analysis and adapted response strategies