Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
en:protectionnumerique:nosateliers [2018/02/09 18:00] – [Social network] barbayellow | en:protectionnumerique:nosateliers [2019/10/13 14:15] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Training and workshops ====== | ====== Training and workshops ====== | ||
- | Nothing2Hide provides trainings related to digital security | + | Nothing2Hide provides trainings related to digital security |
====== Online investigation ====== | ====== Online investigation ====== | ||
Line 33: | Line 33: | ||
* Digital safety : the basics | * Digital safety : the basics | ||
- | * Protect your online | + | * Protect your on line accounts |
- | * Learn about online | + | * Learn about on line surveillance and how to get rid of it - hacking live demo |
- | * Smart phones, spy phones and dumb phones | + | * Smart phones, spy phones and dumb phones |
===== Digital safety : the basics ===== | ===== Digital safety : the basics ===== | ||
Line 59: | Line 59: | ||
//Length : 2h.//\\ | //Length : 2h.//\\ | ||
- | * Protect your online | + | * Protect your on line accounts |
* Who should you open your publications to | * Who should you open your publications to | ||
* Learn about compartmentalisation | * Learn about compartmentalisation | ||
Line 93: | Line 93: | ||
* | * | ||
- | * Communiquer de façon anonyme | + | * How to communication anonymously |
- | * Communiquer de manière chiffrée | + | * How to encrypt your communications |
===== Advanced cryptography ===== | ===== Advanced cryptography ===== | ||
- | //Atelier, 8 à 10 personnes maximum//\\ | + | //Workshop, up to 10 trainees//\\ |
- | //Durée | + | //Length |
- | // Ordinateur ou smartphone obligatoire pour les participants.// | + | // Smart phone or computer needed for the trainees// |
- | * Chiffrement symétrique et asymétrique | + | * Symmetric and asymmetric cryptography |
- | * PGP à quoi ça sert | + | * PGP what for? How to use it? |
- | * L' | + | * Authentication |
- | * Discuter | + | * "Off The Record" |
- | * Tails, le couteau suisse de la sécurité | + | * understand and use the most secured live OS: Tails |
===== Threat modeling ===== | ===== Threat modeling ===== | ||
- | //En plénière, 10 à 30 personnes//\\ | + | //Workshop |
- | //Durée | + | //Length |
- | * Le modèle de menaces en cinq questions | + | * Threat modeling in 5 questions |
- | * Analyse de contexte et mise en place de stratégies adaptées | + | * Context analysis and adapted response strategies |