Training and workshops
Nothing2Hide provides trainings related to digital security and online investigation. Our training material are available online (in French at the moment, English translation ongoing) and published under creative commons license. Feel free to use it !
Online investigation
Online fact checking
Workshop, up to 10 trainees
Length : 2h.
Advanced online search
Workshop, up to 10 trainees
Length : 2h.
Smart phone or computer needed for the trainees
Google Dorking : learn and discover Google advanced search operators operators (logical and and targeting)
Operators combination for advanced search
Advanced use of Google cache and other archiving online system
Open source intelligence
Digital security
Digital security introduction
Lecture
Length : 2h
Digital safety : the basics
Protect your on line accounts
Learn about on line surveillance and how to get rid of it - hacking live demo
Smart phones, spy phones and dumb phones - hacking live demo
Digital safety : the basics
Workshop, up to 10 trainees
Length : 2h.
Mandatory check points on a computer
Understand and create strong passwords
Remove your traces on a computer
Secure your surf
Workshop, up to 10 trainees
Length : 2h.
Social network
Workshop, up to 10 trainees
Length : 2h.
Protect your on line accounts
Who should you open your publications to
Learn about compartmentalisation
Smartphones
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
Which data are sent by you mobile phone (IMEI, IMSI, etc.)
Where does your mobile phone stores your data
Data encryption
Communication encryption
Data backup with Google drive or iCloud : pros and cons
Manage your data
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
Metadata: what is it and how to handle it (or how not to leave any sensitive information in your documents, videos and pictures)
Secure data erasing
Where to save your data? Locally, with the Gafam, on a personal cloud, at home? Pros and cons
Data encryption
"Crypto for dummies"
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
Difference between encryption and anonymity
How to communication anonymously
How to encrypt your communications
Advanced cryptography
Workshop, up to 10 trainees
Length : 1 day
Smart phone or computer needed for the trainees
Threat modeling