Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

en:protectionnumerique:nosateliers [2018/02/09 18:05]
barbayellow [Training and workshops]
en:protectionnumerique:nosateliers [2019/10/13 14:15]
Ligne 1: Ligne 1:
-====== Training and workshops ====== 
  
-Nothing2Hide provides trainings related to digital security ​ and online investigation. Our [[https://​nothing2hide.org/​slides/​|training material]] are available online (in French at the moment, English translation ongoing) and published under creative commons license. Feel free to use it ! 
- 
-====== Online investigation ====== 
- 
-===== Online fact checking ===== 
- 
-//Workshop, up to 10 trainees//​\\ 
-//Length : 2h.//\\ 
- 
-  * File metadata analysis 
-  * Technically determine the origin or first publication date of a picture or a video 
-  * Technical validation of a picture or video authenticity 
- 
-===== Advanced online search ===== 
- 
-//Workshop, up to 10 trainees//​\\ 
-//Length : 2h.//\\ 
-// Smart phone or computer needed for the trainees// 
- 
-  * Google Dorking : learn and discover Google advanced search operators operators (logical and and targeting) 
-  * Operators combination for advanced search 
-  * Advanced use of Google cache and other archiving online system 
-  * Open source intelligence 
- 
-====== Digital security ====== 
- 
-===== Digital security introduction ===== 
- 
-//Lecture //\\ 
-//Length : 2h// 
- 
-  * Digital safety : the basics 
-  * Protect your online accounts 
-  * Learn about online surveillance and how to get rid of it 
-  * Smart phones, spy phones and dumb phones 
- 
-===== Digital safety : the basics ===== 
- 
-//Workshop, up to 10 trainees//​\\ 
-//Length : 2h.//\\ 
- 
-  *      Mandatory check points on a computer 
-  *      Understand and create strong passwords 
-  *      Remove your traces on a computer 
- 
-===== Secure your surf ===== 
- 
-//Workshop, up to 10 trainees//​\\ 
-//Length : 2h.//\\ 
- 
-  *      Reminder: Data interception over the Internet 
-  *      Tools to protect your online surfing ​ 
-  *      VPN + Tor 
- 
-===== Social network ===== 
-//Workshop, up to 10 trainees//​\\ 
-//Length : 2h.//\\ 
- 
-  * Protect your on line accounts 
-  * Who should you open your publications to 
-  * Learn about compartmentalisation 
- 
-===== Smartphones ​ ===== 
- 
-//Workshop, up to 10 trainees//​\\ 
-//Length : 4h.//\\ 
-// Smart phone or computer needed for the trainees// 
- 
-  *   Which data are sent by you mobile phone (IMEI, IMSI, etc.) 
-  *   Where does your mobile phone stores your data  
-  *   Data encryption 
-  *   ​Communication encryption 
-  *   Data backup with Google drive or iCloud : pros and cons 
- 
-===== Manage your data ===== 
-  
-//Workshop, up to 10 trainees//​\\ 
-//Length : 4h.//\\ 
-// Smart phone or computer needed for the trainees// 
- 
-  * Metadata: what is it and how to handle it (or how not to leave any sensitive information in your documents, videos and pictures) 
-  * Secure data erasing 
-  * Where to save your data? Locally, with the Gafam, on a personal ​ cloud, at home? Pros and cons 
-  * Data encryption 
- 
-===== "​Crypto for dummies"​ ===== 
- 
-//Workshop, up to 10 trainees//​\\ 
-//Length : 4h.//\\ 
-// Smart phone or computer needed for the trainees// 
- 
-  *     ​Difference between encryption and anonymity 
-  *     How to communication anonymously 
-  *     How to encrypt your communications 
- 
-===== Advanced cryptography ===== 
- 
-//Workshop, up to 10 trainees//​\\ 
-//Length : 1 day //\\ 
-// Smart phone or computer needed for the trainees// 
- 
-  * Symmetric and asymmetric cryptography 
-  * PGP what for? How to use it? 
-  * Authentication 
-  * "Off The Record"​ chat 
-  * understand and use the most secured live OS: Tails 
- 
-===== Threat modeling ===== 
- 
-//Workshop //\\ 
-//Length : 2h //\\ 
- 
-  * Threat modeling in 5 questions 
-  * Context analysis and adapted response strategies