en:protectionnumerique:nosateliers

This is an old revision of the document!


Training and workshops

Nothing2Hide provides trainings related to digital security and online investigation. Our training material are available online (in French at the moment, translation ongoing) and published under creative commons license. Feel free to use it !

Online investigation

Workshop, up to 10 trainees
Length : 2h.

  • File metadata analysis
  • Technically determine the origin or first publication date of a picture or a video
  • Technical validation of a picture or video authenticity

Workshop, up to 10 trainees
Length : 2h.
Smart phone or computer needed for the trainees

  • Google Dorking : learn and discover Google advanced search operators operators (logical and and targeting)
  • Operators combination for advanced search
  • Advanced use of Google cache and other archiving online system
  • Open source intelligence

Digital security

Lecture
Length : 2h

  • Digital safety : the basics
  • Protect your online accounts
  • Learn about online surveillance and how to get rid of it
  • Smart phones, spy phones and dumb phones

Workshop, up to 10 trainees
Length : 2h.

  • Mandatory check points on a computer
  • Understand and create strong passwords
  • Remove your traces on a computer

Workshop, up to 10 trainees
Length : 2h.

  • Reminder: Data interception over the Internet
  • Tools to protect your online surfing
  • VPN + Tor

Workshop, up to 10 trainees
Length : 2h.

  • Protect your online accounts
  • Who should you open your publications to
  • Lear about compartmentalisation

Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees

  • Which data are sent by you mobile phone (IMEI, IMSI, etc.)
  • Where does your mobile phone stores your data
  • Data encryption
  • Communication encryption
  • Data backup with Google drive or iCloud : pros and cons

Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees

  • Metadata: what is it and how to handle it (or how not to leave any sensitive information in your documents, videos and pictures)
  • Secure data erasing
  • Where to save your data? Locally, with the Gafam, on a personal cloud, at home? Pros and cons
  • Data encryption

Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees

  • Difference between encryption and anonymity
  • Communiquer de façon anonyme
  • Communiquer de manière chiffrée

Atelier, 8 à 10 personnes maximum
Durée : 1 journée.
Ordinateur ou smartphone obligatoire pour les participants.

  • Chiffrement symétrique et asymétrique
  • PGP à quoi ça sert
  • L’authentification
  • Discuter “Off The Reccord”
  • Tails, le couteau suisse de la sécurité

En plénière, 10 à 30 personnes
Durée : 2heures.

  • Le modèle de menaces en cinq questions
  • Analyse de contexte et mise en place de stratégies adaptées
You could leave a comment if you were logged in.