Digital Security

Getting Started

Abstract: Human Rights Defenders and activists are increasingly the victims of digital security problems like hacking and online censorship. This course teaches participants simple but effective methods to recognise and prevent the most common reasons for it occurring.

About this course: Based on real-life cases, this course is designed to help HRDs and activists prevent themselves from becoming the victim of the most common reasons for digital security breaches. Users will learn how to identify and protect their information about the most commons ways that hackers target and gain access. They will also learn how to bypass censorship online.

What do I learn: By the end of the course, you will be able to identify common causes of digital security breaches such as phishing and social engineering. Also how to implement basic precautions to protect from viruses and stay safe online in repressive countries.

Module One : Digital Security Fundamentals

Module Two: Threats to Security

Module Three: Prevention Tips

Ahmed Shire

Security Expert

"Human rights are not just words: they need to be fought for and promoted. Gathering, organizing, analyzing and protecting information is essential to this goal, and we are proud to strengthen human rights defenders with technical advice, training, and tools” Mr. Ahmed Shire is a Software Engineer, Technologist & Digital Security Trainer with vast experience in digital security and tools for combating malware threats.

Apart from being an ICT officer and practicing as a digital security trainer for the past four years, Mr.Shire is passionate about human rights. Mr. Ahmed serves the Defenders Coalition as the Information communications and Technology officer. He has a passion in working with human rights defenders to ensure they possess the required knowledge and skills and protect themselves in a dynamic environment that changes rapidly over a very short period of time thus constantly posing new challenges to HRDs. Mr Ahmed is passionate about experiences that enrich the technology skills of beneficiaries of the work of the Defenders Coalition.


  Login to submit review

Reviews

No reviews yet