A list of resources for digital security trainings
An organization or group of activists has requested a training or workshop and we are looking for reference resources to prepare it.
The recommended framework employed by the Digital Security Helpline to design digital security trainings and workshops is the Activity-Discussion-Inputs-Deepening-Synthesis – or ADIDS – model.
Please find further information about it in the following resources:
- How to Approach Adult Learning – Level Up
- How to Design Sessions Using ADIDS – Level Up
- A training of trainers module on adult learning and ADIDS – Fabriders
The Digital Security Helpline strives to adopt a holistic approach to thinking of, practicing and training on digital security. This approach integrates digital security, information security, as well as self-care, and well-being into traditional security management practices, and helps individuals to strengthen their ability to mitigate and reduce threats effectively and sustainably.
Please find further information about holistic security and how to apply this approach to digital security training in the following resources:
- Holistic Security Manual
- Holistic Security Trainers’ Manual including articles on best practices in facilitation of security and protection trainings for human rights defenders, and sample sessions designed following the ADIDS model.
Several trusted Helpline partners and collaborators across the digital security training community have developed educational resources that can be of great help to support civil society workers, human rights defenders, journalists and activists.
The following resources offer several examples of sessions, activities and exercises that can be very useful in the development of a digital security training or workshop:
- Level Up – A collection of resources for the global digital safety training community.
- Security Education Companion – Electronic Frontier Foundation. A resource for new and soon-to-be digital security trainers.
- Digital Security Trainer’s Assistant – Natasha Msonza. Guidance and recommendations for new and experienced trainers.
- Me and My Shadow Training Curriculum – Tactical Technology Collective.
- Digital Security Training Resources for Security Trainers, Fall 2019 Edition – Rachel Weidinger, Cooper Quintin, Martin Shelton, Matt Mitchell.
- Gendersec Training Curricula - Resource oriented towards the digital security needs of women human rights defenders and women’s and LGBTQ rights activists.
- FTX: Safety Reboot – Association for Progressive Communications (APC) and collaborators. Training curriculum for trainers who work with women’s rights and sexual rights activists.
- Digital First Aid Kit – RaReNet (Rapid Response Network) and CiviCERT. DFAK is a resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies, such as: devices or data loss, devices and accounts acting suspiciously, websites not working, online impersonation, and online harassment.
- Digital Security Manual for Human Rights Defenders - Front Line Defenders. Published in 2007, this manual still provides helpful guidance on how to discuss essential digital security concepts relevant to and grounded in the lived experienced of human rights defenders.
In case you want to complement a training effort with assigning online learning modules on key digital security concepts you can refer to:
- Totem, a platform providing short online lessons designed to help journalists and activists use digital security and privacy tools and tactics
- Advocacy Assembly
Step by step guides can also be helpful to instruct learners on the adoption and use of tools:
- Security in a Box – Front Line Defenders. Tool guides on password management, secure communications, device and data security, Internet censorship circumvention. In several languages, including English, Franch, Spanish, Portuguese, Turkish, Tibetan, Burmese
- Guías de configuracíon y uso seguro de herramientas – Conexo. A collection of materials which can be used to train on topics such as password managers, 2FA, secure internet browsing, encrypted email, secure messaging, cloud encryption, disk encryption and more. In Spanish
If you are interested in learning more about the processes by which human rights defenders learn about and adopt digital security practices, and the approaches and methodologies that digital security trainers have found most effective to support them, please check out this research project:
- Digital Security in Human Rights: A Research Project About Training and Learning – Becky Kazansky and Carol Waters, with Tactical Technology Collective