Useful web resources:

Chapter 1 Digital Security:
YouTube videos on Digital Security Outsourced digital security content for trainer knowledge enhancement e.g. COMP-SYO, Security in a Box etc.
Data collected in relation to digital security e.g. policy papers, published digital security news etc.
Information gathered during working career e.g. focus group discussions, Online surveys etc.
Digital tools e.g. VPNs, anti-virus protection, TAILS
Digital Security Manuals and Handbooks (for trainees) i.e. Decoding Online violence Handbook

Chapter 2 Digital Literacy:
Watch Vint Cerf, one of the ‘fathers of the Internet’ explain
how the Internet works through the links provided below:
•https://youtu.be/Dxcc6ycZ73M
•https://youtu.be/ZhEf7e4kopM
•https://youtu.be/5o8CwafCxnU
•https://youtu.be/AYdF7b3nMto

Chapter 3 Secure communication:
https://betterhumans.pub/how-to-communicate-privately-in-the-age-of-digital-policing-cf78ff2a79a7
https://searchsecurity.techtarget.com/definition/two-factor-authentication

Chapter 4 Risk Assessment:
Refer to Risk assessment matrix
https://www.securityinabox.org
https://www.myshadow.org
Video: “SSL explained” (by Google)
Browser add-on: HTTPS Everywhere (by EFF.org)
Slides: The SSL Observatory (by EFF.org)
Article: All About HTTPS (Wikipedia)
Article: Vulnerabilities in the Certificate Authority System
Chapter 5 Data Protection and Privacy
Back up policy form https://level-up.cc/assets/files/backup_policy-blank.pdf
https://seguridaddigital.github.io/segdig/
https://securityinabox.org/en/guide/malware/
https://level-up.cc/curriculum/malware-protection/using-antivirus-tools/
https://securityinabox.org/en/guide/avast/windows/
https://securityinabox.org/en/guide/ccleaner/windows/
https://securityinabox.org/en/guide/backup/

Chapter 6 Password management:
A simplified explanation of the Internet from WebFX
A great lesson on how the Internet works

Chapter 7 Device management:
https://securityinabox.org/en/guide/destroy-sensitive-information/
https://chayn.gitbooks.io/advanced-diy-privacy-for-every-woman/content/advanced-pclaptop-security.html
https://www.bleachbit.org/
https://www.piriform.com/recuva
https://veracrypt.codeplex.com/
https://guardianproject.info/code/luks/

BACKUP POLICY FORM

RISK ASSESSMENT WORKSHEET 1

RISK ASSESSMENT WORKSHEET 2

RISK ASSESSMENT WORKSHEET 3

RISK ASSESSMENT WORKSHEET 4

RISK ASSESSMENT WORKSHEET 5