Search Results: different threat models in the same room
When Different Threat Models Are in the Same Room
Not sure what to do with a roomful of diverse risks and concerns? Set expectations, find common denominators, stay focused on the group, and...
Icebreakers
Discover the various ways of creating a safe, welcoming space in your trainings through introductory activities that allow participants to relax...
Your First Training
Prepare yourself as a first time trainer and arm yourself with useful tools, awesome collaborators, and rigorous lesson plans. Get an overview...
Training Logistics: Things to Consider
Explore how to identify your prospective learners and establish a working relationship with stakeholders. Grow your potential audience through...
Cultural Sensitivity
Prepare lessons that can be adapted to meet the different threat models and security concerns of your audience. Broaden the accessibility of...
Password Managers
Handling lots of different passwords can be a big challenge for any Internet user, and password managers offer a solution. However, using...
Drawing from Inclusive Education
How to provide the best learning experience possible for students who may have invisible needs and disabilities. Build your knowledge...
Training Prep
Establish and set clear expectations for the content and format of your training to set you and your learners up for success. Define a set of...
Passwords
Even though it’s one of the most important things you can do for your online security, creating and using strong passwords can be a tough sell...
Catering to Multiple Learning Preferences
Familiarize yourself with the various personal, cultural, and social factors that influence the ways your students learn. Learn how to foster an...
Why Your Audience Should Care—And Act
Not sure what to say when someone doesn’t see the value in learning about digital security? Try out some of these ideas.
Building Your Superhero Team
It’s dangerous to go alone! Take a companion: discover how teaching as a team is a useful way to round out expertise and complement teaching...
Recommending Tools
Investigate how to reduce harm to participants when recommending tools. Practice how to help your learners make informed decisions on what tools...
Censorship circumvention and encrypting your traffic with a VPN
“Do I need a VPN?” and “Which VPN should I use?” are questions that often come up during digital security workshops. Learners might hear of...
Hitting the Sweet Spot of Engaged Learning
Explore how to be mindful of your audience’s emotional states, and help them to feel engaged to learn.
How to Teach Adults
It’s tempting to teach digital security as though it were a classroom lecture. Read about adult learning principles and level up your teaching...
Learning About Your Audience
Examine your relationship to the people you’ll be teaching to ensure clear communication, accurate understandings of their points of view, and a...
An Overview of Web Browsing Security
Review how web browsing security works and the various ways you and your students can protect your browsing information from being viewed....
Threat Modeling
Tools and techniques may change, but threat modeling persists. Threat modeling is the cornerstone for teaching all other digital security...
Techie Power! And How It Can Get In The Way
Are you a naturally shy or an innately outgoing techie teaching digital security? We have some tips for being mindful of your natural social...
End-to-End Encrypted Communications: Phone Apps
Help your learners build a foundational, general understanding of how end-to-end encrypted messaging works to protect their communications. In...
How to Install Signal
Get your learners started with using the messaging app Signal. We’ll start with a short discussion of why and how someone might want to protect...
The Minimum Viable Teaching—When You Have No Time To Teach or They Have No Time to Listen
Sometimes, there isn’t enough time to give nuanced advice. For those times, you may want a short pitch on security.
Phishing and Malware
The most common threats your learners are likely to face online are links and files pretending to be something they’re not — in other words,...
Learning Objectives
Learn how to define specific and attainable objectives to help focus your trainings. Explore how to evaluate objectives that will provide...