Code Monkey home page Code Monkey logo

championscurriculum's Introduction

WORK IN PROGRESS

Welcome

Welcome to the information security champion training and basic assessment curriculum. The current working title for this project is OctoC - Curriculum for Creating Cyber-Security Champions and Compliance Checking in Civil Communities

Yes we know we used the word "Cyber" but the acronym was tricky to think up - open to better suggestions! :)

The project is a partnership between the Institute for War and Peace Reporting and Security First. It is currently not yet finished and there is a lot of work still to do, especially around structure and language. We also need to test the lessons in the field. We warmly welcome any feedback, ideas (especially for the activities parts of the lessons), criticism or just general thoughts. Probably the best way to reach us is a Github issue or email [email protected].

Who is this curriculum for?

This curriculum is designed as a tool for trainers working with people within small NGOs and media organisations who find themselves tasked with the management of the day to day running of secure and private information.

Often these individuals are described as "champions." These people begin this often informal role by being the office "techie" or "printer-fixer" - a person who might not have received formal training before but find themselves dealing with many of the day to day information security concepts.

Though most of the learning will be hands-on and participants won't need to be technical specialists to understand, this course is primarily about taking people who already understand some core concepts and giving them more skills to be able to manage more effectively.

At a minimum, we suggest that participants already have a basic knowledge of tools and techniques listed in or already conducted training similar to the content found resources such as:

Why create this course?

This course was created to help fill an identified need within the trainer community. We currently have many resources available for educating users (such as Level-Up), for implementing issues of organisational security (OrgSec community) and for auditing an organisation's security (SAFETAG). What we were missing though, was a curriculum to help people begin to learn how to manage an organisation's information security. That is what this curriculum aims to provide.

How does it work?

The range of knowledge needed to manage information security is enormous and often outside the realm of what any individual could master even with years of training. As such, the curriculum is designed to:

  • Introduce individuals to a topic
  • Develop a familiarity with key approaches to dealing with the topic within their environment through class interaction and hands-on research
  • Leave a topic with a basic knowledge, resources and a developed support network that they can utilise for implementation at a later stage.

Throughout the course, each participant also conducts a basic assessment of their own organisation that they build on for each module that they cover. This helps to a participant to maximise the utility of the course to their own circumstances and leave with an action plan for implementation at a later stage. So for example, a module on privacy will introduce some core concepts, then individuals conduct group work on what's relevant for their individual circumstance, assess how their own organisations deal with the issue and then record this and recommended actions in their assessment for use at a later date.

This trainer curriculum follows the standard pedagogy approach to adult learning adopted by many within the information security training community - such as Level-Up.

This breaks down each lesson into the following five areas:

  • Activity - a learning task for the group to conduct
  • Discussion - about the module
  • Inputs - related lecture or background material
  • Deepening - the hands-on portion of the module
  • Synthesis - summary and wrap-up. For this curriculum, this is also where participants fill out the assessment.

Trainers should consult "Recommended Preparations" before presenting each module. Most require secure WiFi. Remind participants to bring devices and chargers.

How long does it take?

The course is designed to be modular. Each module comes with a suggested time. Allowing individual modules to be taken alone or a full course to be run. How long the course takes depends on many factors such as language, existing skills etc. However, we aim to make the entire course last at most five days.

What does it cover?

It is not just about digital issues but also addresses things such as the security of physical information like paper documentation. We also discuss the important issues of how to design projects to ensure responsible collection of data and the ensuring privacy by design within projects.

The course is broken into the following sections:

Introduction
Mapping information, assessing the threat environment and modelling
Privacy regulation and requirements
User Education
Encryption, Patching, Licensing
Network Management, Monitoring, WiFi and Logs
Communications
Web and Email Management
Password Management
Mobile Device Management / BYOD
Travel
Resilience and Backups
Policy Creation and Implementation
Physical Security
Responding to Incidents
Basic audits
Community structures and resources for further learning

Licence

This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.

championscurriculum's People

Contributors

madelineearp avatar rorymbyrne avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

championscurriculum's Issues

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.